Reinhard Posch
Affiliations:- Graz University of Technology, Austria
According to our database1,
Reinhard Posch
authored at least 62 papers
between 1979 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
1980
1985
1990
1995
2000
2005
2010
2015
0
1
2
3
4
5
6
1
1
1
4
1
4
2
1
1
2
2
1
1
1
2
1
2
3
1
1
1
1
1
1
5
2
3
3
1
4
1
1
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
On csauthors.net:
Bibliography
2015
Proceedings of the Informatics in the Future, 2015
2013
Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 2013
2011
Proceedings of the Rainbow of Computer Science, 2011
2010
Comput. Secur., 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
2008
Proceedings of the BIOSIG 2008, 2008
2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
2002
Identification and Confidentiality for e-Government.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002
Proceedings of the Electronic Government, First International Conference, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Der Mensch im Cyberspace.
Proceedings of the Mensch-Computer Interktion (MCI) im 21. Jahrhundert / Human-Computer Interaction (HCI) in the 21st Century, 2001
Digitale Signaturen in der Praxis.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001
2000
The Business Of Electronic Government.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000
Robustness-Agile Encryptor for ATM Networks.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
1999
Neue Möglichkeiten und Anforderungen für Krypto-Koprozessoren.
Datenschutz und Datensicherheit, 1999
Proceedings of the Intelligence in Networks, 1999
ISDN Security services.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Router-basierter ISDN/IP-Zugang für einen Primärratenanschluß / Router-based LAN-Access Over ISDN.
Informationstechnik Tech. Inform., 1998
Int. J. Satell. Commun. Netw., 1998
RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography.
Comput. Secur., 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1996
Proceedings of the 5th Workshop on Enabling Technologies, 1996
A hierarchical threshold scheme with unique partial keys.
Proceedings of the Information Systems Security, 1996
ISDN LAN Access: Remote Access Security and User Profile Management.
Proceedings of the Communications and Multimedia Security II, 1996
A study of TCP/IP throughout performance in heterogeneous ATM local area networks.
Proceedings of the ATM Networks, 1996
1995
IEEE Trans. Parallel Distributed Syst., 1995
J. Univers. Comput. Sci., 1995
1994
Proceedings of the High-Performance Computing and Networking, 1994
1993
Proceedings of the 12th International Conference on Computer Safety, 1993
1992
Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing, 1992
1991
A Conceptual View of MS-DOS File System Security.
Wirtschaftsinf., 1991
Proceedings of the Parallel Computation, First International ACPC Conference, Salzburg, Austria, September 30, 1991
1990
Eine Erweiterung der Farbtabelle durch einen deterministischen Realtime-Schedule.
Wirtschaftsinf., 1990
Microprocessing and Microprogramming, 1990
1988
Ein automatisiertes Examensprüfungswesen an der TU Graz auf der Basis eines Fileserver-orientierten Mailboxsystems.
Angew. Inform., 1988
Multiuser-Software Security.
Angew. Inform., 1988
1987
Comput. Graph., 1987
1985
Verwendung dynamischer Verdichtungsverfahren zur Erhöhung der Übertragungsleistung auf langsamen Datenverbindungen.
Angew. Inform., 1985
Proceedings of the GI/OCG/ÖGI-Jahrestagung 1985, 1985
1984
Softw. Pract. Exp., 1984
1983
Interruptstrukturen in Systemen mit Datenfernverarbeitungsumgebung.
Angew. Inform., 1983
Ein neuartiges - durch spezielle Hardware unterstütztes - Terminalkonzept für Bildschirmtext.
Angew. Inform., 1983
1982
Transparente Protokolle als Alternative herstellerspezifische Terminalbehandlung.
Angew. Inform., 1982
1980
Ein Vorschlag zur Behandlung von prozedurfreien asynchronen Terminals im Halbduplex-Verfahren.
Angew. Inform., 1980
Inf. Manag., 1980
1979
ACM SIGCSE Bull., 1979
Proceedings of the GI - 9. Jahrestagung, Bonn, 1.-5. Oktober 1979, Proceedings, 1979