|
Search the dblp DataBase
Matthias Schunter:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- N. Asokan, Matthias Schunter, Michael Waidner
Optimistic Protocols for Fair Exchange. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:7-17 [Conf]
- Günter Karjoth, Matthias Schunter
A Privacy Policy Model for Enterprises. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:271-281 [Conf]
- Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner
Amending P3P for Clearer Privacy Promises. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:445-449 [Conf]
- Günter Karjoth, Matthias Schunter, Michael Waidner
Privacy-Enabled Services for Enterprises. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:483-487 [Conf]
- Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher
Private Auctions with Multiple Rounds and Multiple Items. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:423-427 [Conf]
- Michael Backes, Birgit Pfitzmann, Matthias Schunter
A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:162-180 [Conf]
- Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
The ESPRIT Project CAFE - High Security Digital Payment Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 1994, pp:217-230 [Conf]
- Birgit Pfitzmann, Matthias Schunter
Asymmetric Fingerprinting (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:84-95 [Conf]
- Birgit Pfitzmann, Matthias Schunter, Michael Waidner
How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:121-132 [Conf]
- Michael Backes, Matthias Schunter
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:67-74 [Conf]
- Chris Vanden Berghe, Matthias Schunter
Privacy Injector - Automated Privacy Enforcement Through Aspects. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2006, pp:99-117 [Conf]
- Günter Karjoth, Matthias Schunter, Michael Waidner
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2002, pp:69-84 [Conf]
- Birgit Pfitzmann, Matthias Schunter, Michael Waidner
Optimal Efficiency of Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP] PODC, 1998, pp:113-122 [Conf]
- Günter Karjoth, Matthias Schunter, Els Van Herreweghen
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. [Citation Graph (0, 0)][DBLP] POLICY, 2003, pp:135-146 [Conf]
- Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter
Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:375-382 [Conf]
- Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP] VIS, 1995, pp:329-0 [Conf]
- Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:103-109 [Conf]
- Matthias Schunter, Michael Waidner, Dale Whinnett
A Status Report on the SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP] Computer Networks, 1998, v:30, n:16-18, pp:1501-1510 [Journal]
- Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal]
- Günter Karjoth, Matthias Schunter, Michael Waidner
Privacy-enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:3-9 [Journal]
- Birgit Pfitzmann, Matthias Schunter, Michael Waidner
Cryptographic Security of Reactive Systems. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
- Matthias Schunter, Michael Waidner, Dale Whinnett
The SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP] Wirtschaftsinformatik, 1999, v:41, n:3, pp:238-247 [Journal]
- Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:372-384 [Conf]
- Matthias Schunter, Michael Waidner
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2007, pp:218-232 [Conf]
Towards automated provisioning of secure virtualized networks. [Citation Graph (, )][DBLP]
Architecting Dependable and Secure Systems Using Virtualization. [Citation Graph (, )][DBLP]
Policy enforcement and compliance proofs for Xen virtual machines. [Citation Graph (, )][DBLP]
Elevating the Discussion on Security Management: The Data Centric Paradigm. [Citation Graph (, )][DBLP]
Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|