Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Reinhard Posch
2010 – today
- 2011
[c28]Karl-Christian Posch, Reinhard Posch, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer: Secure and Privacy-Preserving eGovernment - Best Practice Austria. Rainbow of Computer Science 2011: 259-269- 2010
[j26]Herbert Leitold, Reinhard Posch, Thomas Rössler: Reconstruction of electronic signatures from eDocument printouts. Computers & Security 29(5): 523-532 (2010)
2000 – 2009
- 2009
[c27]Herbert Leitold, Reinhard Posch, Thomas Rössler: Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. SEC 2009: 109-118- 2008
[c26]Reinhard Posch: A Federated Identity Management Architecture for Cross-Border Services in Europe. BIOSIG 2008: 141-152- 2005
[c25]Thomas Rössler, Herbert Leitold, Reinhard Posch: E-Voting: A Scalable Approach using XML and Hardware Security Modules. EEE 2005: 480-485- 2002
[c24]Herbert Leitold, Arno Hollosi, Reinhard Posch: Security Architecture of the Austrian Citizen Card Concept. ACSAC 2002: 391-400
[c23]Arno Hollosi, Udo Payer, Reinhard Posch: Automatic authentication based on the Austrian citizen card. Communications and Multimedia Security 2002: 241-253
[c22]Arno Hollosi, Herbert Leitold, Reinhard Posch: An open interface enabling secure e-government. Communications and Multimedia Security 2002: 255-266
[c21]
[c20]Reinhard Posch, Herbert Leitold: Identification and Confidentiality for e-Government. Certification and Security in E-Services 2002: 267-279- 2001
[j25]
[c19]Reinhard Posch, Herbert Leitold: Digitale Signaturen in der Praxis. GI Jahrestagung (1) 2001: 477-485
[c18]Reinhard Posch: Der Mensch im Cyberspace. Mensch-Computer Interaktion im 21. Jahrhundert 2001: 15-19- 2000
[c17]Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer: A 155 Mbps Triple-DES Network Encryptor. CHES 2000: 164-174
[c16]Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer: Robustness-Agile Encryptor for ATM Networks. SEC 2000: 231-240
[c15]
1990 – 1999
- 1999
[j24]Wolfgang Mayerwieser, Reinhard Posch: Neue Möglichkeiten und Anforderungen für Krypto-Koprozessoren. Datenschutz und Datensicherheit 23(9) (1999)
[c14]Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos: Secure Communications in ATM Networks. ACSAC 1999: 84-93
[c13]Herbert Leitold, Karl C. Posch, Reinhard Posch: ISDN Security services. Communications and Multimedia Security 1999: 21-35
[c12]Herbert Leitold, Reinhard Posch: ATM Network Security: Requirements, Approaches, Standards, and the SCAN Solution. SMARTNET 1999: 191-204- 1998
[j23]J. Schwemmlein, Karl C. Posch, Reinhard Posch: RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography. Computers & Security 17(7): 637-650 (1998)
[j22]
[c11]Herbert Leitold, Udo Payer, Reinhard Posch: A Hardware-Independent Encryption Model for ATM Devices. ACSAC 1998: 205-211
[e1]Reinhard Posch, G. Papp (Eds.): Global IT Security (SEC'98), IFIP World Computer Congress 1998. books@ocg.at 116, Austrian Computer Society 1998, ISBN 3-85403-116-5- 1996
[j21]
[c10]Ilias Andrikopoulos, Tolga Örs, Maja Matijasevic, Herbert Leitold, Reinhard Posch: A study of TCP/IP throughout performance in heterogeneous ATM local area networks. Modelling and Evaluation of ATM Networks 1996: 447-465
[c9]Reinhard Posch, Herbert Leitold, Franz Pucher: ISDN LAN Access: Remote Access Security and User Profile Management. Communications and Multimedia Security 1996: 222-233
[c8]Hannes Hassler, Vesna Hassler, Reinhard Posch: A hierarchical threshold scheme with unique partial keys. SEC 1996: 219-226
[c7]Vesna Hassler, N. Lutz, Reinhard Posch: Privacy-enhanced desktop meeting system. WETICE 1996: 112-117- 1995
[j20]Reinhard Posch, Franz Pucher: An experimental mixed purpose network. Microprocessing and Microprogramming 41(4): 263-271 (1995)
[j19]Artur Klauser, Reinhard Posch: Distributed Caching in Networked File Systems. J. UCS 1(6): 399-409 (1995)
[j18]Wolfgang Mayerwieser, Karl C. Posch, Reinhard Posch, Volker Schindler: Testing a High-Speed Data Path: The Design of the RSAs Crypto Chip. J. UCS 1(11): 728-743 (1995)
[j17]Karl C. Posch, Reinhard Posch: Modulo Reduction in Residue Number Systems. IEEE Trans. Parallel Distrib. Syst. 6(5): 449-454 (1995)- 1994
[c6]Artur Klauser, Reinhard Posch: Distributed File Caching in Parallel Architectures Utilizing High Speed Networks. HPCN 1994: 30-35- 1993
[j16]Reinhard Posch, Franz Pucher, Michael Welser: Using a transputer cluster in a classroom environment. Computer Communications 16(3): 192-196 (1993)- 1992
[j15]Peter Lipp, Reinhard Posch: An Inter-Bridge-Security Protocol. Computer Networks and ISDN Systems 25(4-5): 496-500 (1992)
[c5]Karl C. Posch, Reinhard Posch: Residue Number Systems: A Key to Parallelism in Public Key Cryptography. SPDP 1992: 432-435- 1991
[j14]Reinhard Posch, Michael Welser: A Conceptual View of MS-DOS File System Security. Wirtschaftsinformatik 33(6): 526-531 (1991)
[c4]P. Lippitsch, Karl C. Posch, Reinhard Posch: Multiplication as Parallel as Possible. ACPC 1991: 350-358
[c3]- 1990
[j13]Robert Hufsky, Erich Löw, Reinhard Posch: Eine Erweiterung der Farbtabelle durch einen deterministischen Realtime-Schedule. Wirtschaftsinformatik 32(4): 372-375 (1990)
1980 – 1989
- 1988
[j12]Reinhard Posch, Peter Lipp: Ein automatisiertes Examensprüfungswesen an der TU Graz auf der Basis eines Fileserver-orientierten Mailboxsystems. Angewandte Informatik 30(3): 132-137 (1988)
[j11]- 1987
[j10]Wolf-Dietrich Fellner, Reinhard Posch: Bildschirmtext - An open videotex network for text and graphic applications. Computers & Graphics 11(4): 359-367 (1987)- 1985
[j9]Reinhard Posch: Verwendung dynamischer Verdichtungsverfahren zur Erhöhung der Übertragungsleistung auf langsamen Datenverbindungen. Angewandte Informatik 27(12): 520-523 (1985)
[c2]H. Cheng, Peter Lipp, Hermann A. Maurer, Reinhard Posch: GASC: ein Graphik- und Software Kommunikationssystem. GI Jahrestagung 1985: 679-690- 1984
[j8]Reinhard Posch, Günter Haring: Allocating Computer Resources to Satisfy User and Management Demands. Softw., Pract. Exper. 14(4): 311-321 (1984)- 1983
[j7]H. Bogensberger, Hermann A. Maurer, Reinhard Posch, W. Schinnerl: Ein neuartiges - durch spezielle Hardware unterstütztes - Terminalkonzept für Bildschirmtext. Angewandte Informatik 25(3): 108-113 (1983)
[j6]Reinhard Posch: Interruptstrukturen in Systemen mit Datenfernverarbeitungsumgebung. Angewandte Informatik 25(6): 258-261 (1983)- 1982
[j5]Reinhard Posch: Transparente Protokolle als Alternative herstellerspezifische Terminalbehandlung. Angewandte Informatik 24(12): 575-580 (1982)- 1980
[j4]Günter Haring, Reinhard Posch: On the use of a synthetic online/batch workload for computer selection. Information & Management 3(3): 95-102 (1980)
[j3]Reinhard Posch: Ein Vorschlag zur Behandlung von prozedurfreien asynchronen Terminals im Halbduplex-Verfahren. Angewandte Informatik 22(3): 119-125 (1980)
1970 – 1979
- 1979
[j2]Günter Haring, Reinhard Posch, C. Leonhardt, Günther Gell: The Use of a Synthetic Jobstream in Performance Evaluation. Comput. J. 22(3): 209-219 (1979)
[j1]Reinhard Posch: Automatic console operation as a tool for systems management. Information & Management 2(2): 49-55 (1979)
[c1]H. Bogensberger, Günter Haring, Reinhard Posch: Ein Modell zur gemeinsamen Nutzung einer Rechenanlage. GI Jahrestagung 1979: 534-544
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:24 CEST by the dblp team



