The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rolf Oppliger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rolf Oppliger
    Internet Security: Firewalls and Beyond. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:5, pp:92-102 [Journal]
  2. Rolf Oppliger, Andreas Greulich, Peter Trachsel
    A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:241-248 [Conf]
  3. Rolf Oppliger
    Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:163-175 [Conf]
  4. Rolf Oppliger, Martin Bracher
    Distributed Registration and Key Distribution for Online Universities. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:166-175 [Conf]
  5. Rolf Oppliger, Sebastian Gajek
    Effective Protection Against Phishing and Web Spoofing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:32-41 [Conf]
  6. Rolf Oppliger
    Shaping the Research Agenda for Security in E-Commerce. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:810-814 [Conf]
  7. Javier Lopez, Rolf Oppliger, Günther Pernul
    Classifying Public Key Certificates. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:135-143 [Conf]
  8. Rolf Oppliger
    Authentifikations- und Schlüsselverteilsysteme. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1995, pp:266-273 [Conf]
  9. Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati
    A Security Architecture for Tenet Scheme 2. [Citation Graph (0, 0)][DBLP]
    IDMS, 1996, pp:163-174 [Conf]
  10. Rolf Oppliger, Jean-Luc Nottaris
    Online Casinos. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:2-16 [Conf]
  11. Rolf Oppliger, Stephan Weber, Dieter Hogrefe
    Entwurf von virtuell privaten Netzen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1993, pp:428-441 [Conf]
  12. Rolf Oppliger, Andres Albanese
    Distributed registration and key distribution (DiRK). [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:199-208 [Conf]
  13. Rolf Oppliger
    Authorization Methods for E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:366-371 [Conf]
  14. Rolf Oppliger, Andres Albanese
    Distance education and on-line universities. [Citation Graph (0, 0)][DBLP]
    WETICE, 1996, pp:10-15 [Conf]
  15. Rolf Oppliger
    Certified mail: the next challenge for secure messaging. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:8, pp:75-79 [Journal]
  16. Rolf Oppliger
    IT security: in search of the Holy Grail. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:2, pp:96-98 [Journal]
  17. Madjid Merabti, Qi Shi, Rolf Oppliger
    Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal]
  18. Rolf Oppliger
    Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:4, pp:429-0 [Journal]
  19. Rolf Oppliger
    Privacy-enhancing technologies for the world wide web. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:16, pp:1791-1797 [Journal]
  20. Rolf Oppliger
    D. B. Parker: Fighting computer crimes: a new framework for protecting information. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:5, pp:491-492 [Journal]
  21. Rolf Oppliger
    Security issues related to mobile code and agent-based systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:12, pp:1165-1170 [Journal]
  22. Rolf Oppliger, Peter Stadlin
    A certified mail system (CMS) for the Internet. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:13, pp:1229-123 [Journal]
  23. Rolf Oppliger, Ralf Hauser, David A. Basin
    SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:12, pp:2238-2246 [Journal]
  24. Javier Lopez, Rolf Oppliger, Günther Pernul
    Authentication and authorization infrastructures (AAIs): a comparative survey. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:578-590 [Journal]
  25. Rolf Oppliger
    Microsoft .NET Passport: A Security Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:7, pp:29-35 [Journal]
  26. Rolf Oppliger
    Internet Security Enters the Middle Ages. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:10, pp:100-101 [Journal]
  27. Rolf Oppliger
    Security at the Internet Layer. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:9, pp:43-47 [Journal]
  28. Rolf Oppliger, Ruedi Rytz
    Digital Evidence: Dream and Reality. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:44-48 [Journal]
  29. Rolf Oppliger, Ruedi Rytz
    Does Trusted Computing Remedy Computer Security Problems? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:16-19 [Journal]
  30. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger
    Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:2- [Conf]
  31. Rolf Oppliger
    Privacy protection and anonymity services for the World Wide Web (WWW). [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:379-391 [Journal]

  32. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). [Citation Graph (, )][DBLP]


  33. Protecting Code Voting Against Vote Selling. [Citation Graph (, )][DBLP]


  34. CAPTCHA-based Code Voting. [Citation Graph (, )][DBLP]


  35. SSL/TLS session-aware user authentication revisited. [Citation Graph (, )][DBLP]


  36. SSL/TLS Session-Aware User Authentication. [Citation Graph (, )][DBLP]


  37. Internet Banking: Client-Side Attacks and Protection Mechanisms. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.331secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002