au.\*:("Muller, Günter")
Results 1 to 25 of 105
Selection :
Let's shift lipid burden—From large to small adipocytesMÜLLER, Günter.European journal of pharmacology. 2011, Vol 656, Num 1-3, pp 1-4, issn 0014-2999, 4 p.Article
Emerging trends in information and communication security (international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006)Müller, Günter.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-34640-6, 1Vol, XX-524 p, isbn 3-540-34640-6Conference Proceedings
Hauptverwaltung der GVS in stuttgart = Principal office building of the GVS in StuttgartMÜLLER, Günter.TAB. Technik am Bau. 2001, Num 5, pp 39-51, issn 0341-2032Article
Control of lipid storage and cell size between adipocytes by vesicle-associated glycosylphosphatidylinositol-anchored proteinsMÜLLER, Günter.Archives of physiology and biochemistry. 2011, Vol 117, Num 1, pp 23-43, issn 1381-3455, 21 p.Article
War Internet die einzige Option? -Welchen Weg soll die Wirtschaftsinformatik gehen? = Was the Internet the Only Option? -Which Way Should Business and Information Systems Engineering Go7MÜLLER, Günter.Wirtschaftsinformatik. 2009, Vol 51, Num 1, pp 53-60, issn 0937-6429, 8 p.Article
Security in pervasive computing (Boppard, 12-14 March 2003, revised papers)Hutter, Dieter; Muller, Günter; Stephan, Werner et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-20887-9, XI, 289 p, isbn 3-540-20887-9Conference Proceedings
Privacy with Delegation of Rights by Identity ManagementWOHLGEMUTH, Sven; MÜLLER, Gunter.Lecture notes in computer science. 2006, pp 175-190, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 16 p.Conference Paper
Towards using possibilistic information flow control to design secure multiagent systemsSCHAIRER, Axel.Lecture notes in computer science. 2004, pp 101-115, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper
Cyber assist project and its security requirement (Abstract of invited talk)NAKASHIMA, Hideyuki.Lecture notes in computer science. 2004, pp 2-5, issn 0302-9743, isbn 3-540-20887-9, 4 p.Conference Paper
An Approach to Mosquito Control : Using the Dominant Attraction of Flowering Tamarix jordanis Trees Against Culex pipiensSCHLEIN, Yosef; MÜLLER, Gunter C.Journal of medical entomology. 2008, Vol 45, Num 3, pp 384-390, issn 0022-2585, 7 p.Article
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management SystemCLAUSS, Sebastian.Lecture notes in computer science. 2006, pp 191-205, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 15 p.Conference Paper
Multilateral Security : Enabling Technologies and Their EvaluationPFITZMANN, Andreas.Lecture notes in computer science. 2006, pp 1-13, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 13 p.Conference Paper
Dynamic Layer-2 VPN Services for Improving Security in the Grid EnvironmentPALMIERI, Francesco.Lecture notes in computer science. 2006, pp 45-59, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 15 p.Conference Paper
Low Latency Anonymous Communication : How Long Are Users Willing to Wait?KÖPSELL, Stefan.Lecture notes in computer science. 2006, pp 221-237, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 17 p.Conference Paper
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer AgeSCHMIDT, Arthur.Lecture notes in computer science. 2006, pp 481-493, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 13 p.Conference Paper
Reliable Keystroke Biometric System Based on a Small Number of Keystroke SamplesCHANG, Woojin.Lecture notes in computer science. 2006, pp 312-320, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 9 p.Conference Paper
Policy-Based Integration of User and Provider-Sided Identity ManagementHOMMEL, Wolfgang.Lecture notes in computer science. 2006, pp 160-174, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 15 p.Conference Paper
Possibilistic Information Flow Control in MAKS and Action RefinementHUTTER, Dieter.Lecture notes in computer science. 2006, pp 268-281, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 14 p.Conference Paper
Sugar questing mosquitoes in arid areas gather on scarce blossoms that can be used for controlMÜLLER, Günter; SCHLEIN, Yosef.International journal for parasitology. 2006, Vol 36, Num 10-11, pp 1077-1080, issn 0020-7519, 4 p.Article
A Comparison of Market Approaches to Software Vulnerability DisclosureBÖHME, Rainer.Lecture notes in computer science. 2006, pp 298-311, issn 0302-9743, isbn 3-540-34640-6, 1Vol, 14 p.Conference Paper
Experimental control of Phlebotomus papatasi by spraying attractive toxic sugar bait (ATSB) on vegetationSCHLEIN, Yosef; MÜLLER, Gunter C.Transactions of the Royal Society of Tropical Medicine and Hygiene. 2010, Vol 104, Num 12, pp 766-771, issn 0035-9203, 6 p.Article
Efficacy of toxic sugar baits against adult cistern-dwelling Anopheles clavigerMÜLLER, Gunter C; SCHLEIN, Yosef.Transactions of the Royal Society of Tropical Medicine and Hygiene. 2008, Vol 102, Num 5, pp 480-484, issn 0035-9203, 5 p.Article
Diurnal resting behavior of adult Culex pipiens in an arid habitat in Israel and possible control measurements with toxic sugar baitsSCHLEIN, Yosef; MÜLLER, Günter C.Acta tropica. 2012, Vol 124, Num 1, pp 48-53, issn 0001-706X, 6 p.Article
Insulin-like and insulin-mimetic molecules and signalling in lower eucaryontesMÜLLER, Günter.Recent research developments in endocrinology. Vol. 1 (2000) ; Part I. Recent research developments in endocrinology. 2000, pp 1-36, isbn 81-86846-60-3, 36 p.Book Chapter
Protecting security policies in ubiquitous environments using one-way functionsKVARNSTRÖM, Hakan; HEDBOM, Hans; JONSSON, Erland et al.Lecture notes in computer science. 2004, pp 71-85, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper