|
Search the dblp DataBase
Carsten Rudolph:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Carsten Rudolph
A Formal Model for Systematic Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:332-343 [Conf]
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:473-482 [Conf]
- Antonio Mana, José A. Montenegro, Carsten Rudolph, José Luis Vivas
A business process-driven approach to security engineering. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:477-481 [Conf]
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
Abstractions Preserving Parameter Confidentiality. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:418-437 [Conf]
- Sigrid Gürgens, Carsten Rudolph
Security Analysis of (Un-) Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP] FASec, 2002, pp:97-114 [Conf]
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
Parameter-Confidentiality. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:383-394 [Conf]
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
Authenticity and Provability - A Formal Framework. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:227-245 [Conf]
- Sigrid Gürgens, Carsten Rudolph, Holger Vogt
On the Security of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:193-207 [Conf]
- Carsten Rudolph, Antonio Mana
Specification and automated processing of security requirements (SAPS'05). [Citation Graph (0, 0)][DBLP] ASE, 2005, pp:460- [Conf]
- Sigrid Gürgens, Carsten Rudolph
Security analysis of efficient (Un-)fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2005, v:17, n:3, pp:260-276 [Journal]
- Sigrid Gürgens, Carsten Rudolph, Holger Vogt
On the security of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:4, pp:253-262 [Journal]
- Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz
Facilitating the Use of TPM Technologies through S&D Patterns. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2007, pp:765-769 [Conf]
- Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga
Security Evaluation of Scenarios Based on the TCG's TPM Specification. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:438-453 [Conf]
Towards a Generic Process for Security Pattern Integration. [Citation Graph (, )][DBLP]
Covert Identity Information in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]
On the Security Validation of Integrated Security Solutions. [Citation Graph (, )][DBLP]
Trust in Peer-to-Peer Content Distribution Protocols. [Citation Graph (, )][DBLP]
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. [Citation Graph (, )][DBLP]
Trust in Business Processes. [Citation Graph (, )][DBLP]
Secure Web Service Workflow Execution. [Citation Graph (, )][DBLP]
Search in 0.016secs, Finished in 0.016secs
|