The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nicolai Kuntze: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt
    Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2005, pp:191-204 [Conf]
  2. Nicolai Kuntze, Andreas U. Schmidt
    Transitive Trust in Mobile Scenarios. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:73-85 [Conf]
  3. Nicolai Kuntze, Andreas U. Schmidt
    Trusted Ticket Systems and Applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  4. Nicolai Kuntze, Andreas U. Schmidt, Christian Hett
    Non-Repudiation in Internet Telephony [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  5. Nicolai Kuntze, Andreas U. Schmidt
    Protection of DVB Systems by Trusted Computing [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  6. Nicolai Kuntze, Andreas U. Schmidt
    Trustworthy content push [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  7. Nicolai Kuntze, Andreas U. Schmidt
    Transitive trust in mobile scenarios [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  8. Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
    A secure archive for Voice-over-IP conversations [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  9. Nicolai Kuntze, Andreas U. Schmidt
    Trusted Computing in Mobile Action [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  10. Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
    Security and Non-Repudiation for Voice-Over-IP Conversations [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  11. Nicolai Kuntze, Dominique Maehler, Andreas U. Schmidt
    Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  12. Securing Decentralized Workflows in Ambient Environments. [Citation Graph (, )][DBLP]


  13. Non-Repudiation in Internet Telephony. [Citation Graph (, )][DBLP]


  14. Trusted Ticket Systems and Applications. [Citation Graph (, )][DBLP]


  15. Implementation of a Trusted Ticket System. [Citation Graph (, )][DBLP]


  16. Trust in Peer-to-Peer Content Distribution Protocols. [Citation Graph (, )][DBLP]


  17. Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. [Citation Graph (, )][DBLP]


  18. Trust in Business Processes. [Citation Graph (, )][DBLP]


  19. Spam Over Internet Telephony and How to Deal with it. [Citation Graph (, )][DBLP]


  20. Trusted Computing in Mobile Action. [Citation Graph (, )][DBLP]


  21. Security for Distributed Web-Services via Aspect-Oriented Programming. [Citation Graph (, )][DBLP]


  22. On the Deployment of Mobile Trusted Modules. [Citation Graph (, )][DBLP]


  23. Trust for Location-Based Authorisation. [Citation Graph (, )][DBLP]


  24. Evaluating Measures and Countermeasures for SPAM over Internet Telephony. [Citation Graph (, )][DBLP]


  25. Towards security in decentralized workflows. [Citation Graph (, )][DBLP]


  26. Security for Distributed Web-Applications via Aspect-Oriented Programming [Citation Graph (, )][DBLP]


  27. On the deployment of Mobile Trusted Modules [Citation Graph (, )][DBLP]


  28. Trust for Location-based Authorisation [Citation Graph (, )][DBLP]


  29. SPAM over Internet Telephony and how to deal with it [Citation Graph (, )][DBLP]


  30. Final Architecture Specification of security, privacy, and incentive mechanisms [Citation Graph (, )][DBLP]


  31. Secure Web Service Workflow Execution. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002