The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Holger Petersen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Patrick Horster, Markus Michels, Holger Petersen
    Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:224-237 [Conf]
  2. Patrick Horster, Holger Petersen, Markus Michels
    Meta-ElGamal Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:96-107 [Conf]
  3. Markus Michels, Holger Petersen, Patrick Horster
    Breaking and Repairing a Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:148-152 [Conf]
  4. Yun Ding, Patrick Horster, Holger Petersen
    A New Approach for Delegation Using Hierarchical Delegation Tokens. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:128-143 [Conf]
  5. Holger Petersen
    Stacks versus Deques. [Citation Graph (0, 0)][DBLP]
    COCOON, 2001, pp:218-227 [Conf]
  6. Matthias Jantzen, Manfred Kudlek, Klaus-Jörn Lange, Holger Petersen
    Dyck1-Reductions of Context-free Languages. [Citation Graph (0, 0)][DBLP]
    FCT, 1987, pp:218-227 [Conf]
  7. Amir M. Ben-Amram, Holger Petersen
    CONS-Free Programs with Tree Input (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICALP, 1998, pp:271-282 [Conf]
  8. Holger Petersen, John Michael Robson
    Efficient Simulations by Queue Machines. [Citation Graph (0, 0)][DBLP]
    ICALP, 1998, pp:884-895 [Conf]
  9. Alexander Herrigel, Joseph Ó Ruanaidh, Holger Petersen, Shelby Pereira, Thierry Pun
    Secure Copyright Protection Techniques for Digital Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:169-190 [Conf]
  10. Holger Petersen
    Separation Results for Rebound Automata. [Citation Graph (0, 0)][DBLP]
    MFCS, 2000, pp:589-598 [Conf]
  11. Holger Petersen
    Homomorphic Images os Sentential Forms and Terminating Grammars (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    MFCS, 1997, pp:448-457 [Conf]
  12. Holger Petersen
    The Head Hierarchy for Oblivious Finite Automata with Polynomial Advice Collapses. [Citation Graph (0, 0)][DBLP]
    MFCS, 1998, pp:296-304 [Conf]
  13. Holger Petersen
    Fooling Rebound Automata. [Citation Graph (0, 0)][DBLP]
    MFCS, 1999, pp:241-250 [Conf]
  14. Holger Petersen
    How to Convert any Digital Signature Scheme into a Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:177-190 [Conf]
  15. Holger Petersen, Markus Michels
    On Signature Schemes with Threshold Verification Detecting Malicious Verifiers. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:67-78 [Conf]
  16. Matthias Jantzen, Holger Petersen
    Cancellation on Context-Free Languages: Enrichment by Reduction. [Citation Graph (0, 0)][DBLP]
    STACS, 1993, pp:206-215 [Conf]
  17. Holger Petersen
    The Membership Problem for Regular Expressions with Intersection Is Complete in LOGCFL. [Citation Graph (0, 0)][DBLP]
    STACS, 2002, pp:513-522 [Conf]
  18. Amir M. Ben-Amram, Holger Petersen
    Backing Up in Singly Linked Lists. [Citation Graph (0, 0)][DBLP]
    STOC, 1999, pp:780-786 [Conf]
  19. Patrick Horster, Markus Michels, Holger Petersen
    Das Meta-ElGamal Signaturverfahren und seine Anwendungen. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:207-0 [Conf]
  20. Amir M. Ben-Amram, Omer Berkman, Holger Petersen
    Element distinctness on one-tape Turing machines: a complete solution. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 2003, v:40, n:2, pp:81-94 [Journal]
  21. Markus Michels, David Naccache, Holger Petersen
    GOST 34.10 - A brief overview of Russia's DSA. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:8, pp:725-732 [Journal]
  22. Ingmar Camphausen, Holger Petersen, Claus Stark
    Konzepte zum Root-CA Zertifikatswechsel. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:2, pp:- [Journal]
  23. Dörte Neundorf, Holger Petersen
    Information Security Management - Vom Prozess zur Umsetzung. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:4, pp:- [Journal]
  24. Holger Petersen
    Privilege Management Infrastructure - PMI. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 1999, v:23, n:4, pp:- [Journal]
  25. Katsushi Inoue, Akira Ito, Takashi Kamiura, Holger Petersen, Lan Zhang
    A Note On Rebound Turing Machines. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2004, v:15, n:5, pp:791-807 [Journal]
  26. Anca Muscholl, Holger Petersen
    A Note on the Commutative Closure of Star-Free Languages. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:57, n:2, pp:71-74 [Journal]
  27. Holger Petersen
    Bounds for the Element Distinctness Problem on one-tape Turing machines. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:81, n:2, pp:75-79 [Journal]
  28. Amir M. Ben-Amram, Holger Petersen
    Backing up in singly linked lists. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2006, v:53, n:4, pp:681-705 [Journal]
  29. James D. Currie, Holger Petersen, John Michael Robson, Jeffrey Shallit
    Seperating Words with Small Grammars. [Citation Graph (0, 0)][DBLP]
    Journal of Automata, Languages and Combinatorics, 1999, v:4, n:2, pp:101-110 [Journal]
  30. Holger Petersen
    Prefix Rewriting and Descriptional Complexity. [Citation Graph (0, 0)][DBLP]
    Journal of Automata, Languages and Combinatorics, 2000, v:5, n:3, pp:245-254 [Journal]
  31. Holger Petersen
    The Computation of Partial Recursive Word-Functions Without Read Instructions. [Citation Graph (0, 0)][DBLP]
    Math. Log. Q., 1996, v:42, n:, pp:312-318 [Journal]
  32. Amir M. Ben-Amram, Holger Petersen
    Improved Bounds for Functions Related to Busy Beavers. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 2002, v:35, n:1, pp:1-11 [Journal]
  33. Holger Petersen, John Michael Robson
    Efficient Simulations by Queue Machines. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2006, v:35, n:5, pp:1059-1069 [Journal]
  34. Holger Austinat, Volker Diekert, Ulrich Hertrampf, Holger Petersen
    Regular frequency computations. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:330, n:1, pp:15-21 [Journal]
  35. Matthias Jantzen, Holger Petersen
    Cancellation in Context-Free Languages: Enrichment by Reduction. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1994, v:127, n:1, pp:149-170 [Journal]
  36. Joseph Ó Ruanaidh, Holger Petersen, Alexander Herrigel, Shelby Pereira, Thierry Pun
    Cryptographic Copyright Protection for Digital Images Based on Watermarking Techniques. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:117-142 [Journal]

  37. Simulations by Time-Bounded Counter Machines. [Citation Graph (, )][DBLP]


  38. Element Distinctness and Sorting on One-Tape Off-Line Turing Machines. [Citation Graph (, )][DBLP]


  39. Improved Bounds for Range Mode and Range Median Queries. [Citation Graph (, )][DBLP]


  40. Sorting and Element Distinctness on One-Way Turing Machines. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002