Up a level |
(2003) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions (Extended Abstract).
(2003) Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries.
(2003) Proactive Secure Message Transmission in Asynchronous Networks.
(2003) Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
(2003) Intransitive Non-Interference for Cryptographic Purposes.
(2003) A Toolkit for Managing Enterprise Privacy Policies.
(2003) A Composable Cryptographic Library with Nested Operations.
(2003) Reactively Secure Signature Schemes.
(2003) Security in Business Process Engineering.
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
(2003) From Absence of Certain Vulnerabilities towards Security Proofs - Pushing the Limits of Formal Verification.
(2003) Measure Based Regularization.
(2003) A User Modeling Markup Language (UserML) for Ubiquitous Computing.
(2003) Maximal Margin Classification for Metric Spaces.
(2003) Branching Matters: Alternative Branching in Graphplan.
(2003) Some Issues on Presentations in Intelligent Environments.
(2003) Concepts for a comined use of Personal Digital Assistants and large remote displays.
(2003) Life-like Characters for the Personal Exploration of Active Cultural Heritage.
(2003) In Defense of PDDL Axioms.
(2003) M3I in a Pedestrian Navigation & Exploration System.
(2003) Robust speech interaction in a mobile environment through the use of multiple and different media input types.
(2003) The Metric-FF Planning System: Translating ”Ignoring Delete Lists” to Numeric State Variables.
(2003) A Program Slicer for Java.
(2003) Zufallsextraktoren für Quellen variierender Qualität.
(2003) Smart Graphics, Third International Symposium, SG 2003, Heidelberg, Germany, July 2-4, 2003, Proceedings.
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
(2003) Utilizing Problem Structure in Planning, A Local Search Approach.
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).