Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Ullmann, Markus")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 69

  • Page / 3
Export

Selection :

  • and

SPC 2005 : security in pervasive computing (Boppard, 6-8 April 2005)Hutter, Dieter; Ullmann, Markus.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25521-4, XI, 238 p, isbn 3-540-25521-4Conference Proceedings

Security in pervasive computing (Boppard, 12-14 March 2003, revised papers)Hutter, Dieter; Muller, Günter; Stephan, Werner et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-20887-9, XI, 289 p, isbn 3-540-20887-9Conference Proceedings

Applied formal methods - FM-Trends 98 (Boppard, 7-9 October 1998)Hutter, Dieter; Stephan, Werner; Traverso, Paolo et al.Lecture notes in computer science. 1999, issn 0302-9743, isbn 3-540-66462-9, XI, 376 p, isbn 3-540-66462-9Conference Proceedings

Safeguards in a world of ambient intelligence : Outline of a research agenda on the european levelFRIEDEWALD, Michael.Lecture notes in computer science. 2005, pp 63-69, issn 0302-9743, isbn 3-540-25521-4, 7 p.Conference Paper

Efficient cooperative signatures : A novel authentication scheme for sensor networksSEYS, Stefaan; PRENEEL, Bart.Lecture notes in computer science. 2005, pp 86-100, issn 0302-9743, isbn 3-540-25521-4, 15 p.Conference Paper

Ephemeral pairing on anonymous networksHOEPMAN, Jaap-Henk.Lecture notes in computer science. 2005, pp 101-116, issn 0302-9743, isbn 3-540-25521-4, 16 p.Conference Paper

On the anonymity of periodic location samplesGRUTESER, Marco; HOH, Baik.Lecture notes in computer science. 2005, pp 179-192, issn 0302-9743, isbn 3-540-25521-4, 14 p.Conference Paper

Security and privacy in pervasive computing state of the art and future directionsHUTTER, Dieter; STEPHAN, Werner; ULLMANN, Markus et al.Lecture notes in computer science. 2004, pp 285-289, issn 0302-9743, isbn 3-540-20887-9, 5 p.Conference Paper

A theorem proving approach to analysis of secure information flowDARVAS, Adam; HÄHNLE, Reiner; SANDS, David et al.Lecture notes in computer science. 2005, pp 193-209, issn 0302-9743, isbn 3-540-25521-4, 17 p.Conference Paper

Towards using possibilistic information flow control to design secure multiagent systemsSCHAIRER, Axel.Lecture notes in computer science. 2004, pp 101-115, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper

High level system design and analysis using abstract state machinesBÖRGER, E.Lecture notes in computer science. 1999, pp 1-43, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Look who's talking : Authenticating service access pointsHOHL, Adolf; LOWIS, Lutz; ZUGENMAIER, Alf et al.Lecture notes in computer science. 2005, pp 151-162, issn 0302-9743, isbn 3-540-25521-4, 12 p.Conference Paper

An efficient access control model for mobile ad-hoc communitiesSYE LOONG KEOH; LUPU, Emil.Lecture notes in computer science. 2005, pp 210-224, issn 0302-9743, isbn 3-540-25521-4, 15 p.Conference Paper

Security issues for pervasive personalized communication systemsKLEIN, Bertin; MILLER, Tristan; ZILLES, Sandra et al.Lecture notes in computer science. 2005, pp 56-62, issn 0302-9743, isbn 3-540-25521-4, 7 p.Conference Paper

Overview over the projectSLOTOSCH, O.Lecture notes in computer science. 1999, pp 346-350, issn 0302-9743, isbn 3-540-66462-9Conference Paper

A practical hierarchical design by timed simulation relations for real-time systemsYAMANE, S.Lecture notes in computer science. 1999, pp 151-167, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Cyber assist project and its security requirement (Abstract of invited talk)NAKASHIMA, Hideyuki.Lecture notes in computer science. 2004, pp 2-5, issn 0302-9743, isbn 3-540-20887-9, 4 p.Conference Paper

Z/EVES version 1.5 : An overviewCANADA, O.Lecture notes in computer science. 1999, pp 367-376, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Implementing a formally verifiable security protocol in Java CardHUBBERS, Engelbert; OOSTDIJK, Martijn; POLL, Erik et al.Lecture notes in computer science. 2004, pp 213-226, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper

Time constraint delegation for P2P data decryptionLI, Tie-Yan.Lecture notes in computer science. 2004, pp 173-186, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper

Critical Systems validation and verification with CSP and FDRGOLDSMITH, M; ZAKIUDDIN, I.Lecture notes in computer science. 1999, pp 243-250, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Automated test set generation for statechartsBOGDANOV, K; HOLCOMBE, M; SINGH, H et al.Lecture notes in computer science. 1999, pp 107-121, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Structured formal verification of a fragment of the IBM S/390 clock chipGESER, A; KUCHLIN, W.Lecture notes in computer science. 1999, pp 92-106, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Towards comprehensive tool support for Abstract State machines : The ASM workbench tool environment and architectureDEL CASTILLO, G.Lecture notes in computer science. 1999, pp 311-325, issn 0302-9743, isbn 3-540-66462-9Conference Paper

Translation validation : From DC+ to CPNUELI, A; SHTRICHMAN, O; SIEGEL, M et al.Lecture notes in computer science. 1999, pp 137-150, issn 0302-9743, isbn 3-540-66462-9Conference Paper

  • Page / 3