Stefan G. Weber

According to our database1, Stefan G. Weber authored at least 19 papers between 2007 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Alltagstaugliche Biometrie: Entwicklungen, Herausforderungen und Chancen.
CoRR, 2014

2013
Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles.
Int. J. Inf. Syst. Crisis Response Manag., 2013

Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach.
IACR Cryptol. ePrint Arch., 2013

Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes.
IACR Cryptol. ePrint Arch., 2013

Biometrische IT-Sicherheit - eine Frage des Fingerspitzengefühls?
Datenschutz und Datensicherheit, 2013

2012
Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing
Cryptology and Information Security Series, IOS Press, ISBN: 978-1-61499-157-1, 2012

Multilaterally secure pervasive cooperation.
J. Ambient Intell. Smart Environ., 2012

A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes.
Inf. Secur. J. A Glob. Perspect., 2012

On Transaction Pseudonyms with Implicit Attributes.
IACR Cryptol. ePrint Arch., 2012

2011
Multilaterally Secure Ubiquitous Auditing.
Proceedings of the Intelligent Networking, Collaborative Systems and Applications, 2011

Multilaterally secure pervasive cooperation.
PhD thesis, 2011

MundoMessage: enabling trustworthy ubiquitous emergency communication.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
Attribute-Based Encryption with Break-Glass.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model.
Proceedings of the ICEGOV 2009, 2009

2008
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments.
Proceedings of the The Third International Conference on Availability, 2008

2007
Security and Privacy in Pervasive Computing.
IEEE Pervasive Comput., 2007

Inherent Tradeoffs in Ubiquitous Computing Services.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

On Coercion-Resistant Electronic Elections with Linear Work.
Proceedings of the The Second International Conference on Availability, 2007


  Loading...