default search action
Rainer Falk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [i2]Rainer Falk, Steffen Fries, Hans-Joachim Hof:
Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility. CoRR abs/1506.06996 (2015) - [i1]Rainer Falk, Steffen Fries, Hans-Joachim Hof:
ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments. CoRR abs/1507.01706 (2015) - 2012
- [c14]Klaus Becker, Christian Buckl, Alexander Camek, Rainer Falk, Ludger Fiege, Jürgen Geßner, Stephan Sommer:
SW-basierte Integration von neuen Fahrzeugfunktionen in zentralisierten Controllern. Automotive - Safety & Security 2012: 115-132 - [c13]Steffen Fries, Rainer Falk, Ariane Sutor:
Smart Grid Information Exchange - Securing the Smart Grid from the Ground. SmartGridSec 2012: 26-44 - 2011
- [j5]Rainer Falk, Steffen Fries:
Smart Grid Cyber Security - An Overview of Selected Scenarios and Their Security Implications. Prax. Inf.verarb. Kommun. 34(4): 168-175 (2011) - 2010
- [j4]Rainer Falk, Hans-Joachim Hof:
Security Design for Industrial Sensor Networks (Sicherheit für industrielle Sensornetze). it Inf. Technol. 52(6): 331-339 (2010) - [c12]Rainer Falk, Hans-Joachim Hof:
Industrial Sensor Network Security Architecture. SECURWARE 2010: 97-102 - [e2]Reijo Savola, Masaru Takesue, Rainer Falk, Manuela Popescu:
Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7517-9 [contents]
2000 – 2009
- 2009
- [c11]Rainer Falk, Steffen Fries:
Profiling the Protection of Sensitive Enterprise Multimedia Communication. ICIW 2009: 239-246 - [c10]Rainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior:
Mobile WiMAX Network Security. MobiSec 2009: 253-264 - [c9]Rainer Falk, Hans-Joachim Hof:
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. SECURWARE 2009: 191-196 - [c8]Rainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li:
Simulating a Multi-domain RFID System for Replacement Part Tracking. SECURWARE 2009: 197-202 - [e1]Rainer Falk, Wilson Goudalo, Eric Y. Chen, Reijo Savola, Manuela Popescu:
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. IEEE Computer Society 2009, ISBN 978-0-7695-3668-2 [contents] - 2008
- [c7]Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf:
Public key based authentication for secure integration of sensor data and RFID. HeterSanet 2008: 61-66 - [c6]Rainer Falk, Steffen Fries:
Security Governance for Enterprise VoIP Communication. SECURWARE 2008: 279-286 - 2006
- [j3]Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker, James M. Polk:
Using SAML to protect the session initiation protocol (SIP). IEEE Netw. 20(5): 14-17 (2006) - [j2]Zachos Boufidis, Rainer Falk, Nancy Alonistioti, Eiman Mohyeldin, Nikolas Olaziregi, Bertrand Souville:
Network support modeling, architecture, and security considerations for composite reconfigurable environments. IEEE Wirel. Commun. 13(3): 34-44 (2006) - 2005
- [c5]Rainer Falk, François Haettel, Radha Atukula, Ulf Lücking:
Protecting Reconfiguration in Future Mobile Communication Systems. DEXA Workshops 2005: 267-271 - 2002
- [j1]Mark A. Beach, Didier Bourse, Markus Dillinger, Rainer Falk, Tim Farnham, Raquel Navarro-Prieto, Thomas Wiebke:
The European project trust - reconfigurable terminals and supporting networks. Ann. des Télécommunications 57(7-8): 653-676 (2002) - 2000
- [b1]Rainer Falk:
Eine Methode für die Verwaltung von Zugriffsrechten in IT-Systemen. Technical University Munich, Germany, 2000, pp. 1-169
1990 – 1999
- 1999
- [c4]Rainer Falk:
Verwaltung von Java-2-Zugriffspolitiken. Java-Informations-Tage 1999: 193-202 - 1998
- [c3]Rainer Falk, Markus Trommer:
Integrated Management of Network and Host Based Security Mechanisms. ACISP 1998: 36-47 - [c2]Rainer Falk:
Java RMI, CORBA und Firewalls. Java-Informations-Tage 1998: 215-223 - [c1]Rainer Falk, Markus Trommer:
Managing Network Security-A Pragmatic Approach. SRDS 1998: 398-402 - 1997
- [p1]Rainer Falk:
Formale Spezifikation von Sicherheitspolitiken für Paketfilter. Verläßliche IT-Systeme 1997: 97-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint