Author of the publication

Protecting a Mobile Agent's Route against Collusions.

, , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group Key Agreement Protocol Based on GH-KEP., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 619-623. Springer, (2004)Bezahlen in der Virtuellen Universität., , , and . D-CSCL, page 261. Physica-Verlag / Springer, (2000)Simulation zur Leistungsbewertung des D-Kanalprotokolls im ISDN., and . ASIM, page 40-45. Vieweg, (1991)Die Rolle der Kryptologie in der Kommunikationstechnik., , and . Informationstechnik Tech. Inform., 41 (1): 42-47 (1999)Protecting a Mobile Agent's Route against Collusions., , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)On Central Spanning Trees of a Graph., , and . Combinatorics and Computer Science, volume 1120 of Lecture Notes in Computer Science, page 53-57. Springer, (1995)Methods for Protecting a Mobile Agent's Route., , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 57-71. Springer, (1999)Experiences in On-Line Tutoring of Multimedia Courses in Distance Education., , , and . Teleteaching, volume 120 of books@ocg.at, page 549-558. Austrian Computer Society, (1998)Group Oriented Digital Certificate Architecture., , and . CEC, page 233-237. IEEE Computer Society, (2003)A Behavioural Approach for the Coordination of Open Source Software Intermediaries., , and . GI Jahrestagung (2), volume P-51 of LNI, page 504-508. GI, (2004)