Extensions to an authentication technique proposed for the global mobility network
Buttyan, L., Gbaguidi, C., Staamann, S., Wilhelm, U.
Published in IEEE transactions on communications (01.03.2000)
Published in IEEE transactions on communications (01.03.2000)
Get full text
Journal Article
A simple logic for authentication protocol design
Buttyan, L., Staamann, S., Wilhelm, U.
Published in Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238) (1998)
Published in Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238) (1998)
Get full text
Conference Proceeding
Security in the Telecommunications Information Networking Architecture-the CrySTINA approach
Staamann, S., Wilhelm, U., Schiper, A., Buttyan, L., Hubaux, J.-P.
Published in Proceedings TINA '97 - Global Convergence of Telecommunications and Distributed Object Computing (1997)
Published in Proceedings TINA '97 - Global Convergence of Telecommunications and Distributed Object Computing (1997)
Get full text
Conference Proceeding
Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example
Heinrich, E., Staamann, S., Joost, R., Salomon, R.
Published in 2008 IEEE International Conference on Emerging Technologies and Factory Automation (01.09.2008)
Published in 2008 IEEE International Conference on Emerging Technologies and Factory Automation (01.09.2008)
Get full text
Conference Proceeding
Workshop on Electronic Commerce (Welcom) Foreward
Staamann, S., Wilhelm, U.
Published in Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (1999)
Published in Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (1999)
Get full text
Conference Proceeding