The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter Schartner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Franz Kollmann, Peter Schartner
    PDA-based Signature Device. [Citation Graph (0, 0)][DBLP]
    BIOSIG, 2003, pp:61-70 [Conf]
  2. Martin Schaffer, Peter Schartner
    Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:206-221 [Conf]
  3. Patrick Horster, Martin Schaffer, Peter Schartner, Dieter Sommer
    Secure Internet Phone. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  4. Martin Schaffer, Peter Schartner
    Video Surveillance: A Distributed Approach to Protect Privacy. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:140-149 [Conf]
  5. Martin Schaffer, Peter Schartner
    Key Escrow with Tree-Based Access Structure. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:454-459 [Conf]
  6. Peter Schartner, Martin Schaffer
    Unique User-Generated Digital Pseudonyms. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:194-205 [Conf]
  7. Sonja Janisch, Peter Schartner
    Internetbanking - Sicherheitsaspekte und Haftungsfragen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2002, v:26, n:3, pp:- [Journal]

  8. Security in Quantum Networks as an Optimization Problem. [Citation Graph (, )][DBLP]


  9. Non-interactive Information Reconciliation for Quantum Key Distribution. [Citation Graph (, )][DBLP]


  10. Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. [Citation Graph (, )][DBLP]


  11. Secure Resource Sharing in Ad hoc Networks. [Citation Graph (, )][DBLP]


  12. Quantum Coin-Flipping-Based Authentication. [Citation Graph (, )][DBLP]


  13. Practical Traceable Anonymous Identification. [Citation Graph (, )][DBLP]


  14. Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs. [Citation Graph (, )][DBLP]


  15. Efficient Privacy-Enhancing Techniques for Medical Databases. [Citation Graph (, )][DBLP]


  16. How to overcome the 'Trusted Node Model' in Quantum Cryptography. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002