Springer

Central database

Publisher

  1. 2009
  2. Published

    A Mechanism for Identity Delegation at Authentication Level. / Ahmed, Naveed; Jensen, Christian D.

    Identity and Privacy in the Internet Age, Proceedings: Lecture Notes in Computer Science. Vol. 5838 Springer, 2009. p. 148-162.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  3. Published

    Analysis of gait using a treadmill and a Time-of-flight camera. / Jensen, Rasmus Ramsbøl; Paulsen, Rasmus Reinhold; Larsen, Rasmus.

    Dynamic 3D Imaging. Heidelberg : Springer, 2009. p. 154-166.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  4. Published

    Analyzing Gait Using a Time-of-Flight Camera. / Jensen, Rasmus Ramsbøl; Paulsen, Rasmus Reinhold; Larsen, Rasmus.

    Proceedings of the Scandinavian Conference on Image Analysis. Heidelberg : Springer, 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  5. Published

    Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. / Bras-Amorós, Maria (Editor); Høholdt, Tom (Editor).

    Berlin : Springer, 2009. 243 p. (Lecture Notes in Computer Science; No. 5527).

    Publication: Research - peer-reviewBook – Annual report year: 2009

  6. Published

    A Practical Key Recovery Attack on Basic TCHo. / Leander, Gregor; Herrmann, Mathias.

    Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography. Springer, 2009. p. 411-424 (Lecture Notes in Computer Science; No. 5443).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  7. Published

    Bioprocess Modelling for Learning Model Predictive Control (L-MPC). / Alvarez Villanueva, Maria Antonieta; Stocks, Stuart M.; Jørgensen, Sten Bay.

    Computational Intelligence Techniques for Bioprocess Modelling, Supervision and Control: M.C.Nicoletti and L.C. Jain (Eds.), Studies in Computational Intelligence. Vol. Chapter 9 Germany : Springer, 2009. p. 237-280.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2009

  8. Published

    Bivium as a Mixed Integer Programming Problem. / Borghoff, Julia; Knudsen, Lars Ramkilde; Stolpe, Mathias.

    Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. ed. / Matthew G. Parker. Springer, 2009. p. 133-152 (Lecture Notes of Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  9. Published

    Cache Timing Analysis of LFSR-based Stream Ciphers. / Zenner, Erik; Leander, Gregor; Hawkes, Philip.

    Cryptography and Coding. Berlin : Springer, 2009. (Lecture Notes in Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  10. Published

    CC-based Design of Secure Application Systems. / Sharp, Robin.

    Engineering Secure Software and Systems. ed. / B. De Win; F. Massacci; S. Redwine; N. Zannone. Springer, 2009. p. 111-121 (Lecture Notes in Computer Science; No. 5429).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  11. Published

    Charge transport of solute oligonucleotides in metallic nanogaps - observations and some puzzles. / Kuznetsov, Alexander M.; Ulstrup, Jens.

    Bioinorganic Electrochemistry. ed. / Ole Hammerich; Jens Ulstrup. Guilford : Springer, 2009. p. 163-208.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2009

Download list: To download, please limit the number of search results to 1,000 or less.