dblp.uni-trier.dewww.uni-trier.de

Matthias Schunter

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
31EEBernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter: Policy enforcement and compliance proofs for Xen virtual machines. VEE 2008: 101-110
2007
30EESerdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter: Towards automated provisioning of secure virtualized networks. ACM Conference on Computer and Communications Security 2007: 235-245
29EEHans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble: Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384
28EETyrone Grandison, Marcel Bilger, L. O'Connor, M. Graf, Morton Swimmer, Matthias Schunter, Andreas Wespi, Nev Zunic: Elevating the Discussion on Security Management: The Data Centric Paradigm. BDIM 2007: 84-93
27EEMatthias Schunter, Michael Waidner: Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232
26EEBernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner: Architecting Dependable and Secure Systems Using Virtualization. WADS 2007: 124-149
2006
25EEChris Vanden Berghe, Matthias Schunter: Privacy Injector - Automated Privacy Enforcement Through Aspects. Privacy Enhancing Technologies 2006: 99-117
2005
24EEMatthias Schunter: Certified Mail. Encyclopedia of Cryptography and Security 2005
23EEMatthias Schunter: Contract Signing. Encyclopedia of Cryptography and Security 2005
22EEMatthias Schunter: Fair Exchange. Encyclopedia of Cryptography and Security 2005
2004
21EEMichael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter: Efficient comparison of enterprise privacy policies. SAC 2004: 375-382
20EEGünter Karjoth, Matthias Schunter, Michael Waidner: Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004)
2003
19EEGünter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner: Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449
18EEMichael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180
17EEMichael Backes, Matthias Schunter: From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. NSPW 2003: 67-74
16EEGünter Karjoth, Matthias Schunter, Els Van Herreweghen: Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. POLICY 2003: 135-146
2002
15EEGünter Karjoth, Matthias Schunter: A Privacy Policy Model for Enterprises. CSFW 2002: 271-281
14EEAhmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher: Private Auctions with Multiple Rounds and Multiple Items. DEXA Workshops 2002: 423-427
13EEGünter Karjoth, Matthias Schunter, Michael Waidner: Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487
12EEGünter Karjoth, Matthias Schunter, Michael Waidner: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84
11EEPaul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter: E-P3P privacy policies and privacy authorization. WPES 2002: 103-109
2000
10EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Electr. Notes Theor. Comput. Sci. 32: (2000)
1999
9 Matthias Schunter, Michael Waidner, Dale Whinnett: The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 41(3): 238-247 (1999)
1998
8EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122
7EEMatthias Schunter, Michael Waidner, Dale Whinnett: A Status Report on the SEMPER Framework for Secure Electronic Commerce. Computer Networks 30(16-18): 1501-1510 (1998)
1997
6EEN. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. ACM Conference on Computer and Communications Security 1997: 7-17
5 Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. IEEE Computer 30(2): 61-68 (1997)
1996
4EEBirgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting (Extended Abstract). EUROCRYPT 1996: 84-95
1995
3EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132
2 Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329-
1994
1EEJean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230

Coauthor Index

1Paul Ashley [11]
2N. Asokan [6]
3Michael Backes [17] [18] [21]
4Walid Bagga [21]
5Chris Vanden Berghe [25]
6Marcel Bilger [28]
7Jean-Paul Boly [1]
8Antoon Bosselaers [1]
9Serdar Cabuk [30]
10Ronald Cramer [1]
11Chris I. Dalton [30]
12M. Graf [28]
13Tyrone Grandison [28]
14Satoshi Hada [11]
15Els Van Herreweghen [16] [19]
16Bernhard Jansen [26] [31]
17Günter Karjoth [11] [12] [13] [15] [16] [19] [20] [21]
18Hans Löhr [29]
19Rolf Michelsen [1]
20Stig Fr. Mjølsnes [1]
21Frank Muller [1]
22L. O'Connor [28]
23Torben P. Pedersen [1]
24Andreas Pfitzmann [2] [5]
25Birgit Pfitzmann [1] [2] [3] [4] [5] [8] [10] [18]
26HariGovind V. Ramasamy [26] [29] [30] [31]
27Peter de Rooij [1]
28Ahmad-Reza Sadeghi [14] [29]
29Berry Schoenmakers [1]
30Stefan Schulz [29]
31Sandra Steinbrecher [14]
32Christian Stüble [29]
33Morton Swimmer [28]
34Axel Tanner [26]
35Luc Vallée [1]
36Michael Waidner [1] [2] [3] [5] [6] [7] [8] [9] [10] [12] [13] [19] [20] [27]
37Andreas Wespi [28]
38Dale Whinnett [7] [9]
39Nev Zunic [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)