Skip to main content Skip to main navigation
MLT Headerbild© Adobe Stock

Multilinguality and Language Technology

Publications

Page 1 of 5.

  1. UCH Goes EAL4---The Foundation of an Eco System for Ambient Assisted Living: ISO/IEC 15408 Common Criteria Based Implementation of the ISO/IEC 24752 Universal Control Hub Middleware

    In: Ambient Assisted Living: 8. AAL-Kongress 2015. Deutscher AAL-Kongress (AAL), April 29-30, Frankfurt/M. Germany, Pages 83-96, ISBN 978-3-319-26345-8, Springer International Publishing, Cham, 2016.

  2. Andreas Nonnengart; Dmitri Rubinstein; Philipp Slusallek; Werner Stephan

    Das KIARA Security-Modell

    In: Peter Schartner; Kerstin Lemke-Rust; Markus Ullmann (Hrsg.). D A CH Security 2015. IT Security & IT Management, September 8-9, St. Augustin / Bonn, Germany, syssec, 2015.

  3. Lassaad Cheikhrouhou; Werner Stephan; Markus Ullmann

    A New Approach to the Inductive Verification of Cryptographic Protocols Based on Message Algebras

    MACIS 2013, Nanning, China, December 11-13, Vol. Proceedings of the Fifth International Conference on Mathematical Aspects of Computer and Information Sciences, 2013.

  4. Lassaad Cheikhrouhou; Werner Stephan; Oezguer Dagdelen; Marc Fischlin; Markus Ullmann

    Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of {PACE}

    In: Neeraj Suri; Michael Waidner (Hrsg.). Sicherheit 2012 - 6. Jahrestagung des Fachbereichs "Sicherheit - Schutz und Zuverlässigkeit" der GI. GI-Fachtagungen, March 7-9, Darmstadt, Germany, Pages 83-94, LNI, Vol. 195, ISBN 978-3-88579-289-5, GI, 2012.

  5. Lassaad Cheikhrouhou; Andreas Nonnengart; Werner Stephan; Frank Koob; Georg Rock

    Automating Interactive Protocol Verification

    In: Andreas Dengel; Karsten Berns; Thomas Breuel; Frank Bomarius; Thomas Roth-Berghofer (Hrsg.). KI 2008: Advances in Artificial Intelligence. German Conference on Artificial Intelligence (KI-2008), September 23-26, Kaiserslautern, Germany, Lecture Notes in Artificial Intelligence (LNAI), Vol. 5243, ISBN 978-3-540-85844-7, Springer, Berlin, Heidelberg, 2008.

  6. Lassaad Cheikhrouhou; Georg Rock; Werner Stephan; Matthias Schwan; Gunter Lassmann

    Verifying a Chipcard-Based Biometric Identification Protocol in {VSE}

    In: Computer Safety, Reliability, and Security, 25th International Conference. IFAC Symposium on Safety of Computer Control Systems (SAFECOMP-06), September 27-29, Gdansk, Poland, Pages 42-56, LNCS, No. 4166, ISBN 3-540-45762-3, Springer, 2006.

  7. Heiko Mantel; Axel Schairer

    Exploiting Generic Aspects of Security Models in Formal Developments

    In: Dieter Hutter; Werner Stephan (Hrsg.). Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday. Springer, 2005.

  8. Dieter Hutter; Werner Stephan

    A Portrait of a Scientist: Logics, AI and Politics

    In: Festschrift in Honor of J.H.~Siekmann. Pages 1-14, Springer-Verlag, LNCS 2605, 2005.

  9. Erica Melis

    Why Proof Planning for Maths Education and How?

    In: Dieter Hutter; Werner Stephan (Hrsg.). Mechanizing Mathematical Reasoning: Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday. Pages 364-376, LNCS, Vol. 2605, Springer-Verlag, 2005.

Contact

Office:
Phone: +49 681 85775 5282
Fax: +49 681 85775 5338

Deutsches Forschungszentrum für Künstliche Intelligenz GmbH (DFKI)
Campus D3 2
Stuhlsatzenhausweg 3
66123 Saarbrücken
Germany