Tage Stabell-Kulø

According to our database1, Tage Stabell-Kulø authored at least 21 papers between 1997 and 2007.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
A methodology for verification of digital items in fair exchange protocols with active trustee.
Electron. Commer. Res., 2007

Gaining Flexibility by Security Protocol Transfer.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Conflict Resolution for User-Selected Names in Collaborative Systems.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

A Decentralized Authorization Architecture.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
From the Editor: Security Community-Blurring the Line between Authentication and Identification.
IEEE Distributed Syst. Online, 2006

Cordial Security Protocol Programming.
Proceedings of the Security Protocols, 2006

Cordial Security Protocol Programming.
Proceedings of the Security Protocols, 2006

Names in Cryptographic Protocols.
Proceedings of the Security in Information Systems, 2006

The Role of Reflective Middleware in Supporting Flexible Security Policies.
Proceedings of the Conference Proceedings NODe 2006, 2006

2005
Public-Key Cryptography and Availability.
Proceedings of the Computer Safety, 2005

2003
Security and Middleware.
Proceedings of the 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), 2003

Pesto Flavoured Security.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Reflective Middleware and Security: OOPP meets Obol.
Proceedings of the International Middleware Conference, 2003

2000
Smartcards: Hot to Put them to Use in a User-Centric System.
Proceedings of the Handheld and Ubiquitous Computing, Second International Symposium, 2000

1999
Offline Delegation.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Providing Authentication to Messages Signed with a Smart Card in Hostile Environment.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

The Open-End Argument for Private Computing.
Proceedings of the Handheld and Ubiquitous Computing, First International Symposium, 1999

1998
User Controlled Sharing in a Variable Connected Distributed System.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Detecting Key-Dependencies.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Security and Log Structured File Systems.
ACM SIGOPS Oper. Syst. Rev., 1997

Security Functions for a File Repository.
ACM SIGOPS Oper. Syst. Rev., 1997


  Loading...