dblp.uni-trier.dewww.uni-trier.de

Nicolai Kuntze

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
24EECarsten Rudolph, Nicolai Kuntze, Zaharina Velikova: Secure Web Service Workflow Execution. Electr. Notes Theor. Comput. Sci. 236: 33-46 (2009)
2008
23EENicolai Kuntze, Andreas Schmidt, Zaharina Velikova, Carsten Rudolph: Trust in Business Processes. ICYCS 2008: 1992-1997
22EERachid El Khayari, Nicolai Kuntze, Andreas Schmidt: Spam Over Internet Telephony and How to Deal with it. ISSA 2008: 1-25
21EEAndreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth: Trust for Location-Based Authorisation. WCNC 2008: 3163-3168
20EEAndreas U. Schmidt, Nicolai Kuntze, Michael Kasper: On the Deployment of Mobile Trusted Modules. WCNC 2008: 3169-3174
19EEAndreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari: SPAM over Internet Telephony and how to deal with it CoRR abs/0806.1610: (2008)
2007
18EENicolai Kuntze, Andreas U. Schmidt, Christian Hett: Non-Repudiation in Internet Telephony. SEC 2007: 361-372
17EENicolai Kuntze, Andreas U. Schmidt: Trusted Ticket Systems and Applications. SEC 2007: 49-60
16EEAndreas U. Schmidt, Nicolai Kuntze, Michael Kasper: On the deployment of Mobile Trusted Modules CoRR abs/0712.2113: (2007)
15EEAndreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth: Trust for Location-based Authorisation CoRR abs/0712.2231: (2007)
14EENicolai Kuntze, Andreas U. Schmidt: Trusted Ticket Systems and Applications CoRR abs/cs/0701144: (2007)
13EENicolai Kuntze, Andreas U. Schmidt, Christian Hett: Non-Repudiation in Internet Telephony CoRR abs/cs/0701145: (2007)
12EENicolai Kuntze, Andreas U. Schmidt: Protection of DVB Systems by Trusted Computing CoRR abs/cs/0702086: (2007)
2006
11EENicolai Kuntze, Andreas U. Schmidt: Transitive Trust in Mobile Scenarios. ETRICS 2006: 73-85
10EENicolai Kuntze, Andreas U. Schmidt: Trusted Computing in Mobile Action. ISSA 2006: 1-12
9EENicolai Kuntze, Andreas U. Schmidt: Transitive trust in mobile scenarios CoRR abs/cs/0603051: (2006)
8EEChristian Hett, Nicolai Kuntze, Andreas U. Schmidt: A secure archive for Voice-over-IP conversations CoRR abs/cs/0606032: (2006)
7EENicolai Kuntze, Andreas U. Schmidt: Trusted Computing in Mobile Action CoRR abs/cs/0606045: (2006)
6EEChristian Hett, Nicolai Kuntze, Andreas U. Schmidt: Security and Non-Repudiation for Voice-Over-IP Conversations CoRR abs/cs/0606068: (2006)
5EENicolai Kuntze, Dominique Maehler, Andreas U. Schmidt: Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems CoRR abs/cs/0607142: (2006)
4EENicolai Kuntze, Andreas U. Schmidt: Trustworthy content push CoRR abs/cs/0612061: (2006)
2005
3 Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt: Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. DFN-Arbeitstagung über Kommunikationsnetze 2005: 191-204
2EEAndreas U. Schmidt, Nicolai Kuntze, Thomas Rauch: Security for Distributed Web-Services via Aspect-Oriented Programming. ISSA 2005: 1-12
1EENicolai Kuntze, Thomas Rauch, Andreas U. Schmidt: Security for Distributed Web-Applications via Aspect-Oriented Programming CoRR abs/cs/0507071: (2005)

Coauthor Index

1Joerg Abendroth [15] [21]
2Christian Hett [6] [8] [13] [18]
3Michael Kasper [16] [20]
4Rachid El Khayari [19] [22]
5Dominique Maehler [5]
6Thomas Rauch [1] [2] [3]
7Carsten Rudolph [23] [24]
8Andreas Schmidt [22] [23]
9Andreas U. Schmidt [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21]
10Zaharina Velikova [23] [24]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)