Search the dblp DataBase
Holger Petersen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Patrick Horster , Markus Michels , Holger Petersen Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:224-237 [Conf ] Patrick Horster , Holger Petersen , Markus Michels Meta-ElGamal Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:96-107 [Conf ] Markus Michels , Holger Petersen , Patrick Horster Breaking and Repairing a Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:148-152 [Conf ] Yun Ding , Patrick Horster , Holger Petersen A New Approach for Delegation Using Hierarchical Delegation Tokens. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:128-143 [Conf ] Holger Petersen Stacks versus Deques. [Citation Graph (0, 0)][DBLP ] COCOON, 2001, pp:218-227 [Conf ] Matthias Jantzen , Manfred Kudlek , Klaus-Jörn Lange , Holger Petersen Dyck1 -Reductions of Context-free Languages. [Citation Graph (0, 0)][DBLP ] FCT, 1987, pp:218-227 [Conf ] Amir M. Ben-Amram , Holger Petersen CONS-Free Programs with Tree Input (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICALP, 1998, pp:271-282 [Conf ] Holger Petersen , John Michael Robson Efficient Simulations by Queue Machines. [Citation Graph (0, 0)][DBLP ] ICALP, 1998, pp:884-895 [Conf ] Alexander Herrigel , Joseph Ó Ruanaidh , Holger Petersen , Shelby Pereira , Thierry Pun Secure Copyright Protection Techniques for Digital Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:169-190 [Conf ] Holger Petersen Separation Results for Rebound Automata. [Citation Graph (0, 0)][DBLP ] MFCS, 2000, pp:589-598 [Conf ] Holger Petersen Homomorphic Images os Sentential Forms and Terminating Grammars (Extended Abstract). [Citation Graph (0, 0)][DBLP ] MFCS, 1997, pp:448-457 [Conf ] Holger Petersen The Head Hierarchy for Oblivious Finite Automata with Polynomial Advice Collapses. [Citation Graph (0, 0)][DBLP ] MFCS, 1998, pp:296-304 [Conf ] Holger Petersen Fooling Rebound Automata. [Citation Graph (0, 0)][DBLP ] MFCS, 1999, pp:241-250 [Conf ] Holger Petersen How to Convert any Digital Signature Scheme into a Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:177-190 [Conf ] Holger Petersen , Markus Michels On Signature Schemes with Threshold Verification Detecting Malicious Verifiers. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:67-78 [Conf ] Matthias Jantzen , Holger Petersen Cancellation on Context-Free Languages: Enrichment by Reduction. [Citation Graph (0, 0)][DBLP ] STACS, 1993, pp:206-215 [Conf ] Holger Petersen The Membership Problem for Regular Expressions with Intersection Is Complete in LOGCFL. [Citation Graph (0, 0)][DBLP ] STACS, 2002, pp:513-522 [Conf ] Amir M. Ben-Amram , Holger Petersen Backing Up in Singly Linked Lists. [Citation Graph (0, 0)][DBLP ] STOC, 1999, pp:780-786 [Conf ] Patrick Horster , Markus Michels , Holger Petersen Das Meta-ElGamal Signaturverfahren und seine Anwendungen. [Citation Graph (0, 0)][DBLP ] VIS, 1995, pp:207-0 [Conf ] Amir M. Ben-Amram , Omer Berkman , Holger Petersen Element distinctness on one-tape Turing machines: a complete solution. [Citation Graph (0, 0)][DBLP ] Acta Inf., 2003, v:40, n:2, pp:81-94 [Journal ] Markus Michels , David Naccache , Holger Petersen GOST 34.10 - A brief overview of Russia's DSA. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:725-732 [Journal ] Ingmar Camphausen , Holger Petersen , Claus Stark Konzepte zum Root-CA Zertifikatswechsel. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2003, v:27, n:2, pp:- [Journal ] Dörte Neundorf , Holger Petersen Information Security Management - Vom Prozess zur Umsetzung. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2003, v:27, n:4, pp:- [Journal ] Holger Petersen Privilege Management Infrastructure - PMI. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 1999, v:23, n:4, pp:- [Journal ] Katsushi Inoue , Akira Ito , Takashi Kamiura , Holger Petersen , Lan Zhang A Note On Rebound Turing Machines. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2004, v:15, n:5, pp:791-807 [Journal ] Anca Muscholl , Holger Petersen A Note on the Commutative Closure of Star-Free Languages. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:57, n:2, pp:71-74 [Journal ] Holger Petersen Bounds for the Element Distinctness Problem on one-tape Turing machines. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2002, v:81, n:2, pp:75-79 [Journal ] Amir M. Ben-Amram , Holger Petersen Backing up in singly linked lists. [Citation Graph (0, 0)][DBLP ] J. ACM, 2006, v:53, n:4, pp:681-705 [Journal ] James D. Currie , Holger Petersen , John Michael Robson , Jeffrey Shallit Seperating Words with Small Grammars. [Citation Graph (0, 0)][DBLP ] Journal of Automata, Languages and Combinatorics, 1999, v:4, n:2, pp:101-110 [Journal ] Holger Petersen Prefix Rewriting and Descriptional Complexity. [Citation Graph (0, 0)][DBLP ] Journal of Automata, Languages and Combinatorics, 2000, v:5, n:3, pp:245-254 [Journal ] Holger Petersen The Computation of Partial Recursive Word-Functions Without Read Instructions. [Citation Graph (0, 0)][DBLP ] Math. Log. Q., 1996, v:42, n:, pp:312-318 [Journal ] Amir M. Ben-Amram , Holger Petersen Improved Bounds for Functions Related to Busy Beavers. [Citation Graph (0, 0)][DBLP ] Theory Comput. Syst., 2002, v:35, n:1, pp:1-11 [Journal ] Holger Petersen , John Michael Robson Efficient Simulations by Queue Machines. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2006, v:35, n:5, pp:1059-1069 [Journal ] Holger Austinat , Volker Diekert , Ulrich Hertrampf , Holger Petersen Regular frequency computations. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:330, n:1, pp:15-21 [Journal ] Matthias Jantzen , Holger Petersen Cancellation in Context-Free Languages: Enrichment by Reduction. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1994, v:127, n:1, pp:149-170 [Journal ] Joseph Ó Ruanaidh , Holger Petersen , Alexander Herrigel , Shelby Pereira , Thierry Pun Cryptographic Copyright Protection for Digital Images Based on Watermarking Techniques. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:117-142 [Journal ] Simulations by Time-Bounded Counter Machines. [Citation Graph (, )][DBLP ] Element Distinctness and Sorting on One-Tape Off-Line Turing Machines. [Citation Graph (, )][DBLP ] Improved Bounds for Range Mode and Range Median Queries. [Citation Graph (, )][DBLP ] Sorting and Element Distinctness on One-Way Turing Machines. [Citation Graph (, )][DBLP ] Search in 0.123secs, Finished in 0.124secs