Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Görgen, Daniel; Frey, Hannes; Hiedels, Christian
JANE - A Simulation Platform for Ad Hoc Network Applications2006 S. 1 - 9
Zöbel, Dieter; Balcerak, Elisabeth; Weidenfeller, Thorsten
Minimum Parking Maneuvers for Articulated Vehicles with One-Axle TrailersLihua Xie (Hrsg). Proceedings of the Ninth International Conference on Control, Automation, Robotics and Vision ICARCV 2006: 5-8 December 2006; Singapore. Bd. 4. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2006 S. 1634 - 1639
Jürjens, Jan
Model-Based Security Engineering for RealJayadev Misra; Tobias Nipkow; Emil Sekerinski (Hrsg). FM 2006: Formal Methods: 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006. Proceedings. Berlin: Springer 2006 S. 600 - 606
Jürjens, Jan
Model-Based Security Engineering with UML: Introducing Security AspectsFrank S. de Boer; Marcello M. Bonsangue; Susanne Graf; Willem-Paul de Roever (Hrsg). Formal Methods for Components and Objects: 4th International Symposium, FMCO 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures. Berlin: Springer 2006 S. 64 - 87
Jürjens, Jan
Model-based Security Engineering: KeynoteSECRYPT. 2006
Jürjens, Jan
Modeling and Compositional Design for Secure Embedded Systems (Invited Talk)NSF-IST workshop: Long Term Challenges in High Confidence Composable Embedded Systems, Helsinki (Finland), June 20--23, 2006. 2006
Ganzinger, Harald; Sofronie-Stokkermans, Viorica; Waldmann, Uwe
Modular proof systems for partial functions with Evans equalityInformation and Computation. Bd. 204. H. 10. Amsterdam: Elsevier 2006 S. 1453 - 1492
Frey, Hannes; Stojmenovic, Ivan
On Delivery Guarantees of Face and Combined Greedy Face routing in Ad Hoc and Sensor NetworksMario Gerla; Chiara Petrioli; Ram Ramjee (Hrsg). MobiCom'06: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking; September 24–29, 2006; Los Angeles, California, USA. New York, NY: ACM Association for Computing Machinery 2006 S. 390 - 401
Jürjens, Jan
Security Analysis of Crypto-based Java Programs using Automated Theorem ProversShinichi Honiden; Sebastian Uchitel; Steve Easterbrook (Hrsg). Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering ASE 2006: 18 - 22 September 2006; Tokyo, Japan. Los Alamitos, CA: IEEE Computer Society 2006 S. 167 - 176
Jürjens, Jan
Sicherheit - Wo stehen wir heute aus Sicht der Wissenschaft?Microsoft DevDays Security 2006. Munich. 2006