The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Reinhard Posch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. P. Lippitsch, Karl C. Posch, Reinhard Posch
    Multiplication as Parallel as Possible. [Citation Graph (0, 0)][DBLP]
    ACPC, 1991, pp:350-358 [Conf]
  2. Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos
    Secure Communications in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:84-0 [Conf]
  3. Herbert Leitold, Arno Hollosi, Reinhard Posch
    Security Architecture of the Austrian Citizen Card Concept. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:391-402 [Conf]
  4. Herbert Leitold, Udo Payer, Reinhard Posch
    A Hardware-Independent Encryption Model for ATM Devices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:205-211 [Conf]
  5. Ilias Andrikopoulos, Tolga Örs, Maja Matijasevic, Herbert Leitold, Reinhard Posch
    A study of TCP/IP throughout performance in heterogeneous ATM local area networks. [Citation Graph (0, 0)][DBLP]
    Modelling and Evaluation of ATM Networks, 1996, pp:447-465 [Conf]
  6. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
    A 155 Mbps Triple-DES Network Encryptor. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:164-174 [Conf]
  7. Herbert Leitold, Karl C. Posch, Reinhard Posch
    ISDN Security services. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:21-35 [Conf]
  8. Arno Hollosi, Herbert Leitold, Reinhard Posch
    An open interface enabling secure e-government. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:255-266 [Conf]
  9. Arno Hollosi, Udo Payer, Reinhard Posch
    Automatic authentication based on the Austrian citizen card. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:241-253 [Conf]
  10. Reinhard Posch, Herbert Leitold, Franz Pucher
    ISDN LAN Access: Remote Access Security and User Profile Management. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:222-233 [Conf]
  11. Thomas Rössler, Herbert Leitold, Reinhard Posch
    E-Voting: A Scalable Approach using XML and Hardware Security Modules. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:480-485 [Conf]
  12. Reinhard Posch
    What Is Needed to Allow e-Citizenship? [Citation Graph (0, 0)][DBLP]
    EGOV, 2002, pp:45-51 [Conf]
  13. H. Bogensberger, Günter Haring, Reinhard Posch
    Ein Modell zur gemeinsamen Nutzung einer Rechenanlage. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1979, pp:534-544 [Conf]
  14. H. Cheng, Peter Lipp, Hermann A. Maurer, Reinhard Posch
    GASC: ein Graphik- und Software Kommunikationssystem. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1985, pp:679-690 [Conf]
  15. Reinhard Posch, Herbert Leitold
    Digitale Signaturen in der Praxis. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2001, pp:477-485 [Conf]
  16. Artur Klauser, Reinhard Posch
    Distributed File Caching in Parallel Architectures Utilizing High Speed Networks. [Citation Graph (0, 0)][DBLP]
    HPCN, 1994, pp:30-35 [Conf]
  17. Reinhard Posch, Herbert Leitold
    Identification and Confidentiality for e-Government. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:267-279 [Conf]
  18. Reinhard Posch
    Der Mensch im Cyberspace. [Citation Graph (0, 0)][DBLP]
    Mensch-Computer Interaktion im 21. Jahrhundert, 2001, pp:15-19 [Conf]
  19. Hannes Hassler, Vesna Hassler, Reinhard Posch
    A hierarchical threshold scheme with unique partial keys. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:219-226 [Conf]
  20. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
    Robustness-Agile Encryptor for ATM Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:231-240 [Conf]
  21. Herbert Leitold, Reinhard Posch
    ATM Network Security: Requirements, Approaches, Standards, and the SCAN Solution. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 1999, pp:191-204 [Conf]
  22. Karl C. Posch, Reinhard Posch
    Residue Number Systems: A Key to Parallelism in Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    SPDP, 1992, pp:432-435 [Conf]
  23. P. Lippitsch, Reinhard Posch
    PC-RSA A Cryptgraphic Toolkit for MS-DOS. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:346-354 [Conf]
  24. Reinhard Posch
    The Business Of Electronic Government. [Citation Graph (0, 0)][DBLP]
    WebNet, 2000, pp:622-623 [Conf]
  25. Vesna Hassler, N. Lutz, Reinhard Posch
    Privacy-enhanced desktop meeting system. [Citation Graph (0, 0)][DBLP]
    WETICE, 1996, pp:112-117 [Conf]
  26. Wolf-Dietrich Fellner, Reinhard Posch
    Bildschirmtext - An open videotex network for text and graphic applications. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1987, v:11, n:4, pp:359-367 [Journal]
  27. Günter Haring, Reinhard Posch, C. Leonhardt, Günter Gell
    The Use of a Synthetic Jobstream in Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1979, v:22, n:3, pp:209-219 [Journal]
  28. Peter Lipp, Reinhard Posch
    An Inter-Bridge-Security Protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1992, v:25, n:4-5, pp:496-500 [Journal]
  29. Reinhard Posch, Franz Pucher, Michael Welser
    Using a transputer cluster in a classroom environment. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:3, pp:192-196 [Journal]
  30. J. Schwemmlein, Karl C. Posch, Reinhard Posch
    RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:637-650 [Journal]
  31. Wolfgang Mayerwieser, Reinhard Posch
    Neue Möglichkeiten und Anforderungen für Krypto-Koprozessoren. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 1999, v:23, n:9, pp:- [Journal]
  32. Artur Klauser, Reinhard Posch
    Distributed Caching in Networked File Systems. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1995, v:1, n:6, pp:399-409 [Journal]
  33. Wolfgang Mayerwieser, Karl C. Posch, Reinhard Posch, Volker Schindler
    Testing a High-Speed Data Path: The Design of the RSAs Crypto Chip. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1995, v:1, n:11, pp:728-743 [Journal]
  34. Reinhard Posch
    Will Internet Ever Be Secure ? [Citation Graph (0, 0)][DBLP]
    J. UCS, 2001, v:7, n:5, pp:447-456 [Journal]
  35. Reinhard Posch
    Protecting Devices by Active Coating. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1998, v:4, n:7, pp:652-668 [Journal]
  36. Franz Pucher, Herbert Leitold, Reinhard Posch
    LAN Access Over ISDN. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1996, v:2, n:1, pp:20-33 [Journal]
  37. Reinhard Posch, Günter Haring
    Allocating Computer Resources to Satisfy User and Management Demands. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1984, v:14, n:4, pp:311-321 [Journal]
  38. Karl C. Posch, Reinhard Posch
    Modulo Reduction in Residue Number Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1995, v:6, n:5, pp:449-454 [Journal]
  39. H. Bogensberger, Hermann A. Maurer, Reinhard Posch, W. Schinnerl
    Ein neuartiges - durch spezielle Hardware unterstütztes - Terminalkonzept für Bildschirmtext. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1983, v:25, n:3, pp:108-113 [Journal]
  40. Robert Hufsky, Erich Löw, Reinhard Posch
    Eine Erweiterung der Farbtabelle durch einen deterministischen Realtime-Schedule. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1990, v:32, n:4, pp:372-375 [Journal]
  41. Reinhard Posch
    Ein Vorschlag zur Behandlung von prozedurfreien asynchronen Terminals im Halbduplex-Verfahren. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1980, v:22, n:3, pp:119-125 [Journal]
  42. Reinhard Posch
    Transparente Protokolle als Alternative herstellerspezifische Terminalbehandlung. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1982, v:24, n:12, pp:575-580 [Journal]
  43. Reinhard Posch
    Interruptstrukturen in Systemen mit Datenfernverarbeitungsumgebung. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1983, v:25, n:6, pp:258-261 [Journal]
  44. Reinhard Posch
    Verwendung dynamischer Verdichtungsverfahren zur Erhöhung der Übertragungsleistung auf langsamen Datenverbindungen. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1985, v:27, n:12, pp:520-523 [Journal]
  45. Reinhard Posch
    Multiuser-Software Security. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1988, v:30, n:5, pp:203-206 [Journal]
  46. Reinhard Posch, Peter Lipp
    Ein automatisiertes Examensprüfungswesen an der TU Graz auf der Basis eines Fileserver-orientierten Mailboxsystems. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1988, v:30, n:3, pp:132-137 [Journal]
  47. Reinhard Posch, Michael Welser
    A Conceptual View of MS-DOS File System Security. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1991, v:33, n:6, pp:526-531 [Journal]

  48. A Federated Identity Management Architecture for Cross-Border Services in Europe. [Citation Graph (, )][DBLP]


  49. Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. [Citation Graph (, )][DBLP]


  50. Reconstruction of electronic signatures from eDocument printouts. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002