ls3-www.cs.tu-dortmund.de/cms/medien/publikationen/pdp99.pdf
authentication). After this rebuilding the support of hypermedial search by Dragon Slayer II was shown in [9]. In the paper in-hand we describe the lasted ver- sion DRAGON SLAYER III among other technical de- [...] Notes in Computer Science, pages 457–469, Santa Barbara, Cali- fornia, 1992. Springer Verlag.
[5] T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. W. Davies, editor, Advances in C [...] in Distributed Computing Systems, IEEE Tutorial Series, pages 0–0. IEEE Computer Soc. Press, 1994.
[9] H. F. Wedde, B. Finger, and M. Richter. Betriebssystemu- ntersttzung bei inhaltlicher Suche in verteilten …