IT-Sicherheitsinfrastrukturen im Kontext wirtschaftlicher Anforderungen | 1 | 0.37 | 2002 |
Secure Internet Phone | 0 | 0.34 | 2001 |
Editorial: Chipkarten. | 0 | 0.34 | 1997 |
Cryptanalysis of a voting scheme | 1 | 0.77 | 1996 |
On the Risk of Disruption in Several Multiparty Signature Schemes | 47 | 3.42 | 1996 |
Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme | 43 | 4.58 | 1996 |
Why the Kuperee authentication system fails | 1 | 0.37 | 1996 |
A new approach for delegation using hierarchical delegation tokens | 16 | 1.97 | 1996 |
Communications and Multimedia Security II, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996 | 27 | 11.44 | 1996 |
Breaking and repairing a convertible undeniable signature scheme | 29 | 1.61 | 1996 |
Das Meta-ElGamal Signaturverfahren und seine Anwendungen | 1 | 0.38 | 1995 |
Undetectable on-line password guessing attacks | 132 | 6.78 | 1995 |
Meta-ElGamal signature schemes | 37 | 7.87 | 1994 |
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications | 27 | 3.40 | 1994 |
Ein Sicherheitskonzept für verteilte Systeme | 0 | 0.34 | 1993 |
Sicherheit durch Netzwerktrennung | 0 | 0.34 | 1993 |
Selbstmodifizierende Verbindungsnetzwerke | 0 | 0.34 | 1993 |
Netzwerksicherheit durch selektiven Pakettransport | 1 | 0.39 | 1993 |
Cryptographic Protocols and Network Security | 3 | 2.54 | 1992 |
Protokolle zum Austausch authenischer Schlüssel | 2 | 0.46 | 1991 |
Sichere und authentische Kommunikation in Netzwerken | 0 | 0.34 | 1991 |
Integrität in IT-Systemen | 0 | 0.34 | 1991 |
Die RISC-CISC Debatte | 0 | 0.34 | 1987 |
Cryptography | 3 | 2.16 | 1987 |
Vollständige Reduktionssysteme | 0 | 0.34 | 1983 |