Search the dblp DataBase
Rolf Oppliger :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Rolf Oppliger Internet Security: Firewalls and Beyond. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1997, v:40, n:5, pp:92-102 [Journal ] Rolf Oppliger , Andreas Greulich , Peter Trachsel A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:241-248 [Conf ] Rolf Oppliger Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:163-175 [Conf ] Rolf Oppliger , Martin Bracher Distributed Registration and Key Distribution for Online Universities. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:166-175 [Conf ] Rolf Oppliger , Sebastian Gajek Effective Protection Against Phishing and Web Spoofing. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:32-41 [Conf ] Rolf Oppliger Shaping the Research Agenda for Security in E-Commerce. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:810-814 [Conf ] Javier Lopez , Rolf Oppliger , Günther Pernul Classifying Public Key Certificates. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:135-143 [Conf ] Rolf Oppliger Authentifikations- und Schlüsselverteilsysteme. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1995, pp:266-273 [Conf ] Rolf Oppliger , Amit Gupta , Mark Moran , Riccardo Bettati A Security Architecture for Tenet Scheme 2. [Citation Graph (0, 0)][DBLP ] IDMS, 1996, pp:163-174 [Conf ] Rolf Oppliger , Jean-Luc Nottaris Online Casinos. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1997, pp:2-16 [Conf ] Rolf Oppliger , Stephan Weber , Dieter Hogrefe Entwurf von virtuell privaten Netzen. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1993, pp:428-441 [Conf ] Rolf Oppliger , Andres Albanese Distributed registration and key distribution (DiRK). [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:199-208 [Conf ] Rolf Oppliger Authorization Methods for E-Commerce Applications. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1999, pp:366-371 [Conf ] Rolf Oppliger , Andres Albanese Distance education and on-line universities. [Citation Graph (0, 0)][DBLP ] WETICE, 1996, pp:10-15 [Conf ] Rolf Oppliger Certified mail: the next challenge for secure messaging. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:8, pp:75-79 [Journal ] Rolf Oppliger IT security: in search of the Holy Grail. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:2, pp:96-98 [Journal ] Madjid Merabti , Qi Shi , Rolf Oppliger Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal ] Rolf Oppliger Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:4, pp:429-0 [Journal ] Rolf Oppliger Privacy-enhancing technologies for the world wide web. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:16, pp:1791-1797 [Journal ] Rolf Oppliger D. B. Parker: Fighting computer crimes: a new framework for protecting information. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:5, pp:491-492 [Journal ] Rolf Oppliger Security issues related to mobile code and agent-based systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:12, pp:1165-1170 [Journal ] Rolf Oppliger , Peter Stadlin A certified mail system (CMS) for the Internet. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:13, pp:1229-123 [Journal ] Rolf Oppliger , Ralf Hauser , David A. Basin SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:12, pp:2238-2246 [Journal ] Javier Lopez , Rolf Oppliger , Günther Pernul Authentication and authorization infrastructures (AAIs): a comparative survey. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:7, pp:578-590 [Journal ] Rolf Oppliger Microsoft .NET Passport: A Security Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:7, pp:29-35 [Journal ] Rolf Oppliger Internet Security Enters the Middle Ages. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1995, v:28, n:10, pp:100-101 [Journal ] Rolf Oppliger Security at the Internet Layer. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:9, pp:43-47 [Journal ] Rolf Oppliger , Ruedi Rytz Digital Evidence: Dream and Reality. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:44-48 [Journal ] Rolf Oppliger , Ruedi Rytz Does Trusted Computing Remedy Computer Security Problems? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:16-19 [Journal ] Günther Pernul , Marco Casassa Mont , Eduardo B. Fernández , Sokratis K. Katsikas , Alfred Kobsa , Rolf Oppliger Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:2- [Conf ] Rolf Oppliger Privacy protection and anonymity services for the World Wide Web (WWW). [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:379-391 [Journal ] A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). [Citation Graph (, )][DBLP ] Protecting Code Voting Against Vote Selling. [Citation Graph (, )][DBLP ] CAPTCHA-based Code Voting. [Citation Graph (, )][DBLP ] SSL/TLS session-aware user authentication revisited. [Citation Graph (, )][DBLP ] SSL/TLS Session-Aware User Authentication. [Citation Graph (, )][DBLP ] Internet Banking: Client-Side Attacks and Protection Mechanisms. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.331secs