Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Munzert is active.

Publication


Featured researches published by Michael Munzert.


international cryptology conference | 1990

A Modular Approach to Key Distribution

Walter Fumy; Michael Munzert

The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need to explicate key distribution protocols in a way that allows to understand which results they achieve and on which assumptions they depend. We define a modular system that can be used to transform cryptographic protocols into a generic form and that has proven to be useful in the analysis and the construction of such protocols.


Archive | 2010

Method for Detecting Anomalies in a Control Network

Jens-Uwe Busser; Jan Kästner; Michael Munzert; Christof Störmann


Archive | 2009

Verfahren zur Bestimmung der Lage eines Objekts mit Hilfe eines MIMO-WLAN-Funknetzes

Joachim Bamberger; Henning Lenz; Michael Munzert; Christian Schwingenschlögl; Andrei Szabo


Archive | 2009

Method for recognising anomalies in a control network

Jens-Uwe Busser; Jan Kästner; Michael Munzert; Christof Störmann


Archive | 1998

Method and computer system for coding a message

Christoph Capellaro; Gerhard Hoffmann; Klaus Lukas; Michael Munzert


Archive | 2017

COMPUTATION APPARATUS AND METHOD FOR IDENTIFYING ATTACKS ON A TECHNICAL SYSTEM ON THE BASIS OF EVENTS OF AN EVENT SEQUENCE

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Verfahren, Überwachungsvorrichtung und System zur Erkennung einer Manipulation eines Datenstroms

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Rechenvorrichtung und Verfahren zur Mustererkennung in einer Ereignisfolge

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Verfahren und System zur Erkennung einer Manipulation von Datensätzen

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Rechenvorrichtung und Verfahren zum Erkennen von Angriffen auf ein technisches System anhand von Ereignissen einer Ereignisfolge

Jens-Uwe Busser; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann

Collaboration


Dive into the Michael Munzert's collaboration.

Researchain Logo
Decentralizing Knowledge