Browse by Person
![]() | Up a level |
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009)
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4)
doi: 10.4134/BKMS.2009.46.4.803
Article
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008)
Distributed Attribute-Based Encryption.
11th International Conference on lnformation Security and Cryptology (ICISC 2008). Seoul, South Korea (03.-05.12.2008)
doi: 10.1007/978-3-642-00730-9_2
Conference or Workshop Item
Marx, R. ; Bayarou, K. M. ; Eckert, C. ; Mattheß, M. ; Ritscher, M. ; Laganier, J. ; Prasad, A. R. ; Schoo, P. ; Zugenmaier, A. (2006)
Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN Handover.
WPMC 2006. San Diego (September 17 - 20, 2006)
Conference or Workshop Item
Stibor, T. ; Timmis, J. ; Eckert, C. (2006)
Artificial Immune Systems for IT-Security.
In: it - Information Technology, 48 (3)
doi: 10.1524/itit.2006.48.3.168
Article
Stibor, T. ; Timmis, J. ; Eckert, C. (2006)
Generalization Regions in Hamming Negative Selection.
In: Intelligent information processing and web mining : proceedings of the International IIS:IIPWM '06 Conference held in Ustron, Poland, June 19 - 22, 2006 / Mieczyslaw A. Klopotek ... (ed.). - Berlin [u.a.] : Springer, 2006, S. 447-456 (Advances in soft com
Book Section
Röder, P. ; Stumpf, F. ; Grewe, R. ; Eckert, C. (2006)
Hades - Hardware Assisted Document Security.
Conference or Workshop Item
Röder, P. ; Tafreschi, Omid ; Müller, C. ; Eckert, C. (2006)
History-based Access Control and Information Flow Control for Structured Documents.
Conference or Workshop Item
Stibor, T. ; Timmis, J. ; Eckert, C. (2006)
The Link between r-contiguous Detectors and k-CNF Satisfiability.
Conference or Workshop Item
Stibor, T. ; Timmis, J. ; Eckert, C. (2006)
On Permutation Masks in Hamming Negative Selection.
In: Artificial immune systems : 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4 - 6, 2006; proceedings / Hugues Bersini ... (eds.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 122-135 (Lecture notes in computer science ; 4163) I
Book Section
Stibor, T. ; Timmis, J. ; Eckert, C. (2006)
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions.
Conference or Workshop Item
Stumpf, F. ; Tafreschi, Omid ; Röder, P. ; Eckert, C. (2006)
A Robust Integrity Reporting Protocol for Remote Attestation.
Conference or Workshop Item
Prasad, A. R. ; Laganier, J. ; Zugenmaier, A. ; Schoo, P. ; Bayarou, K. M. ; Eckert, C. ; Marx, R. ; Mattheß, M. ; Ritscher, M. (2006)
Secure Mobility in Beyond 3G.
Conference or Workshop Item
Blees, Volker ; Eckert, C. (2002)
Verkehrsüberwachung und Verkehrsplanung = Traffic surveillance and transport planning : Potenziale für Synergien.
In: Straßenverkehrstechnik, 46
Article