| 2008 |
| 31 | EE | Bernhard Jansen,
HariGovind V. Ramasamy,
Matthias Schunter:
Policy enforcement and compliance proofs for Xen virtual machines.
VEE 2008: 101-110 |
| 2007 |
| 30 | EE | Serdar Cabuk,
Chris I. Dalton,
HariGovind V. Ramasamy,
Matthias Schunter:
Towards automated provisioning of secure virtualized networks.
ACM Conference on Computer and Communications Security 2007: 235-245 |
| 29 | EE | Hans Löhr,
HariGovind V. Ramasamy,
Ahmad-Reza Sadeghi,
Stefan Schulz,
Matthias Schunter,
Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization.
ATC 2007: 372-384 |
| 28 | EE | Tyrone Grandison,
Marcel Bilger,
L. O'Connor,
M. Graf,
Morton Swimmer,
Matthias Schunter,
Andreas Wespi,
Nev Zunic:
Elevating the Discussion on Security Management: The Data Centric Paradigm.
BDIM 2007: 84-93 |
| 27 | EE | Matthias Schunter,
Michael Waidner:
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.
Privacy Enhancing Technologies 2007: 218-232 |
| 26 | EE | Bernhard Jansen,
HariGovind V. Ramasamy,
Matthias Schunter,
Axel Tanner:
Architecting Dependable and Secure Systems Using Virtualization.
WADS 2007: 124-149 |
| 2006 |
| 25 | EE | Chris Vanden Berghe,
Matthias Schunter:
Privacy Injector - Automated Privacy Enforcement Through Aspects.
Privacy Enhancing Technologies 2006: 99-117 |
| 2005 |
| 24 | EE | Matthias Schunter:
Certified Mail.
Encyclopedia of Cryptography and Security 2005 |
| 23 | EE | Matthias Schunter:
Contract Signing.
Encyclopedia of Cryptography and Security 2005 |
| 22 | EE | Matthias Schunter:
Fair Exchange.
Encyclopedia of Cryptography and Security 2005 |
| 2004 |
| 21 | EE | Michael Backes,
Günter Karjoth,
Walid Bagga,
Matthias Schunter:
Efficient comparison of enterprise privacy policies.
SAC 2004: 375-382 |
| 20 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Privacy-enabled Management of Customer Data.
IEEE Data Eng. Bull. 27(1): 3-9 (2004) |
| 2003 |
| 19 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen,
Michael Waidner:
Amending P3P for Clearer Privacy Promises.
DEXA Workshops 2003: 445-449 |
| 18 | EE | Michael Backes,
Birgit Pfitzmann,
Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies.
ESORICS 2003: 162-180 |
| 17 | EE | Michael Backes,
Matthias Schunter:
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
NSPW 2003: 67-74 |
| 16 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen:
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep.
POLICY 2003: 135-146 |
| 2002 |
| 15 | EE | Günter Karjoth,
Matthias Schunter:
A Privacy Policy Model for Enterprises.
CSFW 2002: 271-281 |
| 14 | EE | Ahmad-Reza Sadeghi,
Matthias Schunter,
Sandra Steinbrecher:
Private Auctions with Multiple Rounds and Multiple Items.
DEXA Workshops 2002: 423-427 |
| 13 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Privacy-Enabled Services for Enterprises.
DEXA Workshops 2002: 483-487 |
| 12 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Privacy Enhancing Technologies 2002: 69-84 |
| 11 | EE | Paul Ashley,
Satoshi Hada,
Günter Karjoth,
Matthias Schunter:
E-P3P privacy policies and privacy authorization.
WPES 2002: 103-109 |
| 2000 |
| 10 | EE | Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Cryptographic Security of Reactive Systems.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
| 1999 |
| 9 | | Matthias Schunter,
Michael Waidner,
Dale Whinnett:
The SEMPER Framework for Secure Electronic Commerce.
Wirtschaftsinformatik 41(3): 238-247 (1999) |
| 1998 |
| 8 | EE | Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Optimal Efficiency of Optimistic Contract Signing.
PODC 1998: 113-122 |
| 7 | EE | Matthias Schunter,
Michael Waidner,
Dale Whinnett:
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
Computer Networks 30(16-18): 1501-1510 (1998) |
| 1997 |
| 6 | EE | N. Asokan,
Matthias Schunter,
Michael Waidner:
Optimistic Protocols for Fair Exchange.
ACM Conference on Computer and Communications Security 1997: 7-17 |
| 5 | | Andreas Pfitzmann,
Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Trusting Mobile User Devices and Security Modules.
IEEE Computer 30(2): 61-68 (1997) |
| 1996 |
| 4 | EE | Birgit Pfitzmann,
Matthias Schunter:
Asymmetric Fingerprinting (Extended Abstract).
EUROCRYPT 1996: 84-95 |
| 1995 |
| 3 | EE | Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
How to Break Another Provably Secure Payment System.
EUROCRYPT 1995: 121-132 |
| 2 | | Andreas Pfitzmann,
Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
VIS 1995: 329- |
| 1994 |
| 1 | EE | Jean-Paul Boly,
Antoon Bosselaers,
Ronald Cramer,
Rolf Michelsen,
Stig Fr. Mjølsnes,
Frank Muller,
Torben P. Pedersen,
Birgit Pfitzmann,
Peter de Rooij,
Berry Schoenmakers,
Matthias Schunter,
Luc Vallée,
Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems.
ESORICS 1994: 217-230 |