Search the dblp DataBase
Tage Stabell-Kulø :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tage Stabell-Kulø , Arne Helme , Gianluca Dini Detecting Key-Dependencies. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:356-366 [Conf ] Feike W. Dillema , Simone Lupetti , Tage Stabell-Kulø A Decentralized Authorization Architecture. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:497-504 [Conf ] Tage Stabell-Kulø Smartcards: Hot to Put them to Use in a User-Centric System. [Citation Graph (0, 0)][DBLP ] HUC, 2000, pp:200-210 [Conf ] Tage Stabell-Kulø , Feico Dillema , Terje Fallmyr The Open-End Argument for Private Computing. [Citation Graph (0, 0)][DBLP ] HUC, 1999, pp:124-136 [Conf ] Anders Andersen , Gordon S. Blair , Tage Stabell-Kulø , Per Harald Myrvang , Tom-Anders Nilsen Røst Reflective Middleware and Security: OOPP meets Obol. [Citation Graph (0, 0)][DBLP ] Middleware Workshops, 2003, pp:100-104 [Conf ] Tage Stabell-Kulø , Simone Lupetti Public-Key Cryptography and Availability. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2005, pp:222-232 [Conf ] Simone Lupetti , Feike W. Dillema , Tage Stabell-Kulø Names in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] WOSIS, 2006, pp:185-194 [Conf ] Feike W. Dillema , Tage Stabell-Kulø Pesto Flavoured Security. [Citation Graph (0, 0)][DBLP ] SRDS, 2003, pp:241-249 [Conf ] Tage Stabell-Kulø , Terje Fallmyr User Controlled Sharing in a Variable Connected Distributed System. [Citation Graph (0, 0)][DBLP ] WETICE, 1998, pp:250-255 [Conf ] Anders Andersen , Gordon S. Blair , Per Harald Myrvang , Tage Stabell-Kulø Security and Middleware. [Citation Graph (0, 0)][DBLP ] WORDS, 2003, pp:186-190 [Conf ] Tage Stabell-Kulø From the Editor: Security Community--Blurring the Line between Authentication and Identification. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2006, v:7, n:2, pp:- [Journal ] Arne Helme , Tage Stabell-Kulø Security Functions for a File Repository. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1997, v:31, n:2, pp:3-8 [Journal ] Tage Stabell-Kulø Security and Log Structured File Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1997, v:31, n:2, pp:9-10 [Journal ] Andrea Bottoni , Gianluca Dini , Tage Stabell-Kulø A methodology for verification of digital items in fair exchange protocols with active trustee. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2007, v:7, n:2, pp:143-164 [Journal ] Conflict Resolution for User-Selected Names in Collaborative Systems. [Citation Graph (, )][DBLP ] The Role of Reflective Middleware in Supporting Flexible Security Policies. [Citation Graph (, )][DBLP ] Gaining Flexibility by Security Protocol Transfer. [Citation Graph (, )][DBLP ] Cordial Security Protocol Programming. [Citation Graph (, )][DBLP ] Cordial Security Protocol Programming. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs