Search Results - "Staamann, S."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Extensions to an authentication technique proposed for the global mobility network by Buttyan, L., Gbaguidi, C., Staamann, S., Wilhelm, U.

    Published in IEEE transactions on communications (01-03-2000)
    “…We present three attacks on the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE…”
    Get full text
    Journal Article
  2. 2

    A pessimistic approach to trust in mobile agent platforms by Wilhelm, U.G., Staamann, S.M., Buttyan, L.

    Published in IEEE internet computing (01-09-2000)
    “…The problem of protecting an execution environment from possibly malicious mobile agents has been studied extensively, but the reverse problem, protecting the…”
    Get full text
    Journal Article
  3. 3

    A simple logic for authentication protocol design by Buttyan, L., Staamann, S., Wilhelm, U.

    “…The authors describe a simple logic. The logic uses the notion of channels that are generalisations of communication links with various security properties…”
    Get full text
    Conference Proceeding
  4. 4

    Security in the Telecommunications Information Networking Architecture-the CrySTINA approach by Staamann, S., Wilhelm, U., Schiper, A., Buttyan, L., Hubaux, J.-P.

    “…We present the first results of the CrySTINA project. We analyze and structure the security problem domain in the TINA-C architecture and present our approach…”
    Get full text
    Conference Proceeding
  5. 5

    Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example by Heinrich, E., Staamann, S., Joost, R., Salomon, R.

    “…Field-programmable gate arrays provide a flexible and easy-to-configure implementation platform that supports the development of tamper-proof networked…”
    Get full text
    Conference Proceeding
  6. 6

    Security Analysis of the Utilization of Corba Object References as Authorization Tokens by Becker, C., Staamann, S., Salomon, R.

    “…In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system…”
    Get full text
    Conference Proceeding
  7. 7

    Workshop on Electronic Commerce (Welcom) Foreward by Staamann, S., Wilhelm, U.

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding