dblp.uni-trier.dewww.uni-trier.de

Andreas U. Schmidt

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
32EEAndreas U. Schmidt: Free-Riding and Competition in Network Markets for Digital Goods. HICSS 2008: 299
31EEAndreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth: Trust for Location-Based Authorisation. WCNC 2008: 3163-3168
30EEAndreas U. Schmidt, Nicolai Kuntze, Michael Kasper: On the Deployment of Mobile Trusted Modules. WCNC 2008: 3169-3174
29EEAndreas U. Schmidt: On the Superdistribution of Digital Goods CoRR abs/0806.1543: (2008)
28EEAndreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari: SPAM over Internet Telephony and how to deal with it CoRR abs/0806.1610: (2008)
2007
27EENicolai Kuntze, Andreas U. Schmidt, Christian Hett: Non-Repudiation in Internet Telephony. SEC 2007: 361-372
26EENicolai Kuntze, Andreas U. Schmidt: Trusted Ticket Systems and Applications. SEC 2007: 49-60
25EEAndreas U. Schmidt, Nicolai Kuntze, Michael Kasper: On the deployment of Mobile Trusted Modules CoRR abs/0712.2113: (2007)
24EEAndreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth: Trust for Location-based Authorisation CoRR abs/0712.2231: (2007)
23EENicolai Kuntze, Andreas U. Schmidt: Trusted Ticket Systems and Applications CoRR abs/cs/0701144: (2007)
22EENicolai Kuntze, Andreas U. Schmidt, Christian Hett: Non-Repudiation in Internet Telephony CoRR abs/cs/0701145: (2007)
21EENicolai Kuntze, Andreas U. Schmidt: Protection of DVB Systems by Trusted Computing CoRR abs/cs/0702086: (2007)
2006
20EENicolai Kuntze, Andreas U. Schmidt: Transitive Trust in Mobile Scenarios. ETRICS 2006: 73-85
19EENicolai Kuntze, Andreas U. Schmidt: Trusted Computing in Mobile Action. ISSA 2006: 1-12
18EEAndreas U. Schmidt, Jan Piechalski: Authorised Translations of Electronic Documents. ISSA 2006: 1-14
17EENicolai Kuntze, Andreas U. Schmidt: Transitive trust in mobile scenarios CoRR abs/cs/0603051: (2006)
16EEChristian Hett, Nicolai Kuntze, Andreas U. Schmidt: A secure archive for Voice-over-IP conversations CoRR abs/cs/0606032: (2006)
15EENicolai Kuntze, Andreas U. Schmidt: Trusted Computing in Mobile Action CoRR abs/cs/0606045: (2006)
14EEJan Piechalski, Andreas U. Schmidt: Authorised Translations of Electronic Documents CoRR abs/cs/0606046: (2006)
13EEChristian Hett, Nicolai Kuntze, Andreas U. Schmidt: Security and Non-Repudiation for Voice-Over-IP Conversations CoRR abs/cs/0606068: (2006)
12EENicolai Kuntze, Dominique Maehler, Andreas U. Schmidt: Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems CoRR abs/cs/0607142: (2006)
11EENicolai Kuntze, Andreas U. Schmidt: Trustworthy content push CoRR abs/cs/0612061: (2006)
10EEAndreas U. Schmidt: Multi-level markets and incentives for information goods. Information Economics and Policy 18(2): 125-138 (2006)
2005
9 Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt: Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. DFN-Arbeitstagung über Kommunikationsnetze 2005: 191-204
8EEAndreas U. Schmidt, Zbynek Loebl: Legal Security for Transformations of Signed Documents: Fundamental Concepts. EuroPKI 2005: 255-270
7EEAndreas U. Schmidt, Nicolai Kuntze, Thomas Rauch: Security for Distributed Web-Services via Aspect-Oriented Programming. ISSA 2005: 1-12
6 Stefanie Fischer-Dieskau, Thomas Kunz, Andreas U. Schmidt, Ursula Viebeg: Grundkonzepte rechtssicherer Transformation signierter Dokumente. Sicherheit 2005: 401-412
5EEAndreas U. Schmidt: A model for prejudiced learning in noisy environments. Applied Mathematics and Computation 168(1): 354-379 (2005)
4EENicolai Kuntze, Thomas Rauch, Andreas U. Schmidt: Security for Distributed Web-Applications via Aspect-Oriented Programming CoRR abs/cs/0507071: (2005)
2004
3EEAndreas U. Schmidt: On Incentive Systems Based on Multi-Level Marketing of Virtual Goods CoRR cs.GT/0409028: (2004)
2003
2EEAndreas U. Schmidt: A Model for Prejudiced Learning in Noisy Environments CoRR nlin.AO/0306055: (2003)
2000
1 Andreas U. Schmidt: Signiertes XML und das Präsentationsproblem. Datenschutz und Datensicherheit 24(3): (2000)

Coauthor Index

1Joerg Abendroth [24] [31]
2Stefanie Fischer-Dieskau [6]
3Christian Hett [13] [16] [22] [27]
4Michael Kasper [25] [30]
5Rachid El Khayari [28]
6Nicolai Kuntze [4] [7] [9] [11] [12] [13] [15] [16] [17] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [30] [31]
7Thomas Kunz [6]
8Zbynek Loebl [8]
9Dominique Maehler [12]
10Jan Piechalski [14] [18]
11Thomas Rauch [4] [7] [9]
12Ursula Viebeg [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)