default search action
BibTeX records: Walter Fumy
@article{DBLP:journals/dud/PaeschkeFW19, author = {Manfred Paeschke and Walter Fumy and Andreas Wilke}, title = {Ensuring Security {\&} Trust in a Post-Quantum Environment}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {440--443}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1140-4}, doi = {10.1007/S11623-019-1140-4}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PaeschkeFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FumyR18, author = {Walter Fumy and Helmut Reimer}, title = {Vertrauen ist gut ... Zertifizierung ist besser!}, journal = {Datenschutz und Datensicherheit}, volume = {42}, number = {7}, pages = {403}, year = {2018}, url = {https://doi.org/10.1007/s11623-018-0966-5}, doi = {10.1007/S11623-018-0966-5}, timestamp = {Thu, 26 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FumyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy17, author = {Walter Fumy}, title = {Kryptographie im Wandel}, journal = {Datenschutz und Datensicherheit}, volume = {41}, number = {1}, pages = {1}, year = {2017}, url = {https://doi.org/10.1007/s11623-017-0713-3}, doi = {10.1007/S11623-017-0713-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy17a, author = {Walter Fumy}, title = {Quantencomputer und die Zukunft der Kryptographie}, journal = {Datenschutz und Datensicherheit}, volume = {41}, number = {1}, pages = {13--16}, year = {2017}, url = {https://doi.org/10.1007/s11623-017-0717-z}, doi = {10.1007/S11623-017-0717-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy15, author = {Walter Fumy}, title = {Ein Blatt Papier ist ein Blatt Papier ist ein Blatt Papier}, journal = {Datenschutz und Datensicherheit}, volume = {39}, number = {4}, pages = {213}, year = {2015}, url = {https://doi.org/10.1007/s11623-015-0396-6}, doi = {10.1007/S11623-015-0396-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FumyKP15, author = {Walter Fumy and Olga Kulikovska and Manfred Paeschke}, title = {Neue Sicherheitsarchitekturen auf Basis intrinsischer Objektidentit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {39}, number = {4}, pages = {224--228}, year = {2015}, url = {https://doi.org/10.1007/s11623-015-0400-1}, doi = {10.1007/S11623-015-0400-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FumyKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy13, author = {Walter Fumy}, title = {Die Zeiten {\"{a}}ndern sich ..}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0001-9}, doi = {10.1007/S11623-013-0001-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/EsbachFKMSS12, author = {Thomas Esbach and Walter Fumy and Olga Kulikovska and Dominik Merli and Dieter Schuster and Frederic Stumpf}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {A New Security Architecture for Smartcards Utilizing PUFs}, booktitle = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012}, pages = {180--194}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-658-00333-3\_18}, doi = {10.1007/978-3-658-00333-3\_18}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/EsbachFKMSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy11, author = {Walter Fumy}, title = {Standards bringen vielf{\"{a}}ltig Nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {3}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0001-6}, doi = {10.1007/S11623-011-0001-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy11a, author = {Walter Fumy}, title = {Maschinenlesbare Reisedokumente}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {16--21}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0006-1}, doi = {10.1007/S11623-011-0006-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Fumy02, author = {Walter Fumy}, editor = {Jan von Knop and Wilhelm Haverkamp}, title = {{IT} Security Trends}, booktitle = {Zukunft der Netze - Die Verlezbarkeit meistern, 16. DFN-Arbeitstagung {\"{u}}ber Kommunikationsnetze, D{\"{u}}sseldorf, 2002}, series = {{LNI}}, volume = {{P-17}}, pages = {13--27}, publisher = {{GI}}, year = {2002}, url = {https://dl.gi.de/handle/20.500.12116/30424}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Fumy02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy00, author = {Walter Fumy}, title = {Von Common Criteria bis zu elliptischen Kurven - Sicherheitsstandards von {ISO/IEC} {JTC} 1/SC 27}, journal = {Datenschutz und Datensicherheit}, volume = {24}, number = {7}, year = {2000}, timestamp = {Fri, 12 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fumy00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Fumy97, author = {Walter Fumy}, editor = {Bart Preneel and Vincent Rijmen}, title = {Key Management Techniques}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {142--162}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_6}, doi = {10.1007/3-540-49248-8\_6}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Fumy97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Fumy97a, author = {Walter Fumy}, editor = {Bart Preneel and Vincent Rijmen}, title = {Internet Security Protocols}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {186--208}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_8}, doi = {10.1007/3-540-49248-8\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Fumy97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/97, editor = {Walter Fumy}, title = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0}, doi = {10.1007/3-540-69053-0}, isbn = {3-540-62975-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0073307, author = {Walter Fumy and Hans Peter Rie{\ss}}, title = {Kryptographie - Entwurf, Einsatz und Analyse symmetrischer Kryptoverfahren, 2. Auflage}, series = {Sicherheit in der Informationstechnik}, volume = {6}, publisher = {Oldenbourg}, year = {1994}, isbn = {978-3-486-22213-5}, timestamp = {Thu, 18 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0073307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FumyL93, author = {Walter Fumy and Matthias Leclerc}, title = {Placement of Cryptographic Key Distribution Within {OSI:} Design Alternatives and Assessment}, journal = {Comput. Networks {ISDN} Syst.}, volume = {26}, number = {2}, pages = {217--225}, year = {1993}, url = {https://doi.org/10.1016/0169-7552(93)90088-L}, doi = {10.1016/0169-7552(93)90088-L}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/FumyL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/FumyL93, author = {Walter Fumy and Peter Landrock}, title = {Principles of Key Management}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {785--793}, year = {1993}, url = {https://doi.org/10.1109/49.223881}, doi = {10.1109/49.223881}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/FumyL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/Fumy93, author = {Walter Fumy}, editor = {Gerhard Weck and Patrick Horster}, title = {Designprinzipien f{\"{u}}r Authentifikationsmechanismen}, booktitle = {Verl{\"{a}}{\ss}liche Informationssysteme, Proceedings der GI-Fachtagung VIS'93, 11.-13.05.1993, M{\"{u}}nchen, Germany}, series = {DuD-Fachbeitr{\"{a}}ge}, volume = {16}, pages = {307--319}, publisher = {Vieweg}, year = {1993}, timestamp = {Tue, 15 Nov 2016 13:03:51 +0100}, biburl = {https://dblp.org/rec/conf/vis/Fumy93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Fumy91, author = {Walter Fumy}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Key Management}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {132--147}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_58}, doi = {10.1007/3-540-57341-0\_58}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Fumy91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Fumy91a, author = {Walter Fumy}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {(Local Area) Network Security}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {211--226}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_64}, doi = {10.1007/3-540-57341-0\_64}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Fumy91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91, author = {Bart Preneel and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and Gert Roelofsen}, editor = {Donald W. Davies}, title = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {547--551}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_52}, doi = {10.1007/3-540-46416-6\_52}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prozess/FumyR91, author = {Walter Fumy and Hans Peter Rie{\ss}}, editor = {G{\"{u}}nter Hommel}, title = {Kommunikationssicherheit in industriellen Netzen}, booktitle = {Proze{\ss}rechnersysteme '91, Automatisierungs- und Leitsysteme in den neunziger Jahren, Berlin, 25.-27. Februar 1991, Proceedings}, series = {Informatik-Fachberichte}, volume = {269}, pages = {251--260}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/978-3-642-76501-8\_23}, doi = {10.1007/978-3-642-76501-8\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prozess/FumyR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FumyM90, author = {Walter Fumy and Michael Munzert}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {A Modular Approach to Key Distribution}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {274--283}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_20}, doi = {10.1007/3-540-38424-3\_20}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FumyM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/VandewalleCFJLR89, author = {Joos Vandewalle and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and Gert Roelofsen}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {267--271}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_28}, doi = {10.1007/3-540-46885-4\_28}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/VandewalleCFJLR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prozess/Fumy88, author = {Walter Fumy}, editor = {Rudolf Lauber}, title = {Datensicherheit in Netzen der Automatisierungstechnik}, booktitle = {Proze{\ss}rechnersysteme '88, Automatisierungstechnik, Leittechnik, Informations- und Kommunikationstechnik, Stuttgart, 2.-4. M{\"{a}}rz 1988, Proceedings}, series = {Informatik-Fachberichte}, volume = {167}, pages = {242--251}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/978-3-642-73445-8\_16}, doi = {10.1007/978-3-642-73445-8\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prozess/Fumy88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Fumy87, author = {Walter Fumy}, editor = {Carl Pomerance}, title = {On the F-function of {FEAL}}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {434--437}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_38}, doi = {10.1007/3-540-48184-2\_38}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Fumy87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Fumy86, author = {Walter Fumy}, title = {{\"{U}}ber orthogonale Transformationen und fehlerkorrigierende Codes}, school = {University of Erlangen-Nuremberg, Germany}, year = {1986}, url = {https://d-nb.info/870344064}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Fumy86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/Fumy85, author = {Walter Fumy}, editor = {Jacques Calmet}, title = {Orthogonal Transform Encoding of Cyclic Codes}, booktitle = {Algebraic Algorithms and Error-Correcting Codes, 3rd International Conference, AAECC-3, Grenoble, France, July 15-19, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {229}, pages = {131--134}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-16776-5\_715}, doi = {10.1007/3-540-16776-5\_715}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/Fumy85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.