What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dieter Gollmann
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2017
journals/compsec
Privacy policies verification in composite services using OWL.
Assadarat Khurat
Boontawee Suntisrivaraporn
Dieter Gollmann
2017
conf/ccs
Cyber-Physical System Discovery: Reverse Engineering Physical Processes.
Alexander Winnicki
Marina Krotofil
Dieter Gollmann
2015
conf/ccs
The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems.
Marina Krotofil
Jason Larsen
Dieter Gollmann
2015
conf/ccs
Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant.
Dieter Gollmann
Pavel Gurikov
Alexander Isakov
Marina Krotofil
Jason Larsen
Alexander Winnicki
2010
conf/esorics
Caught in the Maze of Security Standards.
Jan Meier
Dieter Gollmann
2008
journals/istr
Securing Web applications.
Dieter Gollmann
2002
conf/icisc
On Fairness in Exchange Protocols.
Olivier Markowitch
Dieter Gollmann
Steve Kremer
2001
conf/icics
Cryptography and Middleware Security.
Ulrich Lang
Dieter Gollmann
Rudolf Schreiner
2001
conf/acsac
Verifiable Identifiers in Middleware Security.
Ulrich Lang
Dieter Gollmann
Rudolf Schreiner
1998
journals/istr
Security in CORBA-based electronic commerce systems.
Dieter Gollmann
Ulrich Lang
1997
conf/acisp
Secret Sharing with Reusable Polynomials.
Liqun Chen
Dieter Gollmann
Chris J. Mitchell
Peter R. Wild
1996
conf/acisp
Tailoring authentication protocols to match underlying mechanisms.
Liqun Chen
Dieter Gollmann
Chris J. Mitchell
1996
conf/sp
A Fair Non-repudiation Protocol.
Jianying Zhou
Dieter Gollmann
1996
conf/sp
What do We Mean by Entity Authentication?
Dieter Gollmann
1996
conf/esorics
Certified Electronic Mail.
Jianying Zhou
Dieter Gollmann
1996
conf/asiacrypt
Correlation Attacks on Cascades of Clock Controlled Shift Registers.
Willi Geiselmann
Dieter Gollmann
1996
conf/asiacrypt
Observations on Non-repudiation.
Jianying Zhou
Dieter Gollmann
1993
journals/compsec
Authentication services in distributed systems.
Dieter Gollmann
Thomas Beth
Frank Damm
1993
conf/fse
Cryptanalysis of Clock Controlled Shift Registers.
Dieter Gollmann
1993
conf/sec
The MSc in Information Security at Royal Holloway.
Dieter Gollmann
1992
conf/esorics
Freshness Assurance of Authentication Protocols.
Kwok-Yan Lam
Dieter Gollmann
1990
conf/eurocrypt
Lower Bounds for the Linear Complexity of Sequences over Residue Rings.
Zong-Duo Dai
Thomas Beth
Dieter Gollmann
1990
conf/asiacrypt
VLSI Design for Exponentiation in GF (2<sup>n</sup>).
Willi Geiselmann
Dieter Gollmann
1989
conf/eurocrypt
</sub>-Cascades.
Dieter Gollmann
William G. Chambers
1988
conf/eurocrypt
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers.
William G. Chambers
Dieter Gollmann
1987
conf/eurocrypt
Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators.
Sibylle Mund
Dieter Gollmann
Thomas Beth
1986
conf/crypto
Architectures for Exponentiation in GF(2<sup>n</sup>).
Thomas Beth
B. M. Cook
Dieter Gollmann
1986
conf/eurocrypt
Linear Complexity of Sequences with Period p<sup>n</sup>.
Dieter Gollmann
1984
conf/eurocrypt
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.
Dieter Gollmann
Coauthors
Alexander Isakov
(1)
Alexander Winnicki
(2)
Assadarat Khurat
(1)
B. M. Cook
(1)
Boontawee Suntisrivaraporn
(1)
Chris J. Mitchell
(2)
Dieter Gollmann
(29)
Frank Damm
(1)
Jan Meier
(1)
Jason Larsen
(2)
Jianying Zhou
(3)
Kwok-Yan Lam
(1)
Liqun Chen
(2)
Marina Krotofil
(3)
Olivier Markowitch
(1)
Pavel Gurikov
(1)
Peter R. Wild
(1)
Rudolf Schreiner
(2)
Sibylle Mund
(1)
Steve Kremer
(1)
Thomas Beth
(4)
Ulrich Lang
(3)
Willi Geiselmann
(2)
William G. Chambers
(2)
Zong-Duo Dai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to