dblp.uni-trier.dewww.uni-trier.de

Christian Stüble

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
17EEHans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62
2008
16EEAhmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Property-Based TPM Virtualization. ISC 2008: 1-16
15EEAndré Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan: Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175
14EEYacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble: Flexible and secure enterprise rights management based on trusted virtual domains. STC 2008: 71-80
2007
13EESebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127
12EEHans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble: Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384
11EEAhmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg: Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70
10EEUlrich Kühn, Marcel Selhorst, Christian Stüble: Realizing property-based attestation and sealing with commonly available hard- and software. STC 2007: 50-57
2006
9EEAhmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy: TCG inside?: a note on TPM specification compliance. STC 2006: 47-56
8EELiqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16
2005
7EEUlrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble: Secure Data Management in Trusted Computing. CHES 2005: 324-338
6EEKerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble: An Open Approach for Designing Secure Electronic Immobilizers. ISPEC 2005: 230-242
5EEAhmad-Reza Sadeghi, Christian Stüble: Towards Multilateral-Secure DRM Platforms. ISPEC 2005: 326-337
2004
4EEAhmad-Reza Sadeghi, Christian Stüble: Property-based attestation for computing platforms: caring about properties, not mechanisms. NSPW 2004: 67-77
2003
3EEAmmar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi: Secure object identification: or: solving the Chess Grandmaster Problem. NSPW 2003: 77-85
2EEAhmad-Reza Sadeghi, Christian Stüble: Taming "Trusted Platforms" by Operating System Design. WISA 2003: 286-302
1 Dirk Günnewig, Ahmad-Reza Sadeghi, Christian Stüble: Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen. Datenschutz und Datensicherheit 7(9): (2003)

Coauthor Index

1Ammar Alkassar [3]
2N. Asokan [11] [15]
3Liqun Chen [8]
4Jan-Erik Ekberg [11]
5Sebastian Gajek [13]
6Yacine Gasmi [14]
7Dirk Günnewig [1]
8Rani Husseiki [14]
9Ulrich Kühn [7] [10]
10Klaus Kursawe [7]
11Rainer Landfermann [8]
12Kerstin Lemke-Rust (Kerstin Lemke) [6]
13Hans Löhr [8] [12] [17]
14Stefan Lucks [7]
15André Osterhues [15]
16HariGovind V. Ramasamy [12]
17Markus Rohe [8]
18Ahmad-Reza Sadeghi [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12] [13] [14] [15] [16] [17]
19Stefan Schulz [12]
20Matthias Schunter [12]
21Marcel Selhorst [9] [10]
22Patrick Stewin [14]
23Martin Unger [14]
24Christian Wachsmann [9]
25Marion Weber [17]
26Marcel Winandy [9] [13] [14] [16] [17]
27Marko Wolf [11] [15]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)