Ute Rosenbaum

According to our database1, Ute Rosenbaum authored at least 9 papers between 1989 and 2010.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2010
A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components.
Proceedings of the Emerging Challenges for Security, 2009

1998
Projective geometry - from foundations to applications.
Cambridge University Press, ISBN: 978-0-521-48277-6, 1998

1996
Informationssicherheit in IT-Anwendungen.
HMD Prax. der Wirtschaftsinformatik, 1996

1993
A Lower Bound on Authentication After Having Observed a Sequence of Messages.
J. Cryptology, 1993

1992
Beweisbar sichere Authentikationssysteme: Abschätzungen der Betrugswahrscheinlichkeit und Konstruktionsverfahren.
PhD thesis, 1992

1990
Essentially l-Fold Secure Authentication Systems.
Proceedings of the Advances in Cryptology, 1990

1989
Sicherer Zugang zu Betriebssystemen mit der Chip-Karte.
Proceedings of the Organisation der Datenverarbeitung, 1989

Kann man mit kryptographischen Methoden Viren erkennen?
Proceedings of the GI, 1989


  Loading...