Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Stephan, Werner")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 56

  • Page / 3
Export

Selection :

  • and

Zukunft braucht Kooperation : Ergebnisse der Fragebogenaktion der Sektion IV, Wissenschaftliche Universalbibliotheken, des DBV, 2005 = Future needs cooperation: Results of the questionnaire action of the section IV, scientific universal libraries, the DBV, 2005STEPHAN, Werner; LUDWIG, Sören.Bibliotheksdienst. 2006, Vol 40, Num 5, pp 558-569, issn 0006-1972, 12 p.Article

Security and privacy in pervasive computing state of the art and future directionsHUTTER, Dieter; STEPHAN, Werner; ULLMANN, Markus et al.Lecture notes in computer science. 2004, pp 285-289, issn 0302-9743, isbn 3-540-20887-9, 5 p.Conference Paper

Applied formal methods - FM-Trends 98 (Boppard, 7-9 October 1998)Hutter, Dieter; Stephan, Werner; Traverso, Paolo et al.Lecture notes in computer science. 1999, issn 0302-9743, isbn 3-540-66462-9, XI, 376 p, isbn 3-540-66462-9Conference Proceedings

Security in pervasive computing (Boppard, 12-14 March 2003, revised papers)Hutter, Dieter; Muller, Günter; Stephan, Werner et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-20887-9, XI, 289 p, isbn 3-540-20887-9Conference Proceedings

Formal methods for security : Lightweight plug-in or new engineering disciplineSTEPHAN, Werner.Lecture notes in computer science. 2006, pp 587-591, issn 0302-9743, isbn 3-540-37215-6, 1Vol, 5 p.Conference Paper

Embedding distance-bounding protocols within intuitive interactionsBUSSARD, Laurent; ROUDIER, Yves.Lecture notes in computer science. 2004, pp 143-156, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper

Cyber assist project and its security requirement (Abstract of invited talk)NAKASHIMA, Hideyuki.Lecture notes in computer science. 2004, pp 2-5, issn 0302-9743, isbn 3-540-20887-9, 4 p.Conference Paper

SAOTS: A new efficient server assisted signature scheme for pervasive computingBICAKCI, Kemal; BAYKAL, Nazife.Lecture notes in computer science. 2004, pp 187-200, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper

A Symbolic model checker for ACTLFANTECHI, A; GNESI, S; MAZZANTI, F et al.Lecture notes in computer science. 1999, pp 228-242, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Formal methods in the specification of the Emergency Closing System of the Eastern Scheldt Storm Surge barrierVAN DER MEULEN, M; CLEMENT, T.Lecture notes in computer science. 1999, pp 296-301, issn 0302-9743, isbn 3-540-66462-9Conference Paper

The IFAD VDM tools : Lightweight formal methodsAGERHOLM, S; LARSEN, P. G.Lecture notes in computer science. 1999, pp 326-329, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Enlisting hardware architecture to thwart malicious code injectionLEE, Ruby B; KARIG, David K; MCGREGOR, John P et al.Lecture notes in computer science. 2004, pp 237-252, issn 0302-9743, isbn 3-540-20887-9, 16 p.Conference Paper

Towards using possibilistic information flow control to design secure multiagent systemsSCHAIRER, Axel.Lecture notes in computer science. 2004, pp 101-115, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper

Trust context spaces: An infrastructure for pervasive security in context-aware environmentsROBINSON, Philip; BEIGL, Michael.Lecture notes in computer science. 2004, pp 157-172, issn 0302-9743, isbn 3-540-20887-9, 16 p.Conference Paper

High level system design and analysis using abstract state machinesBÖRGER, E.Lecture notes in computer science. 1999, pp 1-43, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Flexible and reliable process model properties : An integrated approachMARGARIA, T; GRUHN, V.Lecture notes in computer science. 1999, pp 213-227, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Overview over the projectSLOTOSCH, O.Lecture notes in computer science. 1999, pp 346-350, issn 0302-9743, isbn 3-540-66462-9Conference Paper

A practical hierarchical design by timed simulation relations for real-time systemsYAMANE, S.Lecture notes in computer science. 1999, pp 151-167, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Z/EVES version 1.5 : An overviewCANADA, O.Lecture notes in computer science. 1999, pp 367-376, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Protecting security policies in ubiquitous environments using one-way functionsKVARNSTRÖM, Hakan; HEDBOM, Hans; JONSSON, Erland et al.Lecture notes in computer science. 2004, pp 71-85, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper

Security and privacy aspects of low-cost radio frequency identification systemsWEIS, Stephen A; SARMA, Sanjay E; RIVEST, Ronald L et al.Lecture notes in computer science. 2004, pp 201-212, issn 0302-9743, isbn 3-540-20887-9, 12 p.Conference Paper

Formal program development in geometric modelingPUITG, F; DUFOURD, J.-F.Lecture notes in computer science. 1999, pp 62-76, issn 0302-9743, isbn 3-540-66462-9Conference Paper

A lightweight approach to formal methodsAGERHOLM, S; LARSEN, P. G.Lecture notes in computer science. 1999, pp 168-183, issn 0302-9743, isbn 3-540-66462-9Conference Paper

UniForM perspectives for formal methodsKRIEG-BRÜCKNER, B.Lecture notes in computer science. 1999, pp 251-265, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Optimized RISC architecture for multiple-precision modular arithmeticGROSSSCHÄDL, Johann; KAMENDJE, Guy-Armand.Lecture notes in computer science. 2004, pp 253-270, issn 0302-9743, isbn 3-540-20887-9, 18 p.Conference Paper

  • Page / 3