The SCEAS System
Navigation Menu

Search the dblp DataBase


Günter Müller: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Günter Müller
    Current Trends in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    New Results and New Trends in Computer Science, 1991, pp:204-224 [Conf]
  2. Sven Wohlgemuth, Günter Müller
    Privacy with Delegation of Rights by Identity Management. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:175-190 [Conf]
  3. Günter Müller
    Einführung. [Citation Graph (0, 0)][DBLP]
    Informatik cui bono?, 1992, pp:144-144 [Conf]
  4. Torsten Eymann, Günter Müller
    Decentralized Electronic Markets - Economic Coordination of Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2001, pp:981-990 [Conf]
  5. Günter Müller, Sven Wohlgemuth
    Sichere IT-Systeme. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2003, pp:87-90 [Conf]
  6. Detlef Schoder, Thomas Hummel, Günter Müller
    Interdisziplinäre Modelle für Entwurf und Einsatz telematischer Systeme: Grundsätzliche Probleme diskutiert am Beispiel des "Freiburger Schichtenmodells der Telematik". [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1997, pp:277-286 [Conf]
  7. Günter Müller
    ENC - IBM European Networking Center. [Citation Graph (0, 0)][DBLP]
    Networking in Open Systems, 1986, pp:437-440 [Conf]
  8. Ralf E. Strauss, Detlef Schoder, Günter Müller
    Wired cities - opportunities for small and medium sized cities on the information highway. [Citation Graph (0, 0)][DBLP]
    IFIP World Conference on IT Tools, 1996, pp:3-10 [Conf]
  9. Alf Zugenmaier, Michael Kreuzer, Günter Müller
    The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP]
    KiVS Kurzbeiträge, 2003, pp:131-141 [Conf]
  10. Stefan Sackmann, Torsten Eymann, Günter Müller
    EMIKA - Real-Time Controlled Mobile Information Systems in Health Care Applications. [Citation Graph (0, 0)][DBLP]
    Mobile Computing in Medicine, 2002, pp:151-158 [Conf]
  11. Günter Müller, Torsten Eymann, Norbert Nopper, Sven Seuken
    EMIKA system: architecture and prototypic realization. [Citation Graph (0, 0)][DBLP]
    SMC (6), 2004, pp:5621-5626 [Conf]
  12. Jens Strüker, Stefan Sackmann, Günter Müller
    Case Study on Retail Customer Communication Applying Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:42-48 [Conf]
  13. Günter Müller
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:9, pp:28-31 [Journal]
  14. Günter Müller, Kai Rannenberg
    Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1999, v:14, n:1, pp:46-48 [Journal]
  15. Gerti Kappel, Günter Müller, Franz Schober
    Themenheft: Electronic Commerce - Editorial. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 2000, v:15, n:4, pp:181- [Journal]
  16. Detlef Schoder, Günter Müller
    Potentiale und Hürden des Electronic Commerce: Eine Momentaufnahme. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1999, v:22, n:4, pp:252-260 [Journal]
  17. Sven Wohlgemuth, Daniela Gerd tom Markotten, Uwe Jendricke, Günter Müller
    DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik". [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2003, v:45, n:1, pp:46-54 [Journal]
  18. Torsten Eymann, Stefan Sackmann, Günter Müller
    Hayeks Katallaxie - Ein zukunftsweisendes Konzept für die Wirtschaftsinformatik? [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 2003, v:45, n:5, pp:491-496 [Journal]
  19. Günter Müller
    Vernetzte kleine und mittlere Unternhemen. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1999, v:41, n:4, pp:305-306 [Journal]
  20. Günter Müller, Daniela Gerd tom Markotten
    Sicherheit in der Kommunikations- und Informationstechnik. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 2000, v:42, n:6, pp:487-488 [Journal]
  21. Günter Müller, Kevin S. McCurley
    Interview. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 2000, v:42, n:6, pp:547-549 [Journal]

  22. On Information Flow Forensics in Business Application Scenarios. [Citation Graph (, )][DBLP]

  23. On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking. [Citation Graph (, )][DBLP]

  24. Vorwort: IT-Risikomangement: IT-Projekte und IT-Compliance. [Citation Graph (, )][DBLP]

  25. On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002