TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Jump to: German | English
Number of items: 13.

German

Stibor, T. ; Timmis, J. ; Eckert, C. (2006):
Generalization Regions in Hamming Negative Selection.
In: Intelligent information processing and web mining : proceedings of the International IIS:IIPWM '06 Conference held in Ustron, Poland, June 19 - 22, 2006 / Mieczyslaw A. Klopotek ... (ed.). - Berlin [u.a.] : Springer, 2006, S. 447-456 (Advances in soft com, Berlin [u.a.], Springer, [Book Section]

Röder, P. ; Stumpf, F. ; Grewe, R. ; Eckert, C. (2006):
Hades - Hardware Assisted Document Security.
In: Proceedings of the Second Workshop on Advances in Trusted Computing, WATC ', Tokyo, Japan, Tokyo, Japan, [Conference or Workshop Item]

Stibor, T. ; Timmis, J. ; Eckert, C. (2006):
On Permutation Masks in Hamming Negative Selection.
In: Artificial immune systems : 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4 - 6, 2006; proceedings / Hugues Bersini ... (eds.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 122-135 (Lecture notes in computer science ; 4163) I, Berlin ; Heidelberg [u.a.], Springer, [Book Section]

Prasad, A. R. ; Laganier, J. ; Zugenmaier, A. ; Schoo, P. ; Bayarou, K. M. ; Eckert, C. ; Marx, R. ; Mattheß, M. ; Ritscher, M. (2006):
Secure Mobility in Beyond 3G.
In: Wireless Personal Multimedia Communications WPMC 2006 <San Diego>. - 2006, WPMC, San Diego, San Diego, [Conference or Workshop Item]

English

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4), pp. 803-819. Korean Mathematical Society, ISSN 1015-8634,
DOI: 10.4134/BKMS.2009.46.4.803,
[Article]

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: Lecture Notes in Computer Science, 5461, In: Information Security and Cryptology - ICISC 2008, pp. 20-36,
Springer, 11th International Conference on lnformation Security and Cryptology (ICISC 2008), Seoul, South Korea, 03.-05.12.2008, ISBN 978-3-642-00729-3,
DOI: 10.1007/978-3-642-00730-9_2,
[Conference or Workshop Item]

Marx, R. ; Bayarou, K. M. ; Eckert, C. ; Mattheß, M. ; Ritscher, M. ; Laganier, J. ; Prasad, A. R. ; Schoo, P. ; Zugenmaier, A. (2006):
Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN Handover.
In: WPMC 2006 : 9th International Symposium on Wireless Personal Multimedia Communications,
San Diego, WPMC 2006, San Diego, September 17 - 20, 2006, [Conference or Workshop Item]

Stibor, T. ; Timmis, J. ; Eckert, C. (2006):
Artificial Immune Systems for IT-Security.
In: it - Information Technology, 48 (3), pp. 168-173. De Gruyter, e-ISSN 2196-7032,
DOI: 10.1524/itit.2006.48.3.168,
[Article]

Röder, P. ; Tafreschi, Omid ; Müller, C. ; Eckert, C. (2006):
History-based Access Control and Information Flow Control for Structured Documents.
In: IWSEC 2006 <Kyoto, Japan,2006>, [Conference or Workshop Item]

Stibor, T. ; Timmis, J. ; Eckert, C. (2006):
The Link between r-contiguous Detectors and k-CNF Satisfiability.
In: 2006 IEEE Congress on Evolutionary Computation : Vancouver, BC, Canada, 16 - 21 July 2006 ISBN: 0-7803-9487-9, [Conference or Workshop Item]

Stibor, T. ; Timmis, J. ; Eckert, C. (2006):
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions.
In: Artificial immune systems : 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4 - 6, 2006; proceedings / Hugues Bersini ... (eds.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 215-228 (Lecture notes in computer science ; 4163) I, Berlin ; Heidelberg [u.a.], Springer, [Conference or Workshop Item]

Stumpf, F. ; Tafreschi, Omid ; Röder, P. ; Eckert, C. (2006):
A Robust Integrity Reporting Protocol for Remote Attestation.
In: WATC '06 Fall <Tokyo, Japan,2006> ; Proceedings of the Second Workshop on Advances in Trusted Computing, [Conference or Workshop Item]

Blees, Volker ; Eckert, C. (2002):
Verkehrsüberwachung und Verkehrsplanung = Traffic surveillance and transport planning : Potenziale für Synergien.
In: Straßenverkehrstechnik, 46, pp. 361-365. [Article]

This list was generated on Tue Sep 28 02:19:49 2021 CEST.