Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Dieter Gollmann
2010 – today
- 2013
[e17]Lorenzo Cavallaro, Dieter Gollmann (Eds.): Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Lecture Notes in Computer Science 7886, Springer 2013, ISBN 978-3-642-38529-2- 2012
[c59]
[c58]
[e16]Dieter Gollmann, Felix C. Freiling (Eds.): Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8
[i1]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian W. Probst: Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012)- 2011
[b2]Dieter Gollmann: Computer Security (3. ed.). Wiley 2011, ISBN 978-0-470-74115-3, pp. I-XIX, 1-436
[c57]
[c56]Dieter Gollmann: From Insider Threats to Business Processes that are Secure-by-Design. INCoS 2011: 627
[c55]Dieter Gollmann, Maryna Krotofil, Harald Sauff: Rescuing Wireless Sensor Networks Security from Science Fiction. Networking Workshops 2011: 192-206
[e15]Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan (Eds.): Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8- 2010
[c54]
[c53]
[c52]Assadarat Khurat, Dieter Gollmann, Joerg Abendroth: A Formal P3P Semantics for Composite Services. Secure Data Management 2010: 113-131
[p1]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop: Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15
[e14]Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny (Eds.): Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings. Lecture Notes in Computer Science 6035, Springer 2010, ISBN 978-3-642-12509-6
[e13]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (Eds.): Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6
2000 – 2009
- 2009
[j18]Meng Ge, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, C. C. Chang, Jian-Bin Li: A robust certification service for highly dynamic MANET in emergency tasks. Int. J. Communication Systems 22(9): 1177-1197 (2009)- 2008
[j17]Hong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008)
[j16]
[j15]
[c51]
[c50]Dieter Gollmann: Problems with Same Origin Policy - Know Thyself. Security Protocols Workshop 2008: 84-85
[c49]Dieter Gollmann: Problems with Same Origin Policy (Transcript of Discussion). Security Protocols Workshop 2008: 86-92
[e12]Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis (Eds.): Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings. Lecture Notes in Computer Science 5019, Springer 2008, ISBN 978-3-540-79965-8- 2007
[c48]Miranda Mowbray, Dieter Gollmann: Electing the Doge of Venice: Analysis of a 13th Century Protocol. CSF 2007: 295-310
[c47]Jens Ove Lauf, Dieter Gollmann, Volker Turau: MASC - Monitoring and Security of Containers. GI Jahrestagung (1) 2007: 5-10
[c46]- 2006
[j14]Dieter Gollmann: Why Trust is Bad for Security. Electr. Notes Theor. Comput. Sci. 157(3): 3-9 (2006)
[c45]Audun Jøsang, Dieter Gollmann, Richard Au: A method for access authorisation through delegation networks. ACSW Frontiers 2006: 165-174
[e11]Dieter Gollmann, Jan Meier, Andrei Sabelfeld (Eds.): Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings. Lecture Notes in Computer Science 4189, Springer 2006, ISBN 3-540-44601-X
[e10]Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin (Eds.): Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4- 2005
[b1]Dieter Gollmann: Computer security (2. ed.). Wiley 2005, ISBN 978-0-470-86293-3, pp. I-XI, 1-374
[c44]
[c43]Susan Pancho-Festin, Dieter Gollmann: On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Formal Aspects in Security and Trust 2005: 5-15
[e9]Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann (Eds.): Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings. Lecture Notes in Computer Science 3679, Springer 2005, ISBN 3-540-28963-1- 2004
[c42]
[c41]Dieter Gollmann: Identity and Location (Transcript of Discussion). Security Protocols Workshop 2004: 251-255
[e8]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva (Eds.): Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6- 2003
[j13]Dieter Gollmann: Authentication by correspondence. IEEE Journal on Selected Areas in Communications 21(1): 88-95 (2003)
[c40]
[e7]Einar Snekkenes, Dieter Gollmann (Eds.): Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings. Lecture Notes in Computer Science 2808, Springer 2003, ISBN 3-540-20300-1
[e6]Sihan Qing, Dieter Gollmann, Jianying Zhou (Eds.): Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5- 2002
[j12]Dieter Gollmann: Equally Spaced Polynomials, Dual Bases, and Multiplication in F2n. IEEE Trans. Computers 51(5): 588-591 (2002)
[c39]
[c38]Olivier Markowitch, Dieter Gollmann, Steve Kremer: On Fairness in Exchange Protocols. ICISC 2002: 451-464
[e5]Dieter Gollmann, Günter Karjoth, Michael Waidner (Eds.): Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2- 2001
[j11]Tuomas Aura, Dieter Gollmann: Communications security on the internet. Software Focus 2(3): 104-111 (2001)
[c37]Ulrich Lang, Dieter Gollmann, Rudolf Schreiner: Verifiable Identifiers in Middleware Security. ACSAC 2001: 450-459
[c36]Ulrich Lang, Dieter Gollmann, Rudolf Schreiner: Cryptography and Middleware Security. ICICS 2001: 408-418
[c35]
[c34]- 2000
[j10]Dieter Gollmann: On the Verification of Cryptographic Protocols - A Tale of Two Committees. Electr. Notes Theor. Comput. Sci. 32: 42-58 (2000)
[j9]
[c33]
[c32]Dieter Gollmann: Mergers and Principals (Transcript of Discussion). Security Protocols Workshop 2000: 14-19
[e4]Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner (Eds.): Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7
1990 – 1999
- 1999
[j8]Dieter Gollmann: Dual Bases and Bit-Serial Multiplication in Fqn. Theor. Comput. Sci. 226(1-2): 45-59 (1999)
[c31]- 1998
[j7]Dieter Gollmann, Ulrich Lang: Security in CORBA-based electronic commerce systems. Inf. Sec. Techn. Report 3(2): 62-70 (1998)
[c30]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
[c29]Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166
[c28]
[c27]Dieter Gollmann: Insider Fraud (Transcript of Discussion). Security Protocols Workshop 1998: 220-226
[e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (Eds.): Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0- 1997
[j6]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
[c26]Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
[c25]- 1996
[j5]Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptography 7(1-2): 135-151 (1996)
[c24]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
[c23]
[c22]Willi Geiselmann, Dieter Gollmann: Correlation Attacks on Cascades of Clock Controlled Shift Registers. ASIACRYPT 1996: 346-359
[c21]
[c20]Dieter Gollmann: What do We Mean by Entity Authentication? IEEE Symposium on Security and Privacy 1996: 46-54
[c19]Jianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61
[c18]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153
[e2]Dieter Gollmann (Ed.): Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings. Lecture Notes in Computer Science 1039, Springer 1996, ISBN 3-540-60865-6- 1995
[j4]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)
[c17]Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos: Public-key Cryptography on Smart Cards. Cryptography: Policy and Algorithms 1995: 250-269
[c16]
[c15]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
[c14]Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations. IMA Conf. 1995: 34-43- 1994
[e1]Dieter Gollmann (Ed.): Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings. Lecture Notes in Computer Science 875, Springer 1994, ISBN 3-540-58618-0- 1993
[j3]Dieter Gollmann, Thomas Beth, Frank Damm: Authentication services in distributed systems. Computers & Security 12(8): 753-764 (1993)
[j2]Willi Geiselmann, Dieter Gollmann: Self-Dual Bases in Fqn. Des. Codes Cryptography 3(4): 333-345 (1993)
[j1]Bev Littlewood, Sarah Brocklehurst, Norman E. Fenton, P. Mellor, Stella Page, David Wright, J. Dobson, J. McDermid, Dieter Gollmann: Towards Operational Measures of Computer Security. Journal of Computer Security 2(2-3): 211-230 (1993)
[c13]
[c12]- 1992
[c11]Kwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272- 1990
[c10]Willi Geiselmann, Dieter Gollmann: VLSI Design for Exponentiation in GF (2n). AUSCRYPT 1990: 398-405
[c9]Zong-Duo Dai, Thomas Beth, Dieter Gollmann: Lower Bounds for the Linear Complexity of Sequences over Residue Rings. EUROCRYPT 1990: 189-195
1980 – 1989
- 1989
[c8]Thomas Beth, Michael Clausen, Dieter Gollmann: Computer Algebra and Computer Aided Systems Theory. EUROCAST 1989: 161-169
[c7]- 1988
[c6]Willi Geiselmann, Dieter Gollmann: Symmetry and Duality in Normal Basis Multiplication. AAECC 1988: 230-238
[c5]William G. Chambers, Dieter Gollmann: Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. EUROCRYPT 1988: 331-343- 1987
[c4]Sibylle Mund, Dieter Gollmann, Thomas Beth: Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. EUROCRYPT 1987: 25-35- 1986
[c3]Thomas Beth, B. M. Cook, Dieter Gollmann: Architectures for Exponentiation in GF(2n). CRYPTO 1986: 302-310
[c2]- 1984
[c1]Dieter Gollmann: Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. EUROCRYPT 1984: 93-98
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:24 CEST by the dblp team



