The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tage Stabell-Kulø: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tage Stabell-Kulø, Arne Helme, Gianluca Dini
    Detecting Key-Dependencies. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:356-366 [Conf]
  2. Feike W. Dillema, Simone Lupetti, Tage Stabell-Kulø
    A Decentralized Authorization Architecture. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:497-504 [Conf]
  3. Tage Stabell-Kulø
    Smartcards: Hot to Put them to Use in a User-Centric System. [Citation Graph (0, 0)][DBLP]
    HUC, 2000, pp:200-210 [Conf]
  4. Tage Stabell-Kulø, Feico Dillema, Terje Fallmyr
    The Open-End Argument for Private Computing. [Citation Graph (0, 0)][DBLP]
    HUC, 1999, pp:124-136 [Conf]
  5. Anders Andersen, Gordon S. Blair, Tage Stabell-Kulø, Per Harald Myrvang, Tom-Anders Nilsen Røst
    Reflective Middleware and Security: OOPP meets Obol. [Citation Graph (0, 0)][DBLP]
    Middleware Workshops, 2003, pp:100-104 [Conf]
  6. Tage Stabell-Kulø, Simone Lupetti
    Public-Key Cryptography and Availability. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2005, pp:222-232 [Conf]
  7. Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø
    Names in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:185-194 [Conf]
  8. Feike W. Dillema, Tage Stabell-Kulø
    Pesto Flavoured Security. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:241-249 [Conf]
  9. Tage Stabell-Kulø, Terje Fallmyr
    User Controlled Sharing in a Variable Connected Distributed System. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:250-255 [Conf]
  10. Anders Andersen, Gordon S. Blair, Per Harald Myrvang, Tage Stabell-Kulø
    Security and Middleware. [Citation Graph (0, 0)][DBLP]
    WORDS, 2003, pp:186-190 [Conf]
  11. Tage Stabell-Kulø
    From the Editor: Security Community--Blurring the Line between Authentication and Identification. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2006, v:7, n:2, pp:- [Journal]
  12. Arne Helme, Tage Stabell-Kulø
    Security Functions for a File Repository. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:2, pp:3-8 [Journal]
  13. Tage Stabell-Kulø
    Security and Log Structured File Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:2, pp:9-10 [Journal]
  14. Andrea Bottoni, Gianluca Dini, Tage Stabell-Kulø
    A methodology for verification of digital items in fair exchange protocols with active trustee. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2007, v:7, n:2, pp:143-164 [Journal]

  15. Conflict Resolution for User-Selected Names in Collaborative Systems. [Citation Graph (, )][DBLP]


  16. The Role of Reflective Middleware in Supporting Flexible Security Policies. [Citation Graph (, )][DBLP]


  17. Gaining Flexibility by Security Protocol Transfer. [Citation Graph (, )][DBLP]


  18. Cordial Security Protocol Programming. [Citation Graph (, )][DBLP]


  19. Cordial Security Protocol Programming. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002