Rainer Falk

According to our database1, Rainer Falk authored at least 23 papers between 1997 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments.
CoRR, 2015

Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility.
CoRR, 2015

2012
Smart Grid Information Exchange - Securing the Smart Grid from the Ground.
Proceedings of the Smart Grid Security - First International Workshop, 2012

SW-basierte Integration von neuen Fahrzeugfunktionen in zentralisierten Controllern.
Proceedings of the Automotive, 2012

2011
Smart Grid Cyber Security - An Overview of Selected Scenarios and Their Security Implications.
Prax. Inf.verarb. Kommun., 2011

2010
Security Design for Industrial Sensor Networks (Sicherheit für industrielle Sensornetze).
it Inf. Technol., 2010

Industrial Sensor Network Security Architecture.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2009
Simulating a Multi-domain RFID System for Replacement Part Tracking.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Mobile WiMAX Network Security.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Profiling the Protection of Sensitive Enterprise Multimedia Communication.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009

2008
Security Governance for Enterprise VoIP Communication.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Public key based authentication for secure integration of sensor data and RFID.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

2006
Network support modeling, architecture, and security considerations for composite reconfigurable environments.
IEEE Wirel. Commun., 2006

Using SAML to protect the session initiation protocol (SIP).
IEEE Netw., 2006

2005
Protecting Reconfiguration in Future Mobile Communication Systems.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2002
The European project trust - reconfigurable terminals and supporting networks.
Ann. des Télécommunications, 2002

2000
Eine Methode für die Verwaltung von Zugriffsrechten in IT-Systemen.
PhD thesis, 2000

1999
Verwaltung von Java-2-Zugriffspolitiken.
Proceedings of the JIT '99, 1999

1998
Managing Network Security-A Pragmatic Approach.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Java RMI, CORBA und Firewalls.
Proceedings of the JIT '98, 1998

Integrated Management of Network and Host Based Security Mechanisms.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Formale Spezifikation von Sicherheitspolitiken für Paketfilter.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997


  Loading...