default search action
Reinhard Posch
Person information
- affiliation: Graz University of Technology, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c31]Reinhard Posch:
Digital Sovereignty and IT-Security for a Prosperous Society. ECSS 2015: 77-86 - 2013
- [c30]Peter Teufl, Herbert Leitold, Reinhard Posch:
Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains. I-KNOW 2013: 10:1-10:8 - 2011
- [c29]Karl-Christian Posch, Reinhard Posch, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer:
Secure and Privacy-Preserving eGovernment - Best Practice Austria. Rainbow of Computer Science 2011: 259-269 - 2010
- [j31]Herbert Leitold, Reinhard Posch, Thomas Rössler:
Reconstruction of electronic signatures from eDocument printouts. Comput. Secur. 29(5): 523-532 (2010)
2000 – 2009
- 2009
- [c28]Herbert Leitold, Reinhard Posch, Thomas Rössler:
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. SEC 2009: 109-118 - 2008
- [c27]Reinhard Posch:
A Federated Identity Management Architecture for Cross-Border Services in Europe. BIOSIG 2008: 141-152 - 2005
- [c26]Thomas Rössler, Herbert Leitold, Reinhard Posch:
E-Voting: A Scalable Approach using XML and Hardware Security Modules. EEE 2005: 480-485 - 2002
- [c25]Herbert Leitold, Arno Hollosi, Reinhard Posch:
Security Architecture of the Austrian Citizen Card Concept. ACSAC 2002: 391-400 - [c24]Arno Hollosi, Udo Payer, Reinhard Posch:
Automatic authentication based on the Austrian citizen card. Communications and Multimedia Security 2002: 241-253 - [c23]Arno Hollosi, Herbert Leitold, Reinhard Posch:
An open interface enabling secure e-government. Communications and Multimedia Security 2002: 255-266 - [c22]Reinhard Posch:
What Is Needed to Allow e-Citizenship? EGOV 2002: 45-51 - [c21]Reinhard Posch, Herbert Leitold:
Identification and Confidentiality for e-Government. Certification and Security in E-Services 2002: 267-279 - 2001
- [j30]Reinhard Posch:
Will Internet Ever Be Secure ? J. Univers. Comput. Sci. 7(5): 447-456 (2001) - [c20]Reinhard Posch, Herbert Leitold:
Digitale Signaturen in der Praxis. GI Jahrestagung (1) 2001: 477-485 - [c19]Reinhard Posch:
Der Mensch im Cyberspace. Mensch-Computer Interaktion im 21. Jahrhundert 2001: 15-19 - 2000
- [c18]Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:
A 155 Mbps Triple-DES Network Encryptor. CHES 2000: 164-174 - [c17]Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer:
Robustness-Agile Encryptor for ATM Networks. SEC 2000: 231-240 - [c16]Reinhard Posch:
The Business Of Electronic Government. WebNet 2000: 622-623
1990 – 1999
- 1999
- [j29]Wolfgang Mayerwieser, Reinhard Posch:
Neue Möglichkeiten und Anforderungen für Krypto-Koprozessoren. Datenschutz und Datensicherheit 23(9) (1999) - [c15]Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos:
Secure Communications in ATM Networks. ACSAC 1999: 84-93 - [c14]Herbert Leitold, Karl C. Posch, Reinhard Posch:
ISDN Security services. Communications and Multimedia Security 1999: 21-35 - [c13]Herbert Leitold, Reinhard Posch:
ATM Network Security: Requirements, Approaches, Standards, and the SCAN Solution. SMARTNET 1999: 191-204 - 1998
- [j28]J. Schwemmlein, Karl C. Posch, Reinhard Posch:
RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography. Comput. Secur. 17(7): 637-650 (1998) - [j27]Haitham S. Cruickshank, Ioannis Mertzanis, Barry G. Evans, Herbert Leitold, Reinhard Posch:
Securing multimedia services over satellite ATM networks. Int. J. Satell. Commun. Netw. 16(4): 183-195 (1998) - [j26]Franz Pucher, Reinhard Posch:
Router-basierter ISDN/IP-Zugang für einen Primärratenanschluß / Router-based LAN-Access Over ISDN. Informationstechnik Tech. Inform. 40(1): 5-11 (1998) - [j25]Reinhard Posch:
Protecting Devices by Active Coating. J. Univers. Comput. Sci. 4(7): 652-668 (1998) - [c12]Herbert Leitold, Udo Payer, Reinhard Posch:
A Hardware-Independent Encryption Model for ATM Devices. ACSAC 1998: 205-211 - [e1]Reinhard Posch, G. Papp:
Global IT Security (SEC'98), IFIP World Computer Congress 1998. [email protected] 116, Austrian Computer Society 1998, ISBN 3-85403-116-5 - 1996
- [j24]Franz Pucher, Herbert Leitold, Reinhard Posch:
LAN Access Over ISDN. J. Univers. Comput. Sci. 2(1): 20-33 (1996) - [c11]Ilias Andrikopoulos, Tolga Örs, Maja Matijasevic, Herbert Leitold, Reinhard Posch:
A study of TCP/IP throughout performance in heterogeneous ATM local area networks. Modelling and Evaluation of ATM Networks 1996: 447-465 - [c10]Reinhard Posch, Herbert Leitold, Franz Pucher:
ISDN LAN Access: Remote Access Security and User Profile Management. Communications and Multimedia Security 1996: 222-233 - [c9]Hannes Hassler, Vesna Hassler, Reinhard Posch:
A hierarchical threshold scheme with unique partial keys. SEC 1996: 219-226 - [c8]Vesna Hassler, N. Lutz, Reinhard Posch:
Privacy-enhanced desktop meeting system. WETICE 1996: 112-117 - 1995
- [j23]Reinhard Posch, Franz Pucher:
An experimental mixed purpose network. Microprocess. Microprogramming 41(4): 263-271 (1995) - [j22]Artur Klauser, Reinhard Posch:
Distributed Caching in Networked File Systems. J. Univers. Comput. Sci. 1(6): 399-409 (1995) - [j21]Wolfgang Mayerwieser, Karl C. Posch, Reinhard Posch, Volker Schindler:
Testing a High-Speed Data Path: The Design of the RSAs Crypto Chip. J. Univers. Comput. Sci. 1(11): 728-743 (1995) - [j20]Karl C. Posch, Reinhard Posch:
Modulo Reduction in Residue Number Systems. IEEE Trans. Parallel Distributed Syst. 6(5): 449-454 (1995) - 1994
- [c7]Artur Klauser, Reinhard Posch:
Distributed File Caching in Parallel Architectures Utilizing High Speed Networks. HPCN 1994: 30-35 - 1993
- [j19]Reinhard Posch, Franz Pucher, Michael Welser:
Using a transputer cluster in a classroom environment. Comput. Commun. 16(3): 192-196 (1993) - [j18]Karl C. Posch, Reinhard Posch:
Base extension using a convolution sum in residue number systems. Computing 50(2): 93-104 (1993) - [c6]Reinhard Posch:
MRSA - a new public key encryption method. SAFECOMP 1993: 341-348 - 1992
- [j17]Peter Lipp, Reinhard Posch:
An Inter-Bridge-Security Protocol. Comput. Networks ISDN Syst. 25(4-5): 496-500 (1992) - [c5]Karl C. Posch, Reinhard Posch:
Residue Number Systems: A Key to Parallelism in Public Key Cryptography. SPDP 1992: 432-435 - 1991
- [j16]Reinhard Posch, Michael Welser:
A Conceptual View of MS-DOS File System Security. Wirtschaftsinf. 33(6): 526-531 (1991) - [c4]P. Lippitsch, Karl C. Posch, Reinhard Posch:
Multiplication as Parallel as Possible. ACPC 1991: 350-358 - [c3]P. Lippitsch, Reinhard Posch:
PC-RSA A Cryptgraphic Toolkit for MS-DOS. VIS 1991: 346-354 - 1990
- [j15]Karl C. Posch, Reinhard Posch:
Approaching encryption at ISDN speed using partial parallel modulus multiplication. Microprocessing and Microprogramming 29(3): 177-184 (1990) - [j14]Robert Hufsky, Erich Löw, Reinhard Posch:
Eine Erweiterung der Farbtabelle durch einen deterministischen Realtime-Schedule. Wirtschaftsinf. 32(4): 372-375 (1990)
1980 – 1989
- 1988
- [j13]Reinhard Posch, Peter Lipp:
Ein automatisiertes Examensprüfungswesen an der TU Graz auf der Basis eines Fileserver-orientierten Mailboxsystems. Angew. Inform. 30(3): 132-137 (1988) - [j12]Reinhard Posch:
Multiuser-Software Security. Angew. Inform. 30(5): 203-206 (1988) - 1987
- [j11]Wolf-Dietrich Fellner, Reinhard Posch:
Bildschirmtext - An open videotex network for text and graphic applications. Comput. Graph. 11(4): 359-367 (1987) - 1985
- [j10]Reinhard Posch:
Verwendung dynamischer Verdichtungsverfahren zur Erhöhung der Übertragungsleistung auf langsamen Datenverbindungen. Angew. Inform. 27(12): 520-523 (1985) - [c2]H. Cheng, Peter Lipp, Hermann A. Maurer, Reinhard Posch:
GASC: ein Graphik- und Software Kommunikationssystem. GI Jahrestagung 1985: 679-690 - 1984
- [j9]Reinhard Posch, Günter Haring:
Allocating Computer Resources to Satisfy User and Management Demands. Softw. Pract. Exp. 14(4): 311-321 (1984) - 1983
- [j8]H. Bogensberger, Hermann A. Maurer, Reinhard Posch, W. Schinnerl:
Ein neuartiges - durch spezielle Hardware unterstütztes - Terminalkonzept für Bildschirmtext. Angew. Inform. 25(3): 108-113 (1983) - [j7]Reinhard Posch:
Interruptstrukturen in Systemen mit Datenfernverarbeitungsumgebung. Angew. Inform. 25(6): 258-261 (1983) - 1982
- [j6]Reinhard Posch:
Transparente Protokolle als Alternative herstellerspezifische Terminalbehandlung. Angew. Inform. 24(12): 575-580 (1982) - 1980
- [j5]Günter Haring, Reinhard Posch:
On the use of a synthetic online/batch workload for computer selection. Inf. Manag. 3(3): 95-102 (1980) - [j4]Reinhard Posch:
Ein Vorschlag zur Behandlung von prozedurfreien asynchronen Terminals im Halbduplex-Verfahren. Angew. Inform. 22(3): 119-125 (1980)
1970 – 1979
- 1979
- [j3]Günter Haring, Reinhard Posch, C. Leonhardt, Günther Gell:
The Use of a Synthetic Jobstream in Performance Evaluation. Comput. J. 22(3): 209-219 (1979) - [j2]Reinhard Posch:
Automatic console operation as a tool for systems management. Inf. Manag. 2(2): 49-55 (1979) - [j1]Reinhard Posch:
Modelling a hardware structure for computer science education. ACM SIGCSE Bull. 11(2): 60-68 (1979) - [c1]H. Bogensberger, Günter Haring, Reinhard Posch:
Ein Modell zur gemeinsamen Nutzung einer Rechenanlage. GI Jahrestagung 1979: 534-544
Coauthor Index
aka: Karl-Christian Posch
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint