Number of items: 32.
Conference or Workshop Item (A Paper)
Backes, Michael
(2004)
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
Backes, Michael and Bagga, Walid and Karjoth, Günter and Schunter, Matthias
(2004)
Efficient Comparison of Enterprise Privacy Policies.
Backes, Michael and Dürmuth, Markus and Karjoth, Günter
(2004)
Unification in Privacy Policy Evaluation - Translating EPAL to Prolog.
Backes, Michael and Dürmuth, Markus and Steinwandt, Rainer
(2004)
An Algebra for Composing Enterprise Privacy Policies.
Backes, Michael and Hofheinz, Dennis
(2004)
How to Break and Repair a Universally Composable Signature Functionality.
Backes, Michael and Pfitzmann, Birgit
(2004)
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
A General Composition Theorem for Secure Reactive System.
Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004)
Low-level Ideal Signatures and General Integrity Idealization.
Becker, Bernd and Behle, Markus and Eisenbrand, Friedrich and Franzle, Martin and Herbstritt, Marc and Herde, Christian and Hoffmann, Jörg and Kröning, Daniel and Nebel, Bernhard and Polian, Ilia and Wimmer, Ralf
(2004)
Bounded Model Checking and Inductive Verification of Hybrid Discrete-continuous Systems.
Brafman, Ronen I. and Hoffmann, Jörg
(2004)
Conformant Planning via Heuristic Forward Search: A New Approach.
Butz, Andreas and Gross, Markus H. and Krüger, Antonio
(2004)
TUISTER: a tangible UI for hierarchical structures.
Butz, Andreas and Krüger, Antonio and Kray, Christian and Schmidt, Albrecht
(2004)
Workshop W5: multi-user and ubiquitous user interfaces (MU3I).
Hammer, Christian and Snelting, Gregor
(2004)
An improved slicer for Java.
Hein, Matthias and Lal, Thomas Navin and Bousquet, Olivier
(2004)
Hilbertian Metrics on Probability Measures and Their Application in SVM?s.
Krüger, Antonio and Aslan, Ilhan and Zimmer, Hubert D.
(2004)
The Effects of Mobile Pedestrian Navigation Systems on the Concurrent Acquisition of Route and Survey Knowledge.
Krüger, Antonio and Butz, Andreas and Müller, Christian A. and Stahl, Christoph and Wasinger, Rainer and Steinberg, Karl-Ernst and Dirschl, Andreas
(2004)
The connected user interface: realizing a personal situated navigation service.
Rocchi, Cesare and Stock, Oliviero and Zancanaro, Massimo and Kruppa, Michael and Krüger, Antonio
(2004)
The museum visit: generating seamless personalized presentations on multiple devices.
Sorge, Christoph and Bergfelder, Martin
(2004)
Signatures by electronic agents: a legal perspective.
Trüg, Sebastian and Hoffmann, Jörg and Nebel, Bernhard
(2004)
Applying Automatic Planning Systems to Airport Ground-Traffic Control - A Feasibility Study.
Wiering, Marco and Van Veenen, Jelle and Vreeken, Jilles and Koopman, Arne
(2004)
Simulation and Optimization of Traffic in a City.
Article
Backes, Michael and Pfitzmann, Birgit
(2004)
Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1).
pp. 42-60.
Backes, Michael and Pfitzmann, Birgit
(2004)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10).
pp. 2075-2086.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004)
Polynomial Liveness.
Journal of Computer Security, 12 (3-4).
pp. 589-617.
Hoffmann, Jörg
(2004)
Utilizing Problem Structure in Planning: A Local Search Approach.
KI, 18 (2).
p. 55.
Hoffmann, Jörg and Porteous, Julie and Sebastia, Laura
(2004)
Ordered Landmarks in Planning.
J. Artif. Intell. Res., 22.
215–278.
Krüger, Antonio and Malaka, Rainer
(2004)
Artificial Intelligence Goes Mobile.
Applied Artificial Intelligence, 18 (6).
469–476.
Krüger, Jochen
(2004)
Der Richtervorbehalt als Königsweg für den Schutz von Grundrechten?
Deutsche Richterzeitung, 82 (9).
pp. 247-250.
Wasinger, Rainer and Krüger, Antonio
(2004)
Multi-modal Interaction with Mobile Navigation Systems (Multimodale Interaktion mit Mobilen Navigationssystemen).
it - Information Technology, 46 (6).
322–331.
Book Section
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
Justifying a Dolev-Yao Model under Active Attacks.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 3655
.
Springer, pp. 1-42.
Book
UNSPECIFIED, ed.
(2004)
4th International Symposium, SG 2004, Banff, Canada, May 23-25, 2004, Proceedings.
Lecture Notes in Computer Science, 3031
.
Springer.
Other
Unruh, Dominique
(2004)
Classical Control in Quantum Programs.
Unruh, Dominique
(2004)
Simulatable security for quantum protocols.
This list was generated on Tue Dec 10 18:22:59 2024 CET.