Bernhard Löhlein  | 
                                Analysis and Modifications of the Conditional Correlation Attack 
                                accepted at 3rd IEEE/ITG Conference on Source and Channel Coding, 17.-19. January 2000, Munich   |  | 
				 Dirk Westhoff  | 
                                An Optimistic Third Party Protocol to Protect a Mobile Agent's Binary Code 
                                International Journal of Software Engineering and Knowledge Engineering 11(5), 2001   |  | 
				 Firoz Kaderali, Alex Didier Essoh  | 
                                An e-Learning Strategy for Africa based on Open Source Experience in Europe 
                                IST-East Africa Conference 2006, IIMC-Verlag, Irland 2006, ISBN 190 58 24 017  | [pdf]   | 
				 Firoz Kaderali  | 
                                Alternativnetze: Probleme und Lösungsansätze 
                                Congressband III, Congress Volume III, Online '96, Hamburg, Februar 1996  |  | 
				 Mingxing He, Pingzhi Fan, Firoz Kaderali, D. Yuan  | 
                                Access Key Distribution Scheme for Level-based Hierarchy, Proceedings of the Forth International Conference on Parallel and Distributed Computing, Applications and Technologies 
                                PDCAT'03, IEEE Press, ISTP, August 2003   |  | 
				 Kyamakya Kyandoghere  | 
                                A Simple and New Algorithm for Capacity Related Reliability Analysis of ATM Transport Networks 
                                Proceedings of the 1998 IEEE Military Communications Conference MILCOM 98, Oct 18-21, 1998; Bedford, MA, USA  |  | 
				 Manfred Hauswirth, Mehdi Jazayeri, Markus Schneider  | 
                                A phase model for e-commerce business models and its application to security assessment 
                                Thirty-Fourth Hawaii International Conference on System Sciences (HICSS-34) January 2001, Proceedings, IEEE Computer Society Press   |  |