The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Klaus Kursawe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
    Asynchronous verifiable secret sharing and proactive cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:88-97 [Conf]
  2. Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble
    Secure Data Management in Trusted Computing. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:324-338 [Conf]
  3. Mina Deng, Lothar Fritsch, Klaus Kursawe
    Personal Rights Management- Enabling Privacy Rights in Digital Online Content. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:266-268 [Conf]
  4. Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
    Secure and Efficient Asynchronous Broadcast Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:524-541 [Conf]
  5. Felix C. Gärtner, Klaus Kursawe, Levente Buttyán
    PoDSy 2003: Principles of Dependable Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:763- [Conf]
  6. Klaus Kursawe, Gregory Neven, Pim Tuyls
    Private Policy Negotiation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:81-95 [Conf]
  7. Klaus Kursawe, Victor Shoup
    Optimistic Asynchronous Atomic Broadcast. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:204-215 [Conf]
  8. Mina Deng, Lothar Fritsch, Klaus Kursawe
    Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:172-189 [Conf]
  9. Christian Cachin, Klaus Kursawe, Victor Shoup
    Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 2000, pp:123-132 [Conf]
  10. Susanne Albers, Klaus Kursawe, Sven Schuierer
    Exploring Unknown Environments with Obstacles. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:842-843 [Conf]
  11. Klaus Kursawe
    Optimistic Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    SRDS, 2002, pp:262-267 [Conf]
  12. Klaus Kursawe
    Optimistic Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    SRDS, 2002, pp:352-357 [Conf]
  13. Susanne Albers, Klaus Kursawe, Sven Schuierer
    Exploring Unknown Environments with Obstacles. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:32, n:1, pp:123-143 [Journal]
  14. Felix C. Gärtner, Levente Buttyán, Klaus Kursawe
    Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:9, pp:- [Journal]
  15. Christian Cachin, Klaus Kursawe, Victor Shoup
    Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:3, pp:219-246 [Journal]

  16. Flexible muTPMs through disembedding. [Citation Graph (, )][DBLP]


  17. Graceful infringement reactions in DRM systems. [Citation Graph (, )][DBLP]


  18. Revocation of TPM Keys. [Citation Graph (, )][DBLP]


  19. Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]


  20. Security in Next Generation Consumer Electronic Devices. [Citation Graph (, )][DBLP]


  21. Trust in Consumer Electronics. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002