The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rüdiger Weis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rüdiger Weis, Stefan Lucks
    The Performance of Modern Block Ciphers in Java. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:125-133 [Conf]
  2. Stefan Lucks, Rüdiger Weis
    How to Make DES-based Smartcards fit for the 21-st Century. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:93-114 [Conf]
  3. Rüdiger Weis, Stefan Lucks
    Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. [Citation Graph (0, 0)][DBLP]
    ECMAST, 1999, pp:456-471 [Conf]
  4. Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks
    Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Streams. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (I), 2000, pp:537-540 [Conf]
  5. Werner Geyer, Rüdiger Weis
    A Secure, Accountable, and Collaborative Whiteboard. [Citation Graph (0, 0)][DBLP]
    IDMS, 1998, pp:3-14 [Conf]
  6. Rüdiger Weis, Jürgen Vogel, Wolfgang Effelsberg, Werner Geyer, Stefan Lucks
    How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    IDMS, 2000, pp:187-198 [Conf]
  7. Rüdiger Weis
    A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:1-10 [Conf]
  8. Rüdiger Weis, Bastiaan Bakker, Stefan Lucks
    Security on Your Hand: Secure Filesystems with a ``Non-Cryptographic'' JAVA-Ring. [Citation Graph (0, 0)][DBLP]
    Java Card Workshop, 2000, pp:151-162 [Conf]
  9. Stefan Lucks, Rüdiger Weis
    How to turn a PIN into an Iron Beam. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:385-396 [Conf]
  10. Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks
    Combining Authentication and Light-Weight Payment for Active Networks. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 2000, pp:453-470 [Conf]
  11. Werner Geyer, Rüdiger Weis
    The design and the security concept of a collaborative whiteboard. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:3, pp:233-241 [Journal]
  12. Stefan Lucks, Rüdiger Weis
    Der DES-Nachfolger Rijndael. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:12, pp:- [Journal]
  13. Stefan Lucks, Rüdiger Weis
    Neue Ergebnisse zur Sicherheit des Verschlüsselungsstandards AES. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2002, v:26, n:12, pp:- [Journal]
  14. Erik Zenner, Rüdiger Weis, Stefan Lucks
    Sicherheit des GSM- Verschlüsselungsstandards A5. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:7, pp:- [Journal]
  15. Rüdiger Weis, Stefan Lucks
    Die dritte AES-Konferenz in New York - Vor der Entscheidung über den DES Nachfolger. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:7, pp:- [Journal]
  16. Rüdiger Weis, Stefan Lucks
    Standardmäßige Wave-LAN Unsicherheit. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2001, v:25, n:11, pp:- [Journal]
  17. Rüdiger Weis, Stefan Lucks
    Advanced Encryption Standard - Verschlüsselungsstandard für das einundzwanzigste Jahrhundert. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 1999, v:23, n:9, pp:- [Journal]
  18. Rüdiger Weis, Stefan Lucks, Andreas Bogk
    Sicherheit von 1024 bit RSA-Schlüsseln gefährdet. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:6, pp:- [Journal]
  19. Rüdiger Weis, Stefan Lucks, Werner Geyer
    Stand der Faktorisierungsforschung. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:3, pp:- [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002