Udo Payer

According to our database1, Udo Payer authored at least 19 papers between 1998 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Performance evaluation of IPv6 label switched paths for wireless sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
Event Correlation on the Basis of Activation Patterns.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

From NLP (Natural Language Processing) to MLP (Machine Language Processing).
Proceedings of the Computer Network Security, 2010

WLAN location determination without active client collaboration.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods.
Int. J. Netw. Secur., 2009

Secure Routing Approach for Unstructured P2P Systems.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Security concept for peer-to-peer systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning.
Proceedings of the Electronic Participation, First International Conference, 2009

2008
General security concept for embedded P2P systems.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

InFeCT - Network Traffic Classification.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2005
Massive Data Mining for Polymorphic Code Detection.
Proceedings of the Computer Network Security, 2005

Hybrid Engine for Polymorphic Shellcode Detection.
Proceedings of the Detection of Intrusions and Malware, 2005

Polymorphic Code Detection with GA Optimized Markov Models.
Proceedings of the Communications and Multimedia Security, 2005

2004
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS).
Proceedings of the One step ahead, 2004

2002
Automatic authentication based on the Austrian citizen card.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2000
Robustness-Agile Encryptor for ATM Networks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A 155 Mbps Triple-DES Network Encryptor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

1998
A Hardware-Independent Encryption Model for ATM Devices.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998


  Loading...