Ver­öf­fent­li­chun­gen

Key-As­si­gnment Stra­te­gies for CPPM.

2004 - Jörg Schwenk, Andre Adels­bach,

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop 2004, Mag­d­e­burg, Ger­ma­ny, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adels­bach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Mo­der­ne Ver­fah­ren der Kryp­to­gra­phie

2004 - Jörg Schwenk, Klaus-Die­t­er Wol­fen­stet­ter, Al­brecht, Beu­tels­ba­cher

[Ama­zon]

Over­co­ming the Obst­a­cles of Ze­ro-Know­ledge Wa­ter­mark De­tec­tion.

2004 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop 2004, Mag­d­e­burg, Ger­ma­ny, pp. 46 - 55, © ACM, 2004.

Pseud­onym Ge­ne­ra­ti­on Sche­me for Ad-Hoc Group Com­mu­ni­ca­ti­on Based on IDH.

2004 - Jörg Schwenk, Mark Ma­nu­lis,

In Pro­cee­dings of the 1st Eu­ropean Work­shop on Se­cu­ri­ty in Ad-Hoc and Sen­sor Net­works (ESAS 2004), Lec­tu­re Notes in Com­pu­ter Sci­ence, vo­lu­me 3313, pages 107-124, Sprin­ger-Ver­lag, 2005. [Sprin­ger Link] [PDF] [Bib­tex]
Seite: