default search action
Rüdiger Weis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c13]Christian Ascher, Christoph Kessler, Rüdiger Weis, Gert F. Trommer:
Multi-floor map matching in indoor environments for mobile platforms. IPIN 2012: 1-8 - 2010
- [c12]Rüdiger Weis, Brian Schüler, Stefan A. Flemming:
Towards Secure and Reliable Firewall Systems based on MINIX3. Sicherheit 2010: 85-92
2000 – 2009
- 2003
- [j10]Rüdiger Weis, Stefan Lucks, Andreas Bogk:
Sicherheit von 1024 bit RSA-Schlüsseln gefährdet. Datenschutz und Datensicherheit 27(6) (2003) - [c11]Stefan Lucks, Rüdiger Weis:
How to turn a PIN into an Iron Beam. SEC 2003: 385-396 - 2002
- [j9]Stefan Lucks, Rüdiger Weis:
Neue Ergebnisse zur Sicherheit des Verschlüsselungsstandards AES. Datenschutz und Datensicherheit 26(12) (2002) - 2001
- [j8]Rüdiger Weis, Stefan Lucks:
Standardmäßige Wave-LAN Unsicherheit. Datenschutz und Datensicherheit 25(11) (2001) - 2000
- [b1]Rüdiger Weis:
Cryptographic protocols and algorithms for distributed multimedia systems. University of Mannheim, Germany, Shaker 2000, ISBN 978-3-8265-8280-6, pp. 1-200 - [j7]Werner Geyer, Rüdiger Weis:
The design and the security concept of a collaborative whiteboard. Comput. Commun. 23(3): 233-241 (2000) - [j6]Rüdiger Weis, Stefan Lucks, Werner Geyer:
Stand der Faktorisierungsforschung. Datenschutz und Datensicherheit 24(3) (2000) - [j5]Rüdiger Weis, Stefan Lucks:
Die dritte AES-Konferenz in New York - Vor der Entscheidung über den DES Nachfolger. Datenschutz und Datensicherheit 24(7) (2000) - [j4]Erik Zenner, Rüdiger Weis, Stefan Lucks:
Sicherheit des GSM- Verschlüsselungsstandards A5. Datenschutz und Datensicherheit 24(7) (2000) - [j3]Stefan Lucks, Rüdiger Weis:
Der DES-Nachfolger Rijndael. Datenschutz und Datensicherheit 24(12) (2000) - [c10]Stefan Lucks, Rüdiger Weis:
How to Make DES-based Smartcards fit for the 21-st Century. CARDIS 2000: 93-114 - [c9]Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks:
Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Streams. IEEE International Conference on Multimedia and Expo (I) 2000: 537-540 - [c8]Rüdiger Weis, Jürgen Vogel, Wolfgang Effelsberg, Werner Geyer, Stefan Lucks:
How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications. IDMS 2000: 187-198 - [c7]Rüdiger Weis, Bastiaan Bakker, Stefan Lucks:
Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring. Java Card Workshop 2000: 151-162 - [c6]Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks:
Combining Authentication and Light-Weight Payment for Active Networks. SMARTNET 2000: 453-468
1990 – 1999
- 1999
- [j2]Rüdiger Weis, Stefan Lucks:
Advanced Encryption Standard - Verschlüsselungsstandard für das einundzwanzigste Jahrhundert. Datenschutz und Datensicherheit 23(9) (1999) - [j1]Rüdiger Weis, Stefan Lucks:
Sichere, Standardisierte, Symmetrische Verschlüsselung auf Basis von DES und AES. Prax. Inf.verarb. Kommun. 22(4): 226-232 (1999) - [c5]Rüdiger Weis, Stefan Lucks:
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. ECMAST 1999: 456-471 - [c4]Rüdiger Weis:
A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards. Conference on Information Security Management & Small Systems Security 1999: 1-10 - [c3]Stefan Lucks, Rüdiger Weis:
Remotely Keyed Encryption Using Non-Encrypting Smart Cards. Smartcard 1999 - 1998
- [c2]Rüdiger Weis, Stefan Lucks:
The Performance of Modern Block Ciphers in Java. CARDIS 1998: 125-133 - [c1]Werner Geyer, Rüdiger Weis:
A Secure, Accountable, and Collaborative Whiteboard. IDMS 1998: 3-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint