dblp.uni-trier.dewww.uni-trier.de

Andreas U. Schmidt Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
36EEAndreas U. Schmidt, Shiguo Lian: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers Springer 2009
35EEAndreas Leicher, Nicolai Kuntze, Andreas U. Schmidt: Implementation of a Trusted Ticket System. SEC 2009: 152-163
2008
34EEAndreas U. Schmidt: Free-Riding and Competition in Network Markets for Digital Goods. HICSS 2008: 299
33EENicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph: Trust in Business Processes. ICYCS 2008: 1992-1997
32EERachid El Khayari, Nicolai Kuntze, Andreas U. Schmidt: Spam Over Internet Telephony and How to Deal with it. ISSA 2008: 1-25
31EEAndreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth: Trust for Location-Based Authorisation. WCNC 2008: 3163-3168
30EEAndreas U. Schmidt, Nicolai Kuntze, Michael Kasper: On the Deployment of Mobile Trusted Modules. WCNC 2008: 3169-3174
29EEAndreas U. Schmidt: On the Superdistribution of Digital Goods CoRR abs/0806.1543: (2008)
28EEAndreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari: SPAM over Internet Telephony and how to deal with it CoRR abs/0806.1610: (2008)
2007
27EENicolai Kuntze, Andreas U. Schmidt, Christian Hett: Non-Repudiation in Internet Telephony. SEC 2007: 361-372
26EENicolai Kuntze, Andreas U. Schmidt: Trusted Ticket Systems and Applications. SEC 2007: 49-60
25EEAndreas U. Schmidt, Nicolai Kuntze, Michael Kasper: On the deployment of Mobile Trusted Modules CoRR abs/0712.2113: (2007)
24EEAndreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth: Trust for Location-based Authorisation CoRR abs/0712.2231: (2007)
23EENicolai Kuntze, Andreas U. Schmidt: Trusted Ticket Systems and Applications CoRR abs/cs/0701144: (2007)
22EENicolai Kuntze, Andreas U. Schmidt, Christian Hett: Non-Repudiation in Internet Telephony CoRR abs/cs/0701145: (2007)
21EENicolai Kuntze, Andreas U. Schmidt: Protection of DVB Systems by Trusted Computing CoRR abs/cs/0702086: (2007)
2006
20EENicolai Kuntze, Andreas U. Schmidt: Transitive Trust in Mobile Scenarios. ETRICS 2006: 73-85
19EENicolai Kuntze, Andreas U. Schmidt: Trusted Computing in Mobile Action. ISSA 2006: 1-12
18EEAndreas U. Schmidt, Jan Piechalski: Authorised Translations of Electronic Documents. ISSA 2006: 1-14
17EENicolai Kuntze, Andreas U. Schmidt: Transitive trust in mobile scenarios CoRR abs/cs/0603051: (2006)
16EEChristian Hett, Nicolai Kuntze, Andreas U. Schmidt: A secure archive for Voice-over-IP conversations CoRR abs/cs/0606032: (2006)
15EENicolai Kuntze, Andreas U. Schmidt: Trusted Computing in Mobile Action CoRR abs/cs/0606045: (2006)
14EEJan Piechalski, Andreas U. Schmidt: Authorised Translations of Electronic Documents CoRR abs/cs/0606046: (2006)
13EEChristian Hett, Nicolai Kuntze, Andreas U. Schmidt: Security and Non-Repudiation for Voice-Over-IP Conversations CoRR abs/cs/0606068: (2006)
12EENicolai Kuntze, Dominique Maehler, Andreas U. Schmidt: Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems CoRR abs/cs/0607142: (2006)
11EENicolai Kuntze, Andreas U. Schmidt: Trustworthy content push CoRR abs/cs/0612061: (2006)
10EEAndreas U. Schmidt: Multi-level markets and incentives for information goods. Information Economics and Policy 18(2): 125-138 (2006)
2005
9 Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt: Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. DFN-Arbeitstagung über Kommunikationsnetze 2005: 191-204
8EEAndreas U. Schmidt, Zbynek Loebl: Legal Security for Transformations of Signed Documents: Fundamental Concepts. EuroPKI 2005: 255-270
7EEAndreas U. Schmidt, Nicolai Kuntze, Thomas Rauch: Security for Distributed Web-Services via Aspect-Oriented Programming. ISSA 2005: 1-12
6 Stefanie Fischer-Dieskau, Thomas Kunz, Andreas U. Schmidt, Ursula Viebeg: Grundkonzepte rechtssicherer Transformation signierter Dokumente. Sicherheit 2005: 401-412
5EEAndreas U. Schmidt: A model for prejudiced learning in noisy environments. Applied Mathematics and Computation 168(1): 354-379 (2005)
4EENicolai Kuntze, Thomas Rauch, Andreas U. Schmidt: Security for Distributed Web-Applications via Aspect-Oriented Programming CoRR abs/cs/0507071: (2005)
2004
3EEAndreas U. Schmidt: On Incentive Systems Based on Multi-Level Marketing of Virtual Goods CoRR cs.GT/0409028: (2004)
2003
2EEAndreas U. Schmidt: A Model for Prejudiced Learning in Noisy Environments CoRR nlin.AO/0306055: (2003)
2000
1 Andreas U. Schmidt: Signiertes XML und das Präsentationsproblem. Datenschutz und Datensicherheit 24(3): (2000)

Coauthor Index

1Joerg Abendroth [24] [31]
2Stefanie Fischer-Dieskau [6]
3Christian Hett [13] [16] [22] [27]
4Michael Kasper [25] [30]
5Rachid El Khayari [28] [32]
6Nicolai Kuntze [4] [7] [9] [11] [12] [13] [15] [16] [17] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [30] [31] [32] [33] [35]
7Thomas Kunz [6]
8Andreas Leicher [35]
9Shiguo Lian [36]
10Zbynek Loebl [8]
11Dominique Mähler (Dominique Maehler) [12]
12Jan Piechalski [14] [18]
13Thomas Rauch [4] [7] [9]
14Carsten Rudolph [33]
15Zaharina Velikova [33]
16Ursula Viebeg [6]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)