The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matthias Schunter: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. N. Asokan, Matthias Schunter, Michael Waidner
    Optimistic Protocols for Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:7-17 [Conf]
  2. Günter Karjoth, Matthias Schunter
    A Privacy Policy Model for Enterprises. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:271-281 [Conf]
  3. Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner
    Amending P3P for Clearer Privacy Promises. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:445-449 [Conf]
  4. Günter Karjoth, Matthias Schunter, Michael Waidner
    Privacy-Enabled Services for Enterprises. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:483-487 [Conf]
  5. Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
    Private Auctions with Multiple Rounds and Multiple Items. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:423-427 [Conf]
  6. Michael Backes, Birgit Pfitzmann, Matthias Schunter
    A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:162-180 [Conf]
  7. Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
    The ESPRIT Project CAFE - High Security Digital Payment Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:217-230 [Conf]
  8. Birgit Pfitzmann, Matthias Schunter
    Asymmetric Fingerprinting (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:84-95 [Conf]
  9. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:121-132 [Conf]
  10. Michael Backes, Matthias Schunter
    From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:67-74 [Conf]
  11. Chris Vanden Berghe, Matthias Schunter
    Privacy Injector - Automated Privacy Enforcement Through Aspects. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:99-117 [Conf]
  12. Günter Karjoth, Matthias Schunter, Michael Waidner
    Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:69-84 [Conf]
  13. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Optimal Efficiency of Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:113-122 [Conf]
  14. Günter Karjoth, Matthias Schunter, Els Van Herreweghen
    Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:135-146 [Conf]
  15. Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter
    Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:375-382 [Conf]
  16. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:329-0 [Conf]
  17. Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
    E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:103-109 [Conf]
  18. Matthias Schunter, Michael Waidner, Dale Whinnett
    A Status Report on the SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:16-18, pp:1501-1510 [Journal]
  19. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal]
  20. Günter Karjoth, Matthias Schunter, Michael Waidner
    Privacy-enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:3-9 [Journal]
  21. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Cryptographic Security of Reactive Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
  22. Matthias Schunter, Michael Waidner, Dale Whinnett
    The SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1999, v:41, n:3, pp:238-247 [Journal]
  23. Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
    Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:372-384 [Conf]
  24. Matthias Schunter, Michael Waidner
    Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:218-232 [Conf]

  25. Towards automated provisioning of secure virtualized networks. [Citation Graph (, )][DBLP]


  26. Architecting Dependable and Secure Systems Using Virtualization. [Citation Graph (, )][DBLP]


  27. Policy enforcement and compliance proofs for Xen virtual machines. [Citation Graph (, )][DBLP]


  28. Elevating the Discussion on Security Management: The Data Centric Paradigm. [Citation Graph (, )][DBLP]


  29. Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002