Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 2016, p.344-353
2016

IEEE/ACM transactions on networking, 2014-08, Vol.22 (4), p.1232-1244
2014

The Journal of systems and software, 2013-03, Vol.86 (3), p.707-715
2013
Link zum Volltext


Proceedings of the 2014 ACM SIGSAC Conference on computer and communications security, 2014, p.441-452
2014
Link zum Volltext

IEEE/ACM transactions on networking, 2017-06, Vol.25 (3), p.1517-1527
2017

Lecture notes in computer science, 2006, p.12-25
2006
Link zum Volltext

Proceedings of the 18th ACM conference on computer and communications security, 2011, p.215-226
2011
Link zum Volltext

Proceedings of the 15th ACM conference on computer and communications security, 2008, p.267-278
2008
Link zum Volltext

Proceedings of the 18th ACM conference on computer and communications security, 2011, p.187-200
2011
Link zum Volltext

Proceedings of the 17th ACM conference on computer and communications security, 2010, p.684-686
2010
Link zum Volltext

Conference on Computer and Communications Security: Proceedings of the 14th ACM conference on Computer and communications security; 28-31 Oct. 2007, 2007, p.92-102
2007
Link zum Volltext

Proceedings of the 17th ACM conference on computer and communications security, 2010, p.711-713
2010
Link zum Volltext

Proceedings of the 17th ACM conference on computer and communications security, 2010, p.308-318
2010
Link zum Volltext

Lecture notes in computer science, 2006, p.368-383
2006
Link zum Volltext


Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006, p.171-176
2006

Recent Advances in Intrusion Detection, p.155-174
Link zum Volltext

Applied Cryptography and Network Security, p.373-391
Link zum Volltext

Open Access
Multiplicative Differentials
Fast Software Encryption, 2002, p.17-33
2002
Link zum Volltext

Information, Security and Cryptology – ICISC 2009, p.258-273
Link zum Volltext

Conference on Computer and Communications Security: Proceedings of the 2007 ACM workshop on Computer security architecture; 02-02 Nov. 2007, 2007, p.54-62
2007
Link zum Volltext

Proceedings of the 2007 ACM workshop on privacy in electronic society, 2007, p.48-55
2007
Link zum Volltext