|
Search the dblp DataBase
Peter Schartner:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Franz Kollmann, Peter Schartner
PDA-based Signature Device. [Citation Graph (0, 0)][DBLP] BIOSIG, 2003, pp:61-70 [Conf]
- Martin Schaffer, Peter Schartner
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. [Citation Graph (0, 0)][DBLP] CARDIS, 2006, pp:206-221 [Conf]
- Patrick Horster, Martin Schaffer, Peter Schartner, Dieter Sommer
Secure Internet Phone. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
- Martin Schaffer, Peter Schartner
Video Surveillance: A Distributed Approach to Protect Privacy. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:140-149 [Conf]
- Martin Schaffer, Peter Schartner
Key Escrow with Tree-Based Access Structure. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:454-459 [Conf]
- Peter Schartner, Martin Schaffer
Unique User-Generated Digital Pseudonyms. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:194-205 [Conf]
- Sonja Janisch, Peter Schartner
Internetbanking - Sicherheitsaspekte und Haftungsfragen. [Citation Graph (0, 0)][DBLP] Datenschutz und Datensicherheit, 2002, v:26, n:3, pp:- [Journal]
Security in Quantum Networks as an Optimization Problem. [Citation Graph (, )][DBLP]
Non-interactive Information Reconciliation for Quantum Key Distribution. [Citation Graph (, )][DBLP]
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. [Citation Graph (, )][DBLP]
Secure Resource Sharing in Ad hoc Networks. [Citation Graph (, )][DBLP]
Quantum Coin-Flipping-Based Authentication. [Citation Graph (, )][DBLP]
Practical Traceable Anonymous Identification. [Citation Graph (, )][DBLP]
Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs. [Citation Graph (, )][DBLP]
Efficient Privacy-Enhancing Techniques for Medical Databases. [Citation Graph (, )][DBLP]
How to overcome the 'Trusted Node Model' in Quantum Cryptography. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|