|
Search the dblp DataBase
Nicolai Kuntze:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt
Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. [Citation Graph (0, 0)][DBLP] DFN-Arbeitstagung über Kommunikationsnetze, 2005, pp:191-204 [Conf]
- Nicolai Kuntze, Andreas U. Schmidt
Transitive Trust in Mobile Scenarios. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:73-85 [Conf]
- Nicolai Kuntze, Andreas U. Schmidt
Trusted Ticket Systems and Applications [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Nicolai Kuntze, Andreas U. Schmidt, Christian Hett
Non-Repudiation in Internet Telephony [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Nicolai Kuntze, Andreas U. Schmidt
Protection of DVB Systems by Trusted Computing [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Nicolai Kuntze, Andreas U. Schmidt
Trustworthy content push [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Nicolai Kuntze, Andreas U. Schmidt
Transitive trust in mobile scenarios [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
A secure archive for Voice-over-IP conversations [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Nicolai Kuntze, Andreas U. Schmidt
Trusted Computing in Mobile Action [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
Security and Non-Repudiation for Voice-Over-IP Conversations [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Nicolai Kuntze, Dominique Maehler, Andreas U. Schmidt
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Securing Decentralized Workflows in Ambient Environments. [Citation Graph (, )][DBLP]
Non-Repudiation in Internet Telephony. [Citation Graph (, )][DBLP]
Trusted Ticket Systems and Applications. [Citation Graph (, )][DBLP]
Implementation of a Trusted Ticket System. [Citation Graph (, )][DBLP]
Trust in Peer-to-Peer Content Distribution Protocols. [Citation Graph (, )][DBLP]
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. [Citation Graph (, )][DBLP]
Trust in Business Processes. [Citation Graph (, )][DBLP]
Spam Over Internet Telephony and How to Deal with it. [Citation Graph (, )][DBLP]
Trusted Computing in Mobile Action. [Citation Graph (, )][DBLP]
Security for Distributed Web-Services via Aspect-Oriented Programming. [Citation Graph (, )][DBLP]
On the Deployment of Mobile Trusted Modules. [Citation Graph (, )][DBLP]
Trust for Location-Based Authorisation. [Citation Graph (, )][DBLP]
Evaluating Measures and Countermeasures for SPAM over Internet Telephony. [Citation Graph (, )][DBLP]
Towards security in decentralized workflows. [Citation Graph (, )][DBLP]
Security for Distributed Web-Applications via Aspect-Oriented Programming [Citation Graph (, )][DBLP]
On the deployment of Mobile Trusted Modules [Citation Graph (, )][DBLP]
Trust for Location-based Authorisation [Citation Graph (, )][DBLP]
SPAM over Internet Telephony and how to deal with it [Citation Graph (, )][DBLP]
Final Architecture Specification of security, privacy, and incentive mechanisms [Citation Graph (, )][DBLP]
Secure Web Service Workflow Execution. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|