Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Hutter, Dieter")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 83

  • Page / 4
Export

Selection :

  • and

SPC 2005 : security in pervasive computing (Boppard, 6-8 April 2005)Hutter, Dieter; Ullmann, Markus.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25521-4, XI, 238 p, isbn 3-540-25521-4Conference Proceedings

Security in pervasive computing (Boppard, 12-14 March 2003, revised papers)Hutter, Dieter; Muller, Günter; Stephan, Werner et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-20887-9, XI, 289 p, isbn 3-540-20887-9Conference Proceedings

Safeguards in a world of ambient intelligence : Outline of a research agenda on the european levelFRIEDEWALD, Michael.Lecture notes in computer science. 2005, pp 63-69, issn 0302-9743, isbn 3-540-25521-4, 7 p.Conference Paper

Applied formal methods - FM-Trends 98 (Boppard, 7-9 October 1998)Hutter, Dieter; Stephan, Werner; Traverso, Paolo et al.Lecture notes in computer science. 1999, issn 0302-9743, isbn 3-540-66462-9, XI, 376 p, isbn 3-540-66462-9Conference Proceedings

Efficient cooperative signatures : A novel authentication scheme for sensor networksSEYS, Stefaan; PRENEEL, Bart.Lecture notes in computer science. 2005, pp 86-100, issn 0302-9743, isbn 3-540-25521-4, 15 p.Conference Paper

Ephemeral pairing on anonymous networksHOEPMAN, Jaap-Henk.Lecture notes in computer science. 2005, pp 101-116, issn 0302-9743, isbn 3-540-25521-4, 16 p.Conference Paper

On the anonymity of periodic location samplesGRUTESER, Marco; HOH, Baik.Lecture notes in computer science. 2005, pp 179-192, issn 0302-9743, isbn 3-540-25521-4, 14 p.Conference Paper

Information flow control to secure dynamic web service compositionHUTTER, Dieter; VOLKAMER, Melanie.Lecture notes in computer science. 2006, pp 196-210, issn 0302-9743, isbn 3-540-33376-2, 1Vol, 15 p.Conference Paper

Possibilistic Information Flow Control in MAKS and Action RefinementHUTTER, Dieter.Lecture notes in computer science. 2006, pp 268-281, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 14 p.Conference Paper

Security and privacy in pervasive computing state of the art and future directionsHUTTER, Dieter; STEPHAN, Werner; ULLMANN, Markus et al.Lecture notes in computer science. 2004, pp 285-289, issn 0302-9743, isbn 3-540-20887-9, 5 p.Conference Paper

A theorem proving approach to analysis of secure information flowDARVAS, Adam; HÄHNLE, Reiner; SANDS, David et al.Lecture notes in computer science. 2005, pp 193-209, issn 0302-9743, isbn 3-540-25521-4, 17 p.Conference Paper

Towards using possibilistic information flow control to design secure multiagent systemsSCHAIRER, Axel.Lecture notes in computer science. 2004, pp 101-115, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper

High level system design and analysis using abstract state machinesBÖRGER, E.Lecture notes in computer science. 1999, pp 1-43, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Security issues for pervasive personalized communication systemsKLEIN, Bertin; MILLER, Tristan; ZILLES, Sandra et al.Lecture notes in computer science. 2005, pp 56-62, issn 0302-9743, isbn 3-540-25521-4, 7 p.Conference Paper

Overview over the projectSLOTOSCH, O.Lecture notes in computer science. 1999, pp 346-350, issn 0302-9743, isbn 3-540-66462-9Conference Paper

A practical hierarchical design by timed simulation relations for real-time systemsYAMANE, S.Lecture notes in computer science. 1999, pp 151-167, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Look who's talking : Authenticating service access pointsHOHL, Adolf; LOWIS, Lutz; ZUGENMAIER, Alf et al.Lecture notes in computer science. 2005, pp 151-162, issn 0302-9743, isbn 3-540-25521-4, 12 p.Conference Paper

An efficient access control model for mobile ad-hoc communitiesSYE LOONG KEOH; LUPU, Emil.Lecture notes in computer science. 2005, pp 210-224, issn 0302-9743, isbn 3-540-25521-4, 15 p.Conference Paper

Cyber assist project and its security requirement (Abstract of invited talk)NAKASHIMA, Hideyuki.Lecture notes in computer science. 2004, pp 2-5, issn 0302-9743, isbn 3-540-20887-9, 4 p.Conference Paper

Z/EVES version 1.5 : An overviewCANADA, O.Lecture notes in computer science. 1999, pp 367-376, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Proof transformations for evolutionary formal software developmentSCHAIRER, Axel; HUTTER, Dieter.Lecture notes in computer science. 2002, pp 441-456, issn 0302-9743, isbn 3-540-44144-1, 16 p.Conference Paper

Extending development graphs with hidingMOSSAKOWSKI, Till; AUTEXIER, Serge; HUTTER, Dieter et al.Lecture notes in computer science. 2001, pp 269-283, issn 0302-9743, isbn 3-540-41863-6Conference Paper

On the Use of Word Networks to Mimicry Attack DetectionGODINEZ, Fernando; HUTTER, Dieter; MONROY, Raul et al.Lecture notes in computer science. 2006, pp 423-435, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 13 p.Conference Paper

On the role of information compaction to intrusion detectionGODINEZ, Fernando; HUTTER, Dieter; MONROY, Raul et al.Lecture notes in computer science. 2005, pp 83-97, issn 0302-9743, isbn 3-540-28063-4, 1Vol, 15 p.Conference Paper

Maintenance of formal software developments by stratified verificationAUTEXIER, Serge; HUTTER, Dieter.Lecture notes in computer science. 2002, pp 36-52, issn 0302-9743, isbn 3-540-00010-0, 17 p.Conference Paper

  • Page / 4