2008 | ||
---|---|---|
31 | EE | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter: Policy enforcement and compliance proofs for Xen virtual machines. VEE 2008: 101-110 |
2007 | ||
30 | EE | Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter: Towards automated provisioning of secure virtualized networks. ACM Conference on Computer and Communications Security 2007: 235-245 |
29 | EE | Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble: Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384 |
28 | EE | Tyrone Grandison, Marcel Bilger, L. O'Connor, M. Graf, Morton Swimmer, Matthias Schunter, Andreas Wespi, Nev Zunic: Elevating the Discussion on Security Management: The Data Centric Paradigm. BDIM 2007: 84-93 |
27 | EE | Matthias Schunter, Michael Waidner: Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232 |
26 | EE | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner: Architecting Dependable and Secure Systems Using Virtualization. WADS 2007: 124-149 |
2006 | ||
25 | EE | Chris Vanden Berghe, Matthias Schunter: Privacy Injector - Automated Privacy Enforcement Through Aspects. Privacy Enhancing Technologies 2006: 99-117 |
2005 | ||
24 | EE | Matthias Schunter: Certified Mail. Encyclopedia of Cryptography and Security 2005 |
23 | EE | Matthias Schunter: Contract Signing. Encyclopedia of Cryptography and Security 2005 |
22 | EE | Matthias Schunter: Fair Exchange. Encyclopedia of Cryptography and Security 2005 |
2004 | ||
21 | EE | Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter: Efficient comparison of enterprise privacy policies. SAC 2004: 375-382 |
20 | EE | Günter Karjoth, Matthias Schunter, Michael Waidner: Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004) |
2003 | ||
19 | EE | Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner: Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449 |
18 | EE | Michael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180 |
17 | EE | Michael Backes, Matthias Schunter: From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. NSPW 2003: 67-74 |
16 | EE | Günter Karjoth, Matthias Schunter, Els Van Herreweghen: Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. POLICY 2003: 135-146 |
2002 | ||
15 | EE | Günter Karjoth, Matthias Schunter: A Privacy Policy Model for Enterprises. CSFW 2002: 271-281 |
14 | EE | Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher: Private Auctions with Multiple Rounds and Multiple Items. DEXA Workshops 2002: 423-427 |
13 | EE | Günter Karjoth, Matthias Schunter, Michael Waidner: Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487 |
12 | EE | Günter Karjoth, Matthias Schunter, Michael Waidner: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84 |
11 | EE | Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter: E-P3P privacy policies and privacy authorization. WPES 2002: 103-109 |
2000 | ||
10 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Electr. Notes Theor. Comput. Sci. 32: (2000) |
1999 | ||
9 | Matthias Schunter, Michael Waidner, Dale Whinnett: The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 41(3): 238-247 (1999) | |
1998 | ||
8 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 |
7 | EE | Matthias Schunter, Michael Waidner, Dale Whinnett: A Status Report on the SEMPER Framework for Secure Electronic Commerce. Computer Networks 30(16-18): 1501-1510 (1998) |
1997 | ||
6 | EE | N. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. ACM Conference on Computer and Communications Security 1997: 7-17 |
5 | Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. IEEE Computer 30(2): 61-68 (1997) | |
1996 | ||
4 | EE | Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting (Extended Abstract). EUROCRYPT 1996: 84-95 |
1995 | ||
3 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132 |
2 | Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329- | |
1994 | ||
1 | EE | Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230 |