Dieter Gollmann
Affiliations:- Hamburg University of Technology, Germany
According to our database1,
Dieter Gollmann
authored at least 114 papers
between 1984 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021
2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 7th International Conference on Software and Computer Applications, 2018
2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
2016
2015
Proceedings of the 10th ACM Symposium on Information, 2015
Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.
Int. J. Crit. Infrastructure Prot., 2014
Proceedings of the Security Protocols XXII, 2014
Evaluating On-line Model Checking in UPPAAL-SMC using a Laser Tracheotomy Case Study.
Proceedings of the 5th Workshop on Medical Cyber-Physical Systems, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the FM 2014: Formal Methods, 2014
2013
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2012
2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
2009
Int. J. Commun. Syst., 2009
2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Future of Identity in the Information Society, 2008
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Network security fundamentals.
Wiley pathways, Wiley, ISBN: 978-0-470-10192-6, 2008
2007
Proceedings of the Advances in Software Engineering, Lipari Summer School 2007, 2007
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the Computer Aided Systems Theory, 2005
Computer Security, Second Edition.
Wiley, ISBN: 978-0-470-86293-3, 2005
2004
Proceedings of the Security Protocols, 2004
2003
Proceedings of the Global Computing. Programming Environments, 2003
2002
Equally Spaced Polynomials, Dual Bases, and Multiplication in F<sub>2<sup>n</sup></sub>.
IEEE Trans. Computers, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Proceedings of the Security Protocols, 2000
1999
Theor. Comput. Sci., 1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
Proceedings of the 1st Workshop on Smartcard Technology, 1999
Computer Security.
Worlwide series in computer cience, Wiley, ISBN: 978-0-471-97844-2, 1999
1998
Proceedings of the Security Protocols, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Int. J. Comput. Math., 1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Des. Codes Cryptogr., 1996
Proceedings of the Security Protocols, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Proceedings of the Cryptography and Coding, 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Error Detecting Circuits: Michael Gössel and Steffen Graf, McGraw-Hill, Maidenhead, UK (1993) ISBN 0 07 707438 6, £35.00, pp 224.
Microprocess. Microsystems, 1994
1993
The MSc in Information Security at Royal Holloway.
Proceedings of the Computer Security, 1993
Proceedings of the Fast Software Encryption, 1993
1992
Proceedings of the Computer Security, 1992
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Computer Aided Systems Theory - EUROCAST'89, A Selection of Papers from the International Workshop EUROCAST'89, Las Palmas, Spain, February 26, 1989
1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Applied Algebra, 1988
1987
Proceedings of the Advances in Cryptology, 1987
1986
Kaskadenschaltungen taktgesteuerter Schieberegister als Pseudozufallszahlengeneratoren.
PhD thesis, 1986
Linear Complexity of Sequences with Period p<sup>n</sup>.
EUROCRYPT, 1986
Proceedings of the Advances in Cryptology, 1986
1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984