Matthias Schunter
According to our database1,
Matthias Schunter
authored at least 60 papers
between 1994 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019
2018
Proceedings of the Computer Security, 2018
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
2012
Dagstuhl Reports, 2012
Proceedings of the 2nd International Workshop on Cloud Computing Platforms, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
TClouds - Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud.
Datenschutz und Datensicherheit, 2011
Proceedings of the Future Internet, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
2010
J. Comput. Secur., 2010
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010
Security audits of multi-tier virtual infrastructures in public infrastructure clouds.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Proceedings of the Trusted Systems, First International Conference, 2009
2008
Proceedings of the 4th International Conference on Virtual Execution Environments, 2008
2007
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of BDIM 2007, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
2005
2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
2003
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
Proceedings of the New Security Paradigms Workshop 2003, 2003
Proceedings of the Computer Security, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
1998
Comput. Networks, 1998
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
1997
Proceedings of the Personal Medical Information - Security, Engineering, and Ethics, 1997
1996
Proceedings of the Advances in Cryptology, 1996
1995
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Computer Security, 1994