Frederic Stumpf
According to our database1,
Frederic Stumpf
authored at least 33 papers
between 2007 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Comput. Secur., 2015
2014
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
PAL - privacy augmented LTE: a privacy-preserving scheme for vehicular LTE communication.
Proceedings of the Proceeding of the tenth ACM international workshop on Vehicular inter-networking, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the ISSE 2012, 2012
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011
2010
PhD thesis, 2010
Proceedings of the HOST 2010, 2010
Proceedings of the 5th Workshop on Embedded Systems Security, 2010
2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Datenschutz und Datensicherheit, 2007
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007