TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 13.

Müller, S. and Katzenbeisser, S. and Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, pp. 803-819, 46, (4), [Article]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: International Conference on lnformation Security and Cryptology (ICISC 2008), [Conference or Workshop Item]

Stibor, T. and Timmis, J. and Eckert, C. (2006):
Artificial Immune Systems for IT-Security. it-Information Technology.
In: Systems Biology and Information Technology, pp. 168-173, 48(3), [Article]

Marx, R. and Bayarou, K. M. and Eckert, C. and Mattheß, M. and Ritscher, M. and Laganier, J. and Prasad, A. R. and Schoo, P. and Zugenmaier, A. (2006):
Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN Handover.
In: Wireless Personal Multimedia Communications, WPMC, [Article]

Stibor, T. and Timmis, J. and Eckert, C. (2006):
Generalization Regions in Hamming Negative Selection.
In: Intelligent information processing and web mining : proceedings of the International IIS:IIPWM '06 Conference held in Ustron, Poland, June 19 - 22, 2006 / Mieczyslaw A. Klopotek ... (ed.). - Berlin [u.a.] : Springer, 2006, S. 447-456 (Advances in soft com, Berlin [u.a.], Springer, [Book Section]

Röder, P. and Stumpf, F. and Grewe, R. and Eckert, C. (2006):
Hades - Hardware Assisted Document Security.
Tokyo, Japan, Tokyo, Japan, In: Proceedings of the Second Workshop on Advances in Trusted Computing, WATC ', [Conference or Workshop Item]

Röder, P. and Tafreschi, Omid and Müller, C. and Eckert, C. (2006):
History-based Access Control and Information Flow Control for Structured Documents.
In: IWSEC 2006 <Kyoto, Japan,2006>, [Conference or Workshop Item]

Stibor, T. and Timmis, J. and Eckert, C. (2006):
The Link between r-contiguous Detectors and k-CNF Satisfiability.
In: 2006 IEEE Congress on Evolutionary Computation : Vancouver, BC, Canada, 16 - 21 July 2006 ISBN: 0-7803-9487-9, [Conference or Workshop Item]

Stibor, T. and Timmis, J. and Eckert, C. (2006):
On Permutation Masks in Hamming Negative Selection.
In: Artificial immune systems : 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4 - 6, 2006; proceedings / Hugues Bersini ... (eds.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 122-135 (Lecture notes in computer science ; 4163) I, Berlin ; Heidelberg [u.a.], Springer, [Book Section]

Stibor, T. and Timmis, J. and Eckert, C. (2006):
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions.
Berlin ; Heidelberg [u.a.], Springer, In: Artificial immune systems : 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4 - 6, 2006; proceedings / Hugues Bersini ... (eds.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 215-228 (Lecture notes in computer science ; 4163) I, [Conference or Workshop Item]

Stumpf, F. and Tafreschi, Omid and Röder, P. and Eckert, C. (2006):
A Robust Integrity Reporting Protocol for Remote Attestation.
In: WATC '06 Fall <Tokyo, Japan,2006> ; Proceedings of the Second Workshop on Advances in Trusted Computing, [Conference or Workshop Item]

Prasad, A. R. and Laganier, J. and Zugenmaier, A. and Schoo, P. and Bayarou, K. M. and Eckert, C. and Marx, R. and Mattheß, M. and Ritscher, M. (2006):
Secure Mobility in Beyond 3G.
San Diego, San Diego, In: Wireless Personal Multimedia Communications WPMC 2006 <San Diego>. - 2006, WPMC, [Conference or Workshop Item]

Blees, Volker and Eckert, C. (2002):
Verkehrsüberwachung und Verkehrsplanung = Traffic surveillance and transport planning : Potenziale für Synergien.
In: Straßenverkehrstechnik, pp. 361-365, 46, [Article]

This list was generated on Tue Oct 22 00:48:28 2019 CEST.