|
Search the dblp DataBase
Ulrike Meyer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ulrike Meyer, Susanne Wetzel
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2006, pp:277-282 [Conf]
- Ulrike Meyer, Jared Cordasco, Susanne Wetzel
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. [Citation Graph (0, 0)][DBLP] WMASH, 2005, pp:1-13 [Conf]
- Ulrike Meyer, Susanne Wetzel
A man-in-the-middle attack on UMTS. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:90-97 [Conf]
- Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:221-228 [Conf]
Distributed Privacy-Preserving Policy Reconciliation. [Citation Graph (, )][DBLP]
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. [Citation Graph (, )][DBLP]
SecSyWiSe: A secure time synchronization scheme in wireless sensor networks. [Citation Graph (, )][DBLP]
Distributed delays stabilize neural feedback systems. [Citation Graph (, )][DBLP]
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|