The SCEAS System
Navigation Menu

Search the dblp DataBase


Hans-Joachim Knobloch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten
    Verifiable Secret Sharing for Monotone Access Structures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:189-194 [Conf]
  2. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann
    Towards Acceptable Key Escrow Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:51-58 [Conf]
  3. Fritz Bauspieß, Hans-Joachim Knobloch
    How to Keep Authenticity Alive in a Computer Network. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:38-46 [Conf]
  4. Fritz Bauspieß, Hans-Joachim Knobloch, Peer Wichmann
    Inverting the Pseudo Exponentiation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:344-351 [Conf]
  5. Patrick Horster, Hans-Joachim Knobloch
    Discrete Logarithm Based Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:399-408 [Conf]
  6. Hans-Joachim Knobloch
    A Smart Card Implementation of the Fiat-Shamir Identification Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:87-95 [Conf]
  7. Patrick Horster, Hans-Joachim Knobloch
    Sichere und authentische Kommunikation in Netzwerken. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1991, pp:156-165 [Conf]
  8. Patrick Horster, Hans-Joachim Knobloch
    Cryptographic Protocols and Network Security. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:249-263 [Conf]
  9. Patrick Horster, Hans-Joachim Knobloch
    Protokolle zum Austausch authenischer Schlüssel. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:321-328 [Conf]
  10. Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, Steffen Stempel
    TESS: A security system based on discrete exponentiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:466-475 [Journal]
  11. Hans-Joachim Knobloch
    Schwäche im OpenPGP-Standard - Attacke auf die geheimen Schlüssel von PGP-Benutzern. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2001, v:25, n:6, pp:- [Journal]

Search in 0.075secs, Finished in 0.075secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002