Search the dblp DataBase
Günter Müller :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Günter Müller Current Trends in Distributed Systems. [Citation Graph (0, 0)][DBLP ] New Results and New Trends in Computer Science, 1991, pp:204-224 [Conf ] Sven Wohlgemuth , Günter Müller Privacy with Delegation of Rights by Identity Management. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:175-190 [Conf ] Günter Müller Einführung. [Citation Graph (0, 0)][DBLP ] Informatik cui bono?, 1992, pp:144-144 [Conf ] Torsten Eymann , Günter Müller Decentralized Electronic Markets - Economic Coordination of Multi-Agent Systems. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 2001, pp:981-990 [Conf ] Günter Müller , Sven Wohlgemuth Sichere IT-Systeme. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2003, pp:87-90 [Conf ] Detlef Schoder , Thomas Hummel , Günter Müller Interdisziplinäre Modelle für Entwurf und Einsatz telematischer Systeme: Grundsätzliche Probleme diskutiert am Beispiel des "Freiburger Schichtenmodells der Telematik". [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1997, pp:277-286 [Conf ] Günter Müller ENC - IBM European Networking Center. [Citation Graph (0, 0)][DBLP ] Networking in Open Systems, 1986, pp:437-440 [Conf ] Ralf E. Strauss , Detlef Schoder , Günter Müller Wired cities - opportunities for small and medium sized cities on the information highway. [Citation Graph (0, 0)][DBLP ] IFIP World Conference on IT Tools, 1996, pp:3-10 [Conf ] Alf Zugenmaier , Michael Kreuzer , Günter Müller The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP ] KiVS Kurzbeiträge, 2003, pp:131-141 [Conf ] Stefan Sackmann , Torsten Eymann , Günter Müller EMIKA - Real-Time Controlled Mobile Information Systems in Health Care Applications. [Citation Graph (0, 0)][DBLP ] Mobile Computing in Medicine, 2002, pp:151-158 [Conf ] Günter Müller , Torsten Eymann , Norbert Nopper , Sven Seuken EMIKA system: architecture and prototypic realization. [Citation Graph (0, 0)][DBLP ] SMC (6), 2004, pp:5621-5626 [Conf ] Jens Strüker , Stefan Sackmann , Günter Müller Case Study on Retail Customer Communication Applying Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] CEC, 2004, pp:42-48 [Conf ] Günter Müller Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:28-31 [Journal ] Günter Müller , Kai Rannenberg Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm. [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 1999, v:14, n:1, pp:46-48 [Journal ] Gerti Kappel , Günter Müller , Franz Schober Themenheft: Electronic Commerce - Editorial. [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 2000, v:15, n:4, pp:181- [Journal ] Detlef Schoder , Günter Müller Potentiale und Hürden des Electronic Commerce: Eine Momentaufnahme. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 1999, v:22, n:4, pp:252-260 [Journal ] Sven Wohlgemuth , Daniela Gerd tom Markotten , Uwe Jendricke , Günter Müller DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik". [Citation Graph (0, 0)][DBLP ] it - Information Technology, 2003, v:45, n:1, pp:46-54 [Journal ] Torsten Eymann , Stefan Sackmann , Günter Müller Hayeks Katallaxie - Ein zukunftsweisendes Konzept für die Wirtschaftsinformatik? [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 2003, v:45, n:5, pp:491-496 [Journal ] Günter Müller Vernetzte kleine und mittlere Unternhemen. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 1999, v:41, n:4, pp:305-306 [Journal ] Günter Müller , Daniela Gerd tom Markotten Sicherheit in der Kommunikations- und Informationstechnik. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 2000, v:42, n:6, pp:487-488 [Journal ] Günter Müller , Kevin S. McCurley Interview. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 2000, v:42, n:6, pp:547-549 [Journal ] On Information Flow Forensics in Business Application Scenarios. [Citation Graph (, )][DBLP ] On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking. [Citation Graph (, )][DBLP ] Vorwort: IT-Risikomangement: IT-Projekte und IT-Compliance. [Citation Graph (, )][DBLP ] On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs