Items where Year is 2003

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 29.

Conference or Workshop Item (A Paper)

Backes, Michael
(2003) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions (Extended Abstract).
In: Proceedings of 14th International Conference on Concurrency Theory (CONCUR).

Backes, Michael and Cachin, Christian
(2003) Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries.
In: Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN).

Backes, Michael and Cachin, Christian and Strobl, Reto
(2003) Proactive Secure Message Transmission in Asynchronous Networks.
In: Proceedings of 22nd ACM Symposium on Principles of Distributed Computing (PODC).

Backes, Michael and Jacobi, Christian
(2003) Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
In: Proceedings of 20th International Symposium on Theoretical Aspects of Computer Science (STACS).

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
In: Proceedings of 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Pfitzmann, Birgit
(2003) Intransitive Non-Interference for Cryptographic Purposes.
In: Proceedings of 24th IEEE Symposium on Security and Privacy.

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) A Composable Cryptographic Library with Nested Operations.
In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Reactively Secure Signature Schemes.
In: Proceedings of 6th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Security in Business Process Engineering.
In: Proceedings of 2003 International Conference on Business Process Management.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Schunter, Matthias
(2003) From Absence of Certain Vulnerabilities towards Security Proofs - Pushing the Limits of Formal Verification.
In: Proceedings of the 10th ACM Workshop on New Security Paradigms (NSPW).

Bousquet, Olivier and Chapelle, Olivier and Hein, Matthias
(2003) Measure Based Regularization.
In: Advances in Neural Information Processing Systems 16 Neural Information Processing Systems, {NIPS} 2003, December 8-13, 2003, Vancouver and Whistler, British Columbia, Canada.

Heckmann, Dominik and Krüger, Antonio
(2003) A User Modeling Markup Language (UserML) for Ubiquitous Computing.
In: User Modeling 2003, 9th International Conference, UM 2003, Johnstown, PA, USA, June 22-26, 2003, Proceedings.

Hein, Matthias and Bousquet, Olivier
(2003) Maximal Margin Classification for Metric Spaces.
In: Computational Learning Theory and Kernel Machines, 16th Annual Conference on Computational Learning Theory and 7th Kernel Workshop, COLT/Kernel 2003, Washington, DC, USA, August 24-27, 2003, Proceedings.

Hoffmann, Jörg and Geffner, Hector
(2003) Branching Matters: Alternative Branching in Graphplan.
In: Proceedings of the Thirteenth International Conference on Automated Planning and Scheduling (ICAPS 2003), June 9-13, 2003, Trento, Italy.

Kray, Christian and Krüger, Antonio and Endres, Christoph
(2003) Some Issues on Presentations in Intelligent Environments.
In: Ambient Intelligence, First European Symposium, EUSAI 2003, Veldhoven, The Netherlands, November 3.-4, 2003, Proceedings.

Kruppa, Michael and Krüger, Antonio
(2003) Concepts for a comined use of Personal Digital Assistants and large remote displays.
In: Simulation und Visualisierung 2003 (SimVis 2003), 6-7 März 2003, Magdeburg.

Krüger, Antonio
(2003) Life-like Characters for the Personal Exploration of Active Cultural Heritage.
In: Intelligent Agents, 4th International Workshop, IVA 2003, Kloster Irsee, Germany, September 15-17, 2003, Proceedings.

Thiébaux, Sylvie and Hoffmann, Jörg and Nebel, Bernhard
(2003) In Defense of PDDL Axioms.
In: IJCAI-03, Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, Acapulco, Mexico, August 9-15, 2003.

Wasinger, Rainer and Stahl, Christoph and Krüger, Antonio
(2003) M3I in a Pedestrian Navigation & Exploration System.
In: Human-Computer Interaction with Mobile Devices and Services, 5th International Symposium, Mobile HCI 2003, Udine, Italy, September 8-11, 2003, Proceedings.

Wasinger, Rainer and Stahl, Christoph and Krüger, Antonio
(2003) Robust speech interaction in a mobile environment through the use of multiple and different media input types.
In: 8th European Conference on Speech Communication and Technology, EUROSPEECH 2003 - INTERSPEECH 2003, Geneva, Switzerland, September 1-4, 2003.

Article

Hoffmann, Jörg
(2003) The Metric-FF Planning System: Translating ”Ignoring Delete Lists” to Numeric State Variables.
J. Artif. Intell. Res., 20. 291–341.

Thesis

Hammer, Christian
(2003) A Program Slicer for Java.
Masters thesis, Universit.

Unruh, Dominique
(2003) Zufallsextraktoren für Quellen variierender Qualität.
Masters thesis, Institut für Algorithmen und Kognitive Systeme, University of Karlsruhe.

Book

UNSPECIFIED, ed.
(2003) Smart Graphics, Third International Symposium, SG 2003, Heidelberg, Germany, July 2-4, 2003, Proceedings.
Lecture Notes in Computer Science, 2733 . Springer.

Backes, Michael and Basin, David and Waidner, Michael
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.

Hoffmann, Jörg
(2003) Utilizing Problem Structure in Planning, A Local Search Approach.
Lecture Notes in Computer Science, 2854 . Springer.

Other

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
UNSPECIFIED
.

This list was generated on Tue Dec 3 01:44:21 2024 CET.