Michael Reiter

Results: 71



#Item
41Key management / Cryptographic protocols / Access control / Secure communication / Two-factor authentication / Password / Authentication / Transport Layer Security / Certificate authority / Cryptography / Security / Public-key cryptography

Usable Privacy and Security Introduction to Security January 26, 2006 Michael Reiter Notes By: Sasha Romanosky

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-01-26 22:28:13
42Logic in computer science / Type theory / Non-classical logic / Philosophical logic / Model theory / First-order logic / Modal logic / Twelf / Logic / Mathematical logic / Mathematics

xDomain: Cross-border Proofs of Access∗ Lujo Bauer§ Limin Jia† Michael K. Reiter‡

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
43Mathematical logic / Philosophical logic / Logic in computer science / Modal logic / Twelf / Logic / Non-classical logic / Mathematics

xDomain: Cross-border Proofs of Access Lujo Bauer Limin Jia Michael K. Reiter

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
44Software architecture / Web services / Message-oriented middleware / Service-oriented architecture / Enterprise service bus / Cloud computing / Middleware / Software design pattern / Service-oriented programming / Enterprise application integration / Information technology management / Software engineering

Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture of Applicat

Add to Reading List

Source URL: www.iaas.uni-stuttgart.de

Language: English - Date: 2012-03-16 18:54:49
45Malleability / Adaptive chosen-ciphertext attack / Semantic security / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Optimal asymmetric encryption padding / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
46Workflow / Simulation / Business / Workflow technology / Groupware / Management

Quality of Data (QoD) Driven Simulation Workflows Michael Reiter, Uwe Breitenbücher, Dimka Karastoyanova, Oliver Kopp Project: Runtime for Simulation Workflows Project Manager: Prof. Dr. rer. nat. Frank Leymann, PN: 8

Add to Reading List

Source URL: www.iaas.uni-stuttgart.de

Language: English - Date: 2012-12-03 07:10:19
47

Prof. Dr. Frank Leymann Katharina Görlach, Michael Reiter Institut für Architektur von Anwendungssystemen Universität Stuttgart Fachstudie

Add to Reading List

Source URL: www.iaas.uni-stuttgart.de

Language: German - Date: 2008-06-19 07:56:16
    48Simulation / Management / Science / SHIWA project / Kepler scientific workflow system / Workflow technology / Business / Workflow

    Runtime for Simulation Workflows Project Manager: Prof. Dr. rer. nat. Frank Leymann Project Co-worker: Dipl.-Math. Michael Reiter Motivation

    Add to Reading List

    Source URL: www.iaas.uni-stuttgart.de

    Language: English - Date: 2011-11-28 04:06:54
    49

    31. Top 12 - Turnier Startzeiten Herren Vorlauf[removed] Uhr Michael Reiter ESV Ravensburg[removed]Uhr Herbert Fäßler ESV Ravensburg

    Add to Reading List

    Source URL: home.arcor.de

    Language: German - Date: 2011-01-29 07:27:32
      50Calculus / Continuous function / Distribution / Function / Mathematical analysis / Mathematics / Generalized functions

      Solving the Incomplete Markets Model With Aggregate Uncertainty by Backward Induction∗ Michael Reiter Institute for Advanced Studies, Vienna this version: September 17, 2008

      Add to Reading List

      Source URL: elaine.ihs.ac.at

      Language: English - Date: 2008-12-01 04:19:20
      UPDATE