Uwe G. Wilhelm

According to our database1, Uwe G. Wilhelm authored at least 13 papers between 1995 and 2003.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2003
Active Data Protection with Data Journals.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2000
Extensions to an authentication technique proposed for the global mobility network.
IEEE Trans. Commun., 2000

A Pessimistic Approach to Trust in Mobile Agent Platforms.
IEEE Internet Comput., 2000

Solving Fair Exchange with Mobile Agents.
Proceedings of the Agent Systems, 2000

1999
Workshop on Electronic Commerce - Foreword.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Introducing Trusted Third Parties to the Mobile Agent Paradigm.
Proceedings of the Secure Internet Programming, 1999

Closed user groups in Internet service centres.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999

1998
On the Problem of Trust in Mobile Agent Systems.
Proceedings of the Network and Distributed System Security Symposium, 1998

Protecting the Itinerary of Mobile Agents.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

A Simple Logic for Authentication Protocol Design.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Cryptographic Protection of Connection Integrity with Interruption Detection in TINA.
Proceedings of the Distributed Applications and Interoperable Systems, Proceedings IFIP TC 6.1 Working Conference DAIS'97, Cottbus, Germany, September 30, 1997

Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

1995
A Hierarchy of Totally Ordered Multicasts.
Proceedings of the 14th Symposium on Reliable Distributed Systems, 1995


  Loading...