Stephan

Results: 3557



#Item
1Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
2Pressemitteilung Zürich, Weinclub.com startet neue Video-Serie „Entkorkt – Der Wein-Tipp“ mit Winzer Stephan Herter §

Pressemitteilung Zürich, Weinclub.com startet neue Video-Serie „Entkorkt – Der Wein-Tipp“ mit Winzer Stephan Herter §

Add to Reading List

Source URL: www.wg-digital.com

Language: German - Date: 2016-05-10 05:02:54
    3We know (nearly) nothing! But can we learn? ? Stephan Schulz

    We know (nearly) nothing! But can we learn? ? Stephan Schulz

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-08-08 03:28:43
      4Conceptual Framework for Legal & Risk Assessment of Blockchain Crypto Property (BCP) Dr. Luka Müller, Stephan D. Meyer, Christine Gschwend, Peter Henschel  Genesis Version

      Conceptual Framework for Legal & Risk Assessment of Blockchain Crypto Property (BCP) Dr. Luka Müller, Stephan D. Meyer, Christine Gschwend, Peter Henschel Genesis Version

      Add to Reading List

      Source URL: www.mme.ch

      Language: English - Date: 2017-09-27 09:18:40
      5NBER WORKING PAPER SERIES  OF MICE AND MERCHANTS: TRADE AND GROWTH IN THE IRON AGE Jan David Bakker Stephan Maurer

      NBER WORKING PAPER SERIES OF MICE AND MERCHANTS: TRADE AND GROWTH IN THE IRON AGE Jan David Bakker Stephan Maurer

      Add to Reading List

      Source URL: econ.lse.ac.uk

      Language: English - Date: 2018-09-04 09:49:33
      6Lightweight Asynchronous Snapshots for Distributed Dataflows Paris Carbone1 Gyula F´ora2  Stephan Ewen3

      Lightweight Asynchronous Snapshots for Distributed Dataflows Paris Carbone1 Gyula F´ora2 Stephan Ewen3

      Add to Reading List

      Source URL: kth.diva-portal.org

      Language: English - Date: 2015-06-28 16:05:52
      7A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

      A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

      Add to Reading List

      Source URL: nsg.ee.ethz.ch

      Language: English - Date: 2017-11-30 09:02:54
      8Towards Strong Higher-Order Automation for Fast Interactive Verification Jasmin Christian Blanchette1,2,3 , Pascal Fontaine3 , Stephan Schulz4 , and Uwe Waldmann2 1

      Towards Strong Higher-Order Automation for Fast Interactive Verification Jasmin Christian Blanchette1,2,3 , Pascal Fontaine3 , Stephan Schulz4 , and Uwe Waldmann2 1

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2017-07-30 15:10:52
      9We know (nearly) nothing! But can we learn? Stephan Schulz DHBW Stuttgart

      We know (nearly) nothing! But can we learn? Stephan Schulz DHBW Stuttgart

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2017-07-30 15:10:46
      10

      PDF Document

      Add to Reading List

      Source URL: stephan-haimerl.de

      - Date: 2010-08-27 10:56:49