Reinhard Posch

Affiliations:
  • Graz University of Technology, Austria


According to our database1, Reinhard Posch authored at least 62 papers between 1979 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Digital Sovereignty and IT-Security for a Prosperous Society.
Proceedings of the Informatics in the Future, 2015

2013
Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 2013

2011
Secure and Privacy-Preserving eGovernment - Best Practice Austria.
Proceedings of the Rainbow of Computer Science, 2011

2010
Reconstruction of electronic signatures from eDocument printouts.
Comput. Secur., 2010

2009
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.
Proceedings of the Emerging Challenges for Security, 2009

2008
A Federated Identity Management Architecture for Cross-Border Services in Europe.
Proceedings of the BIOSIG 2008, 2008

2005
E-Voting: A Scalable Approach using XML and Hardware Security Modules.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2002
Identification and Confidentiality for e-Government.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002

What Is Needed to Allow e-Citizenship?
Proceedings of the Electronic Government, First International Conference, 2002

Automatic authentication based on the Austrian citizen card.
Proceedings of the Advanced Communications and Multimedia Security, 2002

An open interface enabling secure e-government.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Security Architecture of the Austrian Citizen Card Concept.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Will Internet Ever Be Secure ?
J. Univers. Comput. Sci., 2001

Der Mensch im Cyberspace.
Proceedings of the Mensch-Computer Interktion (MCI) im 21. Jahrhundert / Human-Computer Interaction (HCI) in the 21st Century, 2001

Digitale Signaturen in der Praxis.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
The Business Of Electronic Government.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Robustness-Agile Encryptor for ATM Networks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A 155 Mbps Triple-DES Network Encryptor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

1999
Neue Möglichkeiten und Anforderungen für Krypto-Koprozessoren.
Datenschutz und Datensicherheit, 1999

ATM Network Security: Requirements, Approaches, Standards, and the SCAN Solution.
Proceedings of the Intelligence in Networks, 1999

ISDN Security services.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

Secure Communications in ATM Networks.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Protecting Devices by Active Coating.
J. Univers. Comput. Sci., 1998

Router-basierter ISDN/IP-Zugang für einen Primärratenanschluß / Router-based LAN-Access Over ISDN.
Informationstechnik Tech. Inform., 1998

Securing multimedia services over satellite ATM networks.
Int. J. Satell. Commun. Netw., 1998

RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography.
Comput. Secur., 1998

A Hardware-Independent Encryption Model for ATM Devices.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1996
LAN Access Over ISDN.
J. Univers. Comput. Sci., 1996

Privacy-enhanced desktop meeting system.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

A hierarchical threshold scheme with unique partial keys.
Proceedings of the Information Systems Security, 1996

ISDN LAN Access: Remote Access Security and User Profile Management.
Proceedings of the Communications and Multimedia Security II, 1996

A study of TCP/IP throughout performance in heterogeneous ATM local area networks.
Proceedings of the ATM Networks, 1996

1995
Modulo Reduction in Residue Number Systems.
IEEE Trans. Parallel Distributed Syst., 1995

Testing a High-Speed Data Path: The Design of the RSAs Crypto Chip.
J. Univers. Comput. Sci., 1995

Distributed Caching in Networked File Systems.
J. Univers. Comput. Sci., 1995

An experimental mixed purpose network.
Microprocess. Microprogramming, 1995

1994
Distributed File Caching in Parallel Architectures Utilizing High Speed Networks.
Proceedings of the High-Performance Computing and Networking, 1994

1993
Base extension using a convolution sum in residue number systems.
Computing, 1993

Using a transputer cluster in a classroom environment.
Comput. Commun., 1993

MRSA - a new public key encryption method.
Proceedings of the 12th International Conference on Computer Safety, 1993

1992
An Inter-Bridge-Security Protocol.
Comput. Networks ISDN Syst., 1992

Residue Number Systems: A Key to Parallelism in Public Key Cryptography.
Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing, 1992

1991
A Conceptual View of MS-DOS File System Security.
Wirtschaftsinf., 1991

PC-RSA A Cryptgraphic Toolkit for MS-DOS.
Proceedings of the VIS'91, 1991

Multiplication as Parallel as Possible.
Proceedings of the Parallel Computation, First International ACPC Conference, Salzburg, Austria, September 30, 1991

1990
Eine Erweiterung der Farbtabelle durch einen deterministischen Realtime-Schedule.
Wirtschaftsinf., 1990

Approaching encryption at ISDN speed using partial parallel modulus multiplication.
Microprocessing and Microprogramming, 1990

1988
Ein automatisiertes Examensprüfungswesen an der TU Graz auf der Basis eines Fileserver-orientierten Mailboxsystems.
Angew. Inform., 1988

Multiuser-Software Security.
Angew. Inform., 1988

1987
Bildschirmtext - An open videotex network for text and graphic applications.
Comput. Graph., 1987

1985
Verwendung dynamischer Verdichtungsverfahren zur Erhöhung der Übertragungsleistung auf langsamen Datenverbindungen.
Angew. Inform., 1985

GASC: ein Graphik- und Software Kommunikationssystem.
Proceedings of the GI/OCG/ÖGI-Jahrestagung 1985, 1985

1984
Allocating Computer Resources to Satisfy User and Management Demands.
Softw. Pract. Exp., 1984

1983
Interruptstrukturen in Systemen mit Datenfernverarbeitungsumgebung.
Angew. Inform., 1983

Ein neuartiges - durch spezielle Hardware unterstütztes - Terminalkonzept für Bildschirmtext.
Angew. Inform., 1983

1982
Transparente Protokolle als Alternative herstellerspezifische Terminalbehandlung.
Angew. Inform., 1982

1980
Ein Vorschlag zur Behandlung von prozedurfreien asynchronen Terminals im Halbduplex-Verfahren.
Angew. Inform., 1980

On the use of a synthetic online/batch workload for computer selection.
Inf. Manag., 1980

1979
Modelling a hardware structure for computer science education.
ACM SIGCSE Bull., 1979

Automatic console operation as a tool for systems management.
Inf. Manag., 1979

The Use of a Synthetic Jobstream in Performance Evaluation.
Comput. J., 1979

Ein Modell zur gemeinsamen Nutzung einer Rechenanlage.
Proceedings of the GI - 9. Jahrestagung, Bonn, 1.-5. Oktober 1979, Proceedings, 1979


  Loading...