TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 45.

Paverd, Andrew and Völp, Marcus and Brasser, Ferdinand and Schunter, Matthias and Asokan, N. and Sadeghi, Ahmad-Reza and Esteves-Verissimo, Paulo and Steininger, Andreas and Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, In: 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference or Workshop Item]

Abera, Tigist and Bahmani, Raad and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Ibrahim, Ahmad and Conti, Mauro and Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, In: Trust and Trustworthy Computing, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias
Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Milman, Ivan and Wolfson, Charles and Schunter, Matthias and Hinton, Heather and Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
[Standards, patents]

Camenisch, Jan and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2011):
Reducing access to sensitive information.
[Standards, patents]

Sadeghi, Ahmad-Reza and Stüble, Christian and Cabuk, Serdar and Dalton, Chris and Eriksson, Konrad and Kuhlmann, Dirk and Ramasamy, Hari Govind and Ramunno, Gianluca and Schunter, Matthias (2010):
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, pp. 89-121, 18, (1), [Article]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Schunter, Matthias and Poritz, Jonathan and Waidner, Michael and Herreweghen, Els Van (2008):
Method and Device for Verifying the Security of a Computing Platform.
[Standards, patents]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Ramasamy, Hari Govind and Schulz, Stefan and Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Springer Verlag, Hong Kong, China, In: LNCS, 4610, [Conference or Workshop Item]

Schunter, Matthias and Waidner, Michael (2007):
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007), [Conference or Workshop Item]

Backes, Michael and Karjoth, Günter and Pitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
[Standards, patents]

Bangerter, Endre Felix and Camenisch, Jan and Schunter, Matthias and Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
[Standards, patents]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Karioth, Guenter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
[Standards, patents]

Bangerter, Endre and Schunter, Matthias and Waidner, Michael and Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
[Standards, patents]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Bussani, Anthony and Griffin, John Linwood and Jansen, Bernhard and Julisch, Klaus and Karjoth, Günter and Maruyama, Hiroshi and Nakamura, Megumi and Perez, Ronald and Schunter, Matthias and Tanner, Axel and Doorn, Leendert Van and Herreweghen, Els Van and Waidner, Michael and Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Betz, Linda and Dayka, John and Farrell, Walter and Guski, Richard and Karjoth, Günter and Nelson, Mark and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
[Standards, patents]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, pp. 3--9, 27, (1), [Article]

Karjoth, Günter and Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)), [Conference or Workshop Item]

Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Translating EPAL to P3P -- How to Keep Enterprise Privacy Promises in Sync With the Actual Practices (Position Papers).
[Report]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Steinbrecher, Sandra (2002):
Auctions with Multiple Rounds and Multiple Items.
In: Int. Workshop on Trust and Privacy in Digital Business (DEXA 2002), [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001, Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Adler, Steven and Bangerter, Endre and Bohrer, Kathy and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Kesdogan, Dogan and Leonard, Matthew and Liu, Xuan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Powers, Calvin and Schnyder, Michael and Schonberg, Edith and Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Schunter, Matthias and Waidner, Michael and Whinnett, Dale (1999):
The SEMPER Framework for Secure Electronic Commerce.
In: Wirtschaftsinformatik 1999, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), [Conference or Workshop Item]

Schunter, Matthias and Waidner, Michael and Whinnett, Dale (1998):
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, pp. 1501--1510, 30, [Article]

Waidner, Michael and Schunter, Matthias (1997):
Architecture and Design of a Secure Electronic Marketplace.
In: Joint European Networking Conference (JENC8), [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, pp. 61--68, 30, (2), [Article]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
[Standards, patents]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, Springer-Verlag, Berlin, [Conference or Workshop Item]

Carter, Bob and Pfitzmann, Birgit and Schunter, Matthias and Stanford, Chris and Waidner, Michael and Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

Boly, Jean-Paul and Bosselaers, Antoon and Cramer, Ronald and Michelsen, Rolf and Mjolsnes, Stig and Muller, Frank and Pedersen, Torben and Pfitzmann, Birgit and de Rooij, Peter and Schoenmakers, Berry and Schunter, Matthias and Vallée, Luc and Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, Springer-Verlag, Berlin, [Conference or Workshop Item]

This list was generated on Tue Oct 15 00:57:09 2019 CEST.