default search action
Dieter Gollmann
Person information
- affiliation: Hamburg University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c76]Florian Gondesen, Dieter Gollmann:
CIBA: Continuous Interruption-free Brain Authentication. BIOSIGNALS 2021: 314-319 - 2020
- [e27]Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7 [contents]
2010 – 2019
- 2019
- [p2]Marina Krotofil, Klaus Kursawe, Dieter Gollmann:
Securing Industrial Control Systems. Security and Privacy Trends in the Industrial Internet of Thing 2019: 3-27 - [e26]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - 2018
- [c75]Atefeh Khazaei, Mohammad Ghasemzadeh, Dieter Gollmann:
Overlapping Clustering for Textual Data. ICSCA 2018: 115-118 - [e25]Dieter Gollmann, Jianying Zhou:
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [i8]Xun Yi, Kwok-Yan Lam, Dieter Gollmann:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. IACR Cryptol. ePrint Arch. 2018: 660 (2018) - 2017
- [j26]Assadarat Khurat, Boontawee Suntisrivaraporn, Dieter Gollmann:
Privacy policies verification in composite services using OWL. Comput. Secur. 67: 122-141 (2017) - [c74]Alexander Winnicki, Marina Krotofil, Dieter Gollmann:
Cyber-Physical System Discovery: Reverse Engineering Physical Processes. CPSS@AsiaCCS 2017: 3-14 - [e24]Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi:
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017, ISBN 978-3-319-61203-4 [contents] - [e23]Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10492, Springer 2017, ISBN 978-3-319-66401-9 [contents] - [e22]Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10493, Springer 2017, ISBN 978-3-319-66398-2 [contents] - 2016
- [c73]Dieter Gollmann, Marina Krotofil:
Cyber-Physical Systems Security. The New Codebreakers 2016: 195-204 - 2015
- [c72]Dieter Gollmann, Pavel Gurikov, Alexander Isakov, Marina Krotofil, Jason Larsen, Alexander Winnicki:
Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant. CPSS@ASIACSS 2015: 1-12 - [c71]Marina Krotofil, Jason Larsen, Dieter Gollmann:
The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. AsiaCCS 2015: 133-144 - [e21]Hannes Federrath, Dieter Gollmann:
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 455, Springer 2015, ISBN 978-3-319-18466-1 [contents] - 2014
- [j25]Marina Krotofil, Alvaro A. Cárdenas, Jason Larsen, Dieter Gollmann:
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks. Int. J. Crit. Infrastructure Prot. 7(4): 213-232 (2014) - [j24]William R. Claycomb, Philip A. Legg, Dieter Gollmann:
Guest Editorial: Emerging Trends in Research for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 1-6 (2014) - [c70]Jonas Rinast, Sibylle Schupp, Dieter Gollmann:
A Graph-Based Transformation Reduction to Reach UPPAAL States Faster. FM 2014: 547-562 - [c69]Dieter Gollmann:
Access Control in and Around the Browser. ISPEC 2014: 1-7 - [c68]Xintao Ma, Jonas Rinast, Sibylle Schupp, Dieter Gollmann:
Evaluating On-line Model Checking in UPPAAL-SMC using a Laser Tracheotomy Case Study. MCPS 2014: 100-112 - [c67]Dieter Gollmann:
Why Bother Securing DNS? Security Protocols Workshop 2014: 1-8 - [c66]Dieter Gollmann:
Why Bother Securing DNS? (Transcript of Discussion). Security Protocols Workshop 2014: 9-17 - [i7]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [c65]Marina Krotofil, Dieter Gollmann:
Industrial control systems security: What is happening? INDIN 2013: 664-669 - [c64]Maryna Krotofil, Dieter Gollmann:
Industrial control systems security: What is happening? INDIN 2013: 670-675 - [e20]Hanne Riis Nielson, Dieter Gollmann:
Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Lecture Notes in Computer Science 8208, Springer 2013, ISBN 978-3-642-41487-9 [contents] - [e19]Lorenzo Cavallaro, Dieter Gollmann:
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Lecture Notes in Computer Science 7886, Springer 2013, ISBN 978-3-642-38529-2 [contents] - 2012
- [j23]Dieter Gollmann:
From Insider Threats to Business Processes that are Secure-by-Design. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 4-12 (2012) - [j22]Kouichi Sakurai, Dieter Gollmann:
Managing Insider Security Threats (MIST 2012 Volume 1). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 1-3 (2012) - [c63]Dieter Gollmann:
Security for Cyber-Physical Systems. MEMICS 2012: 12-14 - [c62]Dieter Gollmann:
Veracity, Plausibility, and Reputation. WISTP 2012: 20-28 - [e18]Dieter Gollmann, Felix C. Freiling:
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8 [contents] - [i6]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian W. Probst:
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012) - 2011
- [b5]Dieter Gollmann:
Computer Security (3. ed.). Wiley 2011, ISBN 978-0-470-74115-3, pp. I-XIX, 1-436 - [c61]Dieter Gollmann:
From Access Control to Trust Management, and Back - A Petition. IFIPTM 2011: 1-8 - [c60]Dieter Gollmann:
From Insider Threats to Business Processes that are Secure-by-Design. INCoS 2011: 627 - [c59]Dieter Gollmann, Maryna Krotofil, Harald Sauff:
Rescuing Wireless Sensor Networks Security from Science Fiction. Networking Workshops 2011: 192-206 - [e17]Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8 [contents] - 2010
- [c58]Jan Meier, Dieter Gollmann:
Caught in the Maze of Security Standards. ESORICS 2010: 441-454 - [c57]Dieter Gollmann:
Secure Applications without Secure Infrastructures. MMM-ACNS 2010: 21-31 - [c56]Assadarat Khurat, Dieter Gollmann, Joerg Abendroth:
A Formal P3P Semantics for Composite Services. Secure Data Management 2010: 113-131 - [c55]Jan Meier, Dieter Gollmann:
Caught in the Maze of Security Standards. Security Protocols Workshop 2010: 3 - [c54]Dieter Gollmann:
Caught in the Maze of Security Standards (Transcript of Discussion). Security Protocols Workshop 2010: 4-11 - [p1]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15 - [e16]Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny:
Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings. Lecture Notes in Computer Science 6035, Springer 2010, ISBN 978-3-642-12509-6 [contents] - [e15]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010. Dagstuhl Seminar Proceedings 10341, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [e14]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents] - [i5]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010 - [i4]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010
2000 – 2009
- 2009
- [j21]Meng Ge, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, C. C. Chang, Jian-Bin Li:
A robust certification service for highly dynamic MANET in emergency tasks. Int. J. Commun. Syst. 22(9): 1177-1197 (2009) - 2008
- [b4]Eric R. Cole, Ronald L. Krutz, James W. Conley, Brian Reisman, Mitch Ruebush, Dieter Gollmann:
Network security fundamentals. Wiley pathways, Wiley 2008, ISBN 978-0-470-10192-6, pp. I-XXVIII, 1-524 - [j20]Hong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun:
Efficient Fingercode Classification. IEICE Trans. Inf. Syst. 91-D(5): 1252-1260 (2008) - [j19]Dieter Gollmann:
Editorial. Int. J. Inf. Sec. 7(2): 101 (2008) - [j18]Dieter Gollmann:
Securing Web applications. Inf. Secur. Tech. Rep. 13(1): 1-9 (2008) - [c53]Dieter Gollmann:
Software Security - The Dangers of Abstraction. FIDIS 2008: 1-12 - [c52]Dieter Gollmann:
Problems with Same Origin Policy - Know Thyself. Security Protocols Workshop 2008: 84-85 - [c51]Dieter Gollmann:
Problems with Same Origin Policy (Transcript of Discussion). Security Protocols Workshop 2008: 86-92 - [e13]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Countering Insider Threats, 20.07. - 25.07.2008. Dagstuhl Seminar Proceedings 08302, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [e12]Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis:
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings. Lecture Notes in Computer Science 5019, Springer 2008, ISBN 978-3-540-79965-8 [contents] - [i3]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
08302 Abstracts Collection - Countering Insider Threats. Countering Insider Threats 2008 - [i2]Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann:
08302 Summary - Countering Insider Threats. Countering Insider Threats 2008 - 2007
- [c50]Miranda Mowbray, Dieter Gollmann:
Electing the Doge of Venice: Analysis of a 13th Century Protocol. CSF 2007: 295-310 - [c49]Jens Ove Lauf, Dieter Gollmann, Volker Turau:
MASC - Monitoring and Security of Containers. GI Jahrestagung (1) 2007: 5-10 - [c48]Dieter Gollmann:
Security in Distributed Applications. Lipari Summer School 2007: 254-276 - 2006
- [c47]Audun Jøsang, Dieter Gollmann, Richard Au:
A method for access authorisation through delegation networks. ACSW 2006: 165-174 - [e11]Dieter Gollmann, Jan Meier, Andrei Sabelfeld:
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings. Lecture Notes in Computer Science 4189, Springer 2006, ISBN 3-540-44601-X [contents] - [e10]Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin:
Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4 [contents] - 2005
- [b3]Dieter Gollmann:
Computer Security, Second Edition. Wiley 2005, ISBN 978-0-470-86293-3, pp. I-XI, 1-374 - [c46]Dieter Gollmann:
Protocol Analysis for Concrete Environments. EUROCAST 2005: 365-372 - [c45]Susan Pancho-Festin, Dieter Gollmann:
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Formal Aspects in Security and Trust 2005: 5-15 - [c44]Dieter Gollmann:
Why Trust is Bad for Security. STM 2005: 3-9 - [e9]Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann:
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings. Lecture Notes in Computer Science 3679, Springer 2005, ISBN 3-540-28963-1 [contents] - 2004
- [c43]Dieter Gollmann:
Identity and Location. Security Protocols Workshop 2004: 246-250 - [c42]Dieter Gollmann:
Identity and Location (Transcript of Discussion). Security Protocols Workshop 2004: 251-255 - [e8]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6 [contents] - 2003
- [j17]Dieter Gollmann:
Authentication by correspondence. IEEE J. Sel. Areas Commun. 21(1): 88-95 (2003) - [c41]Dieter Gollmann:
Facets of Security. Global Computing 2003: 192-202 - [e7]Einar Snekkenes, Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings. Lecture Notes in Computer Science 2808, Springer 2003, ISBN 3-540-20300-1 [contents] - [e6]Sihan Qing, Dieter Gollmann, Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5 [contents] - 2002
- [j16]Dieter Gollmann:
Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n. IEEE Trans. Computers 51(5): 588-591 (2002) - [c40]Dieter Gollmann:
Analysing Security Protocols. FASec 2002: 71-80 - [c39]Olivier Markowitch, Dieter Gollmann, Steve Kremer:
On Fairness in Exchange Protocols. ICISC 2002: 451-464 - [e5]Dieter Gollmann, Günter Karjoth, Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2 [contents] - 2001
- [j15]Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto:
Editorial. Int. J. Inf. Sec. 1(1): 1-2 (2001) - [j14]Tuomas Aura, Dieter Gollmann:
Communications security on the internet. Softw. Focus 2(3): 104-111 (2001) - [c38]Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:
Verifiable Identifiers in Middleware Security. ACSAC 2001: 450-459 - [c37]Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:
Cryptography and Middleware Security. ICICS 2001: 408-418 - [c36]Dieter Gollmann:
PIM Security. Security Protocols Workshop 2001: 80-81 - [c35]Dieter Gollmann:
PIM Security (Transcript of Discussion). Security Protocols Workshop 2001: 82-86 - 2000
- [j13]Dieter Gollmann:
New paradigms - old paradigms? Future Gener. Comput. Syst. 16(4): 343-349 (2000) - [c34]Dieter Gollmann:
Mergers and Principals. Security Protocols Workshop 2000: 5-13 - [c33]Dieter Gollmann:
Mergers and Principals (Transcript of Discussion). Security Protocols Workshop 2000: 14-19 - [e4]Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7 [contents]
1990 – 1999
- 1999
- [b2]Dieter Gollmann:
Computer Security. Worlwide series in computer cience, Wiley 1999, ISBN 978-0-471-97844-2, pp. I-XV, 1-320 - [j12]Dieter Gollmann:
Dual Bases and Bit-Serial Multiplication in Fqn. Theor. Comput. Sci. 226(1-2): 45-59 (1999) - [c32]Tuomas Aura, Dieter Gollmann:
Software License Management with Smart Cards. Smartcard 1999 - [c31]Dieter Gollmann:
What Is Authentication? Security Protocols Workshop 1999: 65-72 - [c30]Dieter Gollmann:
On the Verification of Cryptographic Protocols - A Tale of Two Committees. Workshop on Secure Architectures and Information Flow 1999: 42-58 - 1998
- [j11]Dieter Gollmann, Ulrich Lang:
Security in CORBA-based electronic commerce systems. Inf. Secur. Tech. Rep. 3(2): 62-70 (1998) - [c29]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c28]Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 - [c27]Dieter Gollmann:
Insider Fraud (Position Paper). Security Protocols Workshop 1998: 213-219 - [c26]Dieter Gollmann:
Insider Fraud (Transcript of Discussion). Security Protocols Workshop 1998: 220-226 - [e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [j10]Yongfei Han, Chris J. Mitchell, Dieter Gollmann:
A fast modular exponentiation for rsa on systolic arrays. Int. J. Comput. Math. 63(3-4): 215-226 (1997) - [j9]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Authentication Using Minimally Trusted Servers. ACM SIGOPS Oper. Syst. Rev. 31(3): 16-28 (1997) - [c25]Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild:
Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 - [c24]Jianying Zhou, Dieter Gollmann:
An Efficient Non-repudiation Protocol . CSFW 1997: 126-132 - 1996
- [j8]Dieter Gollmann, Yongfei Han, Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptogr. 7(1-2): 135-151 (1996) - [c23]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 - [c22]Jianying Zhou, Dieter Gollmann:
Observations on Non-repudiation. ASIACRYPT 1996: 133-144 - [c21]Willi Geiselmann, Dieter Gollmann:
Correlation Attacks on Cascades of Clock Controlled Shift Registers. ASIACRYPT 1996: 346-359 - [c20]Jianying Zhou, Dieter Gollmann:
Certified Electronic Mail. ESORICS 1996: 160-171 - [c19]Dieter Gollmann:
What do We Mean by Entity Authentication? S&P 1996: 46-54 - [c18]Jianying Zhou, Dieter Gollmann:
A Fair Non-repudiation Protocol. S&P 1996: 55-61 - [c17]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 - [e2]Dieter Gollmann:
Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings. Lecture Notes in Computer Science 1039, Springer 1996, ISBN 3-540-60865-6 [contents] - 1995
- [j7]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers. J. Comput. Secur. 3(4): 255-268 (1995) - [c16]Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos:
Public-key Cryptography on Smart Cards. Cryptography: Policy and Algorithms 1995: 250-269 - [c15]Dieter Gollmann:
Cryptographic APIs. Cryptography: Policy and Algorithms 1995: 290-300 - [c14]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Key distribution without individual trusted authentification servers. CSFW 1995: 30- - [c13]Yongfei Han, Dieter Gollmann, Chris J. Mitchell:
Minimal Weight k-SR Representations. IMACC 1995: 34-43 - 1994
- [j6]Dieter Gollmann:
Error Detecting Circuits: Michael Gössel and Steffen Graf, McGraw-Hill, Maidenhead, UK (1993) ISBN 0 07 707438 6, £35.00, pp 224. Microprocess. Microsystems 18(5): 298-299 (1994) - [e1]Dieter Gollmann:
Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings. Lecture Notes in Computer Science 875, Springer 1994, ISBN 3-540-58618-0 [contents] - 1993
- [j5]Dieter Gollmann, Thomas Beth, Frank Damm:
Authentication services in distributed systems. Comput. Secur. 12(8): 753-764 (1993) - [j4]Willi Geiselmann, Dieter Gollmann:
Self-Dual Bases in Fqn. Des. Codes Cryptogr. 3(4): 333-345 (1993) - [j3]Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John A. McDermid, Dieter Gollmann:
Towards Operational Measures of Computer Security. J. Comput. Secur. 2(2-3): 211-230 (1993) - [c12]Dieter Gollmann:
Cryptanalysis of Clock Controlled Shift Registers. FSE 1993: 121-126 - [c11]Dieter Gollmann:
The MSc in Information Security at Royal Holloway. SEC 1993: 31-36 - 1992
- [c10]Kwok-Yan Lam, Dieter Gollmann:
Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272 - 1990
- [c9]Willi Geiselmann, Dieter Gollmann:
VLSI Design for Exponentiation in GF (2n). AUSCRYPT 1990: 398-405 - [c8]Zong-Duo Dai, Thomas Beth, Dieter Gollmann:
Lower Bounds for the Linear Complexity of Sequences over Residue Rings. EUROCRYPT 1990: 189-195
1980 – 1989
- 1989
- [j2]Thomas Beth, Dieter Gollmann:
Algorithm engineering for public key algorithms. IEEE J. Sel. Areas Commun. 7(4): 458-466 (1989) - [j1]Dieter Gollmann, William G. Chambers:
Clock-controlled shift registers: a review. IEEE J. Sel. Areas Commun. 7(4): 525-533 (1989) - [c7]Thomas Beth, Michael Clausen, Dieter Gollmann:
Computer Algebra and Computer Aided Systems Theory. EUROCAST 1989: 161-169 - [c6]Dieter Gollmann, William G. Chambers:
A Cryptanalysis of Stepk, m-Cascades. EUROCRYPT 1989: 680-687 - 1988
- [c5]Willi Geiselmann, Dieter Gollmann:
Symmetry and Duality in Normal Basis Multiplication. AAECC 1988: 230-238 - [c4]William G. Chambers, Dieter Gollmann:
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. EUROCRYPT 1988: 331-343 - 1987
- [c3]Sibylle Mund, Dieter Gollmann, Thomas Beth:
Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. EUROCRYPT 1987: 25-35 - 1986
- [b1]Dieter Gollmann:
Kaskadenschaltungen taktgesteuerter Schieberegister als Pseudozufallszahlengeneratoren. Johannes Kepler University Linz, Austria, 1986, ISBN 978-3-85369-638-5, pp. 1-77 - [c2]Thomas Beth, B. M. Cook, Dieter Gollmann:
Architectures for Exponentiation in GF(2n). CRYPTO 1986: 302-310 - [i1]Dieter Gollmann:
Linear Complexity of Sequences with Period pn. EUROCRYPT 1986: 33 - 1984
- [c1]Dieter Gollmann:
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. EUROCRYPT 1984: 93-98
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint