Number of items: 50.
Conference or Workshop Item (A Paper)
Anicic, Darko and Brodie, Michael L. and de Bruijn, Jos and Fensel, Dieter and Haselwanter, Thomas and Hepp, Martin and Heymans, Stijn and Hoffmann, Jörg and Kerrigan, Mick and Kopecký, Jacek and Krummenacher, Reto and Lausen, Holger and Mocan, Adrian and Scicluna, James and Toma, Ioan and Zaremba, Michal
(2006)
A Semantically Enabled Service Oriented Architecture.
Aslan, Ilhan and Schwalm, Maximilian and Baus, Jörg and Krüger, Antonio and Schwartz, Tim
(2006)
Acquisition of spatial knowledge in location aware mobile pedestrian navigation systems.
Backes, Michael and Cachin, Christian and Oprea, Alina
(2006)
Secure Key-Updating for Lazy Revocation.
Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2006)
Cryptographically Sound Security Proofs for Basic and Public-key Kerberos.
Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2006)
Conditional Reactive Simulatability.
Backes, Michael and Laud, Peeter
(2006)
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006)
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
Backes, Michael and Pfitzmann, Birgit
(2006)
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Formal Methods and Cryptography.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
Butz, Andreas and Kray, Christian and Krüger, Antonio and Schwesig, Carsten
(2006)
Workshop W2: multi-user and ubiquitous user interfaces (MU3I 2006).
Butz, Andreas and Krüger, Antonio
(2006)
User-centered development of a pervasive healthcare application.
Domshlak, Carmel and Hoffmann, Jörg
(2006)
Fast Probabilistic Planning through Weighted Model Counting.
Hammer, Christian and Grimme, Martin and Krinke, Jens
(2006)
Dynamic path conditions in dependence graphs.
Hammer, Christian and Krinke, Jens and Nodes, Frank
(2006)
Intransitive Noninterference in Dependence Graphs.
Hammer, Christian and Krinke, Jens and Snelting, Gregor
(2006)
Information Flow Control for Java Based on Path Conditions in Dependence Graphs.
Hein, Matthias
(2006)
Uniform Convergence of Adaptive Graph-Based Regularization.
Hein, Matthias and Maier, Markus
(2006)
Manifold Denoising.
Hoffmann, Jörg and Gomes, Carla P. and Selman, Bart
(2006)
Structure and Problem Hardness: Goal Asymmetry and DPLL Proofs in SAT-Based Planning.
Hoffmann, Jörg and Sabharwal, Ashish and Domshlak, Carmel
(2006)
Friends or Foes? An AI Planning Perspective on Abstraction and Search.
Hoffmann, Jörg and Smaus, Jan-Georg and Rybalchenko, Andrey and Kupferschmid, Sebastian and Podelski, Andreas
(2006)
Using Predicate Abstraction to Generate Heuristic Functions in UPPAAL.
Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2006)
On the (Im-)Possibility of Extending Coin Toss.
Hofheinz, Dennis and Unruh, Dominique
(2006)
Simulatable Security and Polynomially Bounded Concurrent Composition.
Hofheinz, Dennis and Unruh, Dominique
(2006)
An attack on a group-based cryptographic scheme.
Kupferschmid, Sebastian and Hoffmann, Jörg and Dierks, Henning and Behrmann, Gerd
(2006)
Adapting an AI Planning Heuristic for Directed Model Checking.
Leeuwen, M. van and Vreeken, Jilles and Siebes, A.
(2006)
Compression Picks Item Sets That Matter.
Müller, Hans Jörg and Krüger, Antonio
(2006)
MusicSpace: A Multi Perspective Browser for Music Albums.
Müller, Hans Jörg and Schöning, Johannes and Krüger, Antonio
(2006)
Mobile Map Interaction - Evaluation in an indoor scenario.
Siebes, A. and Vreeken, Jilles and Leeuwen, M. van
(2006)
Item Sets that Compress.
Sorge, Christoph
(2006)
Vertragsschluss durch Softwareagenten: Motivation und rechtliche Einordnung.
Sorge, Christoph and Zitterbart, Martina
(2006)
A reputation-based system for confidentiality modeling in peer-to-peer networks.
Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006)
Cryptographically Sound Theorem Proving.
Wasinger, Rainer and Krüger, Antonio
(2006)
Modality preferences in mobile and instrumented environments.
Article
Backes, Michael
(2006)
Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electronic Notes in Theoretical Computer Science (ENTCS), 155.
pp. 111-145.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006)
Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2).
pp. 33-56.
Butz, Andreas and Krüger, Antonio
(2006)
Applying the Peephole Metaphor in a Mixed-Reality Room.
IEEE Computer Graphics and Applications, 26 (1).
56–63.
Hoffmann, Jörg
(2006)
KI 2007: Call for Tutorials.
KI, 20 (4).
p. 65.
Hoffmann, Jörg and Brafman, Ronen I.
(2006)
Conformant planning via heuristic forward search: A new approach.
Artif. Intell., 170 (6-7).
507–541.
Hoffmann, Jörg and Edelkamp, Stefan and Thiébaux, Sylvie and Englert, Roman and dos Liporace, Frederico S. and Trüg, Sebastian
(2006)
Engineering Benchmarks for Planning: the Domains Used in the Deterministic Part of IPC-4.
J. Artif. Intell. Res., 26.
453–541.
Rolli, Daniel and Conrad, Michael and Neumann, Dirk and Sorge, Christoph
(2006)
Distributed Ascending Proxy Auction: A Cryptographic Approach.
Wirtschaftsinformatik, 48 (1).
pp. 7-15.
Unruh, Dominique
(2006)
Quantum Programming Languages.
Informatik - Forschung und Entwicklung, 21 (1).
pp. 55-63.
Book Section
Sorge, Christoph and Dreier, Thomas and Zitterbart, Martina
(2006)
Trust and the Law.
In:
UNSPECIFIED
Universitätsverlag Karlsruhe, pp. 45-56.
Book
UNSPECIFIED, ed.
(2006)
Smart Graphics, 6th International Symposium, SG 2006, Vancouver, Canada, July 23-25, 2006, Proceedings.
Lecture Notes in Computer Science, 4073
.
Springer.
Backes, Michael and Gritzalis, Stefanos and Preneel, Bart and Katsikas, Sokratis K and Lopez, Javier
(2006)
Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece.
Lecture Notes in Computer Science, 4176
.
Springer.
Other
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006)
Games and the Impossibility of Realizable Ideal Functionality.
Backes, Michael and Laud, Peeter
(2006)
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
(Unpublished)
Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006)
On the Necessity of Rewinding in Secure Multiparty Computation.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Soundness Limits of Dolev-Yao Models.
Müller-Quade, Jörn and Unruh, Dominique
(2006)
Composable Deniability (abstract).
Unruh, Dominique and Müller-Quade, Jörn and Hofheinz, Dennis
(2006)
A Simple Model of Polynomial Time UC (abstract).
This list was generated on Thu Nov 21 06:31:59 2024 CET.