Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guenther Horn is active.

Publication


Featured researches published by Guenther Horn.


Archive | 2001

Method and apparatus to counter the rogue shell threat by means of local key derivation

Guenther Horn


Archive | 2009

Trustworthiness decision making for access authentication

Robert Ropolyi; Guenther Horn


Archive | 2008

SECURITY FOR A NON-3GPP ACCESS TO AN EVOLVED PACKET SYSTEM

Guenther Horn


Archive | 2008

KEY HANDLING IN COMMUNICATION SYSTEMS

Dan Forsberg; Guenther Horn; Ulrike Meyer


Archive | 2010

Method for establishing a secure and authorized connection between a smart card and a device in a network

Guenther Horn; Wolf Dietrich Moeller


Archive | 2008

Secure Bootstrapping Architecture Method Based on Password-Based Digest Authentication

Marc Blommaert; Guenther Horn


Archive | 2010

METHOD FOR CONTEXT ESTABLISHMENT IN TELECOMMUNICATION NETWORKS

Guenther Horn; Robert Zaus


Archive | 2012

METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS ENABLING TO IMPROVE HANDOVER SECURITY IN MOBILE COMMUNICATION NETWORKS

Guenther Horn; Hinrich Eilts


Archive | 2011

REMOTE VERIFICATION OF ATTRIBUTES IN A COMMUNICATION NETWORK

Guenther Horn; Wolf‐Dietrich Moeller


Archive | 2008

Key refresh sae/lte system

Ulrike Meyer; Guenther Horn; Dan Forsberg

Collaboration


Dive into the Guenther Horn's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge