The SCEAS System
Navigation Menu

Search the dblp DataBase


Christian Stüble: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble
    Secure Data Management in Trusted Computing. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:324-338 [Conf]
  2. Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
    An Open Approach for Designing Secure Electronic Immobilizers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:230-242 [Conf]
  3. Ahmad-Reza Sadeghi, Christian Stüble
    Towards Multilateral-Secure DRM Platforms. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:326-337 [Conf]
  4. Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
    Secure object identification: or: solving the Chess Grandmaster Problem. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:77-85 [Conf]
  5. Ahmad-Reza Sadeghi, Christian Stüble
    Property-based attestation for computing platforms: caring about properties, not mechanisms. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:67-77 [Conf]
  6. Ahmad-Reza Sadeghi, Christian Stüble
    Taming "Trusted Platforms" by Operating System Design. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:286-302 [Conf]
  7. Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble
    Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:7, n:9, pp:- [Journal]
  8. Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
    Enhancing Grid Security Using Trusted Virtualization. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:372-384 [Conf]
  9. Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
    Enabling Fairer Digital Rights Management with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:53-70 [Conf]

  10. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]

  11. Flexible and secure enterprise rights management based on trusted virtual domains. [Citation Graph (, )][DBLP]

  12. Realizing property-based attestation and sealing with commonly available hard- and software. [Citation Graph (, )][DBLP]

  13. TCG inside?: a note on TPM specification compliance. [Citation Graph (, )][DBLP]

  14. A protocol for property-based attestation. [Citation Graph (, )][DBLP]

  15. A practical property-based bootstrap architecture. [Citation Graph (, )][DBLP]

  16. Securing Peer-to-Peer Distributions for Mobile Devices. [Citation Graph (, )][DBLP]

  17. Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]

  18. Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. [Citation Graph (, )][DBLP]

  19. Towards a Trusted Mobile Desktop. [Citation Graph (, )][DBLP]

  20. µTSS - A Simplified Trusted Software Stack. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002