BibTeX records: Walter Fumy

download as .bib file

@article{DBLP:journals/dud/PaeschkeFW19,
  author       = {Manfred Paeschke and
                  Walter Fumy and
                  Andreas Wilke},
  title        = {Ensuring Security {\&} Trust in a Post-Quantum Environment},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {440--443},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1140-4},
  doi          = {10.1007/S11623-019-1140-4},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PaeschkeFW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FumyR18,
  author       = {Walter Fumy and
                  Helmut Reimer},
  title        = {Vertrauen ist gut ... Zertifizierung ist besser!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {42},
  number       = {7},
  pages        = {403},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11623-018-0966-5},
  doi          = {10.1007/S11623-018-0966-5},
  timestamp    = {Thu, 26 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FumyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy17,
  author       = {Walter Fumy},
  title        = {Kryptographie im Wandel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {41},
  number       = {1},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11623-017-0713-3},
  doi          = {10.1007/S11623-017-0713-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy17a,
  author       = {Walter Fumy},
  title        = {Quantencomputer und die Zukunft der Kryptographie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {41},
  number       = {1},
  pages        = {13--16},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11623-017-0717-z},
  doi          = {10.1007/S11623-017-0717-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy15,
  author       = {Walter Fumy},
  title        = {Ein Blatt Papier ist ein Blatt Papier ist ein Blatt Papier},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {39},
  number       = {4},
  pages        = {213},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11623-015-0396-6},
  doi          = {10.1007/S11623-015-0396-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FumyKP15,
  author       = {Walter Fumy and
                  Olga Kulikovska and
                  Manfred Paeschke},
  title        = {Neue Sicherheitsarchitekturen auf Basis intrinsischer Objektidentit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {39},
  number       = {4},
  pages        = {224--228},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11623-015-0400-1},
  doi          = {10.1007/S11623-015-0400-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FumyKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy13,
  author       = {Walter Fumy},
  title        = {Die Zeiten {\"{a}}ndern sich ..},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0001-9},
  doi          = {10.1007/S11623-013-0001-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/EsbachFKMSS12,
  author       = {Thomas Esbach and
                  Walter Fumy and
                  Olga Kulikovska and
                  Dominik Merli and
                  Dieter Schuster and
                  Frederic Stumpf},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {A New Security Architecture for Smartcards Utilizing PUFs},
  booktitle    = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2012 Conference, Brussels,
                  Belgium, October 23-24, 2012},
  pages        = {180--194},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-658-00333-3\_18},
  doi          = {10.1007/978-3-658-00333-3\_18},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/EsbachFKMSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy11,
  author       = {Walter Fumy},
  title        = {Standards bringen vielf{\"{a}}ltig Nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {3},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0001-6},
  doi          = {10.1007/S11623-011-0001-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy11a,
  author       = {Walter Fumy},
  title        = {Maschinenlesbare Reisedokumente},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {16--21},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0006-1},
  doi          = {10.1007/S11623-011-0006-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Fumy02,
  author       = {Walter Fumy},
  editor       = {Jan von Knop and
                  Wilhelm Haverkamp},
  title        = {{IT} Security Trends},
  booktitle    = {Zukunft der Netze - Die Verlezbarkeit meistern, 16. DFN-Arbeitstagung
                  {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2002},
  series       = {{LNI}},
  volume       = {{P-17}},
  pages        = {13--27},
  publisher    = {{GI}},
  year         = {2002},
  url          = {https://dl.gi.de/handle/20.500.12116/30424},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Fumy02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy00,
  author       = {Walter Fumy},
  title        = {Von Common Criteria bis zu elliptischen Kurven - Sicherheitsstandards
                  von {ISO/IEC} {JTC} 1/SC 27},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {24},
  number       = {7},
  year         = {2000},
  timestamp    = {Fri, 12 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Fumy97,
  author       = {Walter Fumy},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Key Management Techniques},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {142--162},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_6},
  doi          = {10.1007/3-540-49248-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Fumy97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Fumy97a,
  author       = {Walter Fumy},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Internet Security Protocols},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {186--208},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_8},
  doi          = {10.1007/3-540-49248-8\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Fumy97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/97,
  editor       = {Walter Fumy},
  title        = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0},
  doi          = {10.1007/3-540-69053-0},
  isbn         = {3-540-62975-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0073307,
  author       = {Walter Fumy and
                  Hans Peter Rie{\ss}},
  title        = {Kryptographie - Entwurf, Einsatz und Analyse symmetrischer Kryptoverfahren,
                  2. Auflage},
  series       = {Sicherheit in der Informationstechnik},
  volume       = {6},
  publisher    = {Oldenbourg},
  year         = {1994},
  isbn         = {978-3-486-22213-5},
  timestamp    = {Thu, 18 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0073307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/FumyL93,
  author       = {Walter Fumy and
                  Matthias Leclerc},
  title        = {Placement of Cryptographic Key Distribution Within {OSI:} Design Alternatives
                  and Assessment},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {26},
  number       = {2},
  pages        = {217--225},
  year         = {1993},
  url          = {https://doi.org/10.1016/0169-7552(93)90088-L},
  doi          = {10.1016/0169-7552(93)90088-L},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/FumyL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/FumyL93,
  author       = {Walter Fumy and
                  Peter Landrock},
  title        = {Principles of Key Management},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {785--793},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223881},
  doi          = {10.1109/49.223881},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/FumyL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/Fumy93,
  author       = {Walter Fumy},
  editor       = {Gerhard Weck and
                  Patrick Horster},
  title        = {Designprinzipien f{\"{u}}r Authentifikationsmechanismen},
  booktitle    = {Verl{\"{a}}{\ss}liche Informationssysteme, Proceedings der GI-Fachtagung
                  VIS'93, 11.-13.05.1993, M{\"{u}}nchen, Germany},
  series       = {DuD-Fachbeitr{\"{a}}ge},
  volume       = {16},
  pages        = {307--319},
  publisher    = {Vieweg},
  year         = {1993},
  timestamp    = {Tue, 15 Nov 2016 13:03:51 +0100},
  biburl       = {https://dblp.org/rec/conf/vis/Fumy93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Fumy91,
  author       = {Walter Fumy},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Key Management},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {132--147},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_58},
  doi          = {10.1007/3-540-57341-0\_58},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Fumy91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Fumy91a,
  author       = {Walter Fumy},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {(Local Area) Network Security},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_64},
  doi          = {10.1007/3-540-57341-0\_64},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Fumy91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91,
  author       = {Bart Preneel and
                  David Chaum and
                  Walter Fumy and
                  Cees J. A. Jansen and
                  Peter Landrock and
                  Gert Roelofsen},
  editor       = {Donald W. Davies},
  title        = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {547--551},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_52},
  doi          = {10.1007/3-540-46416-6\_52},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prozess/FumyR91,
  author       = {Walter Fumy and
                  Hans Peter Rie{\ss}},
  editor       = {G{\"{u}}nter Hommel},
  title        = {Kommunikationssicherheit in industriellen Netzen},
  booktitle    = {Proze{\ss}rechnersysteme '91, Automatisierungs- und Leitsysteme in
                  den neunziger Jahren, Berlin, 25.-27. Februar 1991, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {269},
  pages        = {251--260},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/978-3-642-76501-8\_23},
  doi          = {10.1007/978-3-642-76501-8\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prozess/FumyR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FumyM90,
  author       = {Walter Fumy and
                  Michael Munzert},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {A Modular Approach to Key Distribution},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {274--283},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_20},
  doi          = {10.1007/3-540-38424-3\_20},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FumyM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/VandewalleCFJLR89,
  author       = {Joos Vandewalle and
                  David Chaum and
                  Walter Fumy and
                  Cees J. A. Jansen and
                  Peter Landrock and
                  Gert Roelofsen},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {A European Call For Cryptographic Algorithms: Ripe; Race Integrity
                  Primitives Evaluation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {267--271},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_28},
  doi          = {10.1007/3-540-46885-4\_28},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/VandewalleCFJLR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prozess/Fumy88,
  author       = {Walter Fumy},
  editor       = {Rudolf Lauber},
  title        = {Datensicherheit in Netzen der Automatisierungstechnik},
  booktitle    = {Proze{\ss}rechnersysteme '88, Automatisierungstechnik, Leittechnik,
                  Informations- und Kommunikationstechnik, Stuttgart, 2.-4. M{\"{a}}rz
                  1988, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {167},
  pages        = {242--251},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/978-3-642-73445-8\_16},
  doi          = {10.1007/978-3-642-73445-8\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prozess/Fumy88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Fumy87,
  author       = {Walter Fumy},
  editor       = {Carl Pomerance},
  title        = {On the F-function of {FEAL}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {434--437},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_38},
  doi          = {10.1007/3-540-48184-2\_38},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Fumy87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Fumy86,
  author       = {Walter Fumy},
  title        = {{\"{U}}ber orthogonale Transformationen und fehlerkorrigierende
                  Codes},
  school       = {University of Erlangen-Nuremberg, Germany},
  year         = {1986},
  url          = {https://d-nb.info/870344064},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Fumy86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/Fumy85,
  author       = {Walter Fumy},
  editor       = {Jacques Calmet},
  title        = {Orthogonal Transform Encoding of Cyclic Codes},
  booktitle    = {Algebraic Algorithms and Error-Correcting Codes, 3rd International
                  Conference, AAECC-3, Grenoble, France, July 15-19, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {229},
  pages        = {131--134},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-16776-5\_715},
  doi          = {10.1007/3-540-16776-5\_715},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/Fumy85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}