Andreas U. Schmidt

Affiliations:
  • Novalyst IT AG, Karben, Germany
  • Fraunhofer-Insitute for Secure Information Technology (SIT), Darmstadt, Germany (former)


According to our database1, Andreas U. Schmidt authored at least 40 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Planning Distributed Security Operations Centers in Multi-Cloud Landscapes: A Case Study.
CoRR, 2023

2013
Evolution of trust systems from PCs to mobile devices: Building secured and trusted ecosystems.
IEEE Veh. Technol. Mag., 2013

Tree-formed verification data for trusted platforms.
Comput. Secur., 2013

2012
Smart OpenID: A Smart Card Based OpenID Protocol.
Proceedings of the Information Security and Privacy Research, 2012

Scalable Trust Assessment and Remediation of Wireless Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

2011
Sender Scorecards.
IEEE Veh. Technol. Mag., 2011

2010
Trusted Platform Validation and Management.
Int. J. Dependable Trust. Inf. Syst., 2010

Secure Operations on Tree-Formed Verification Data
CoRR, 2010

Tree-formed Verification Data for Trusted Platforms
CoRR, 2010

Trusted Computing enhanced OpenID.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Trust in M2M communication.
IEEE Veh. Technol. Mag., 2009

On the Superdistribution of Digital Goods.
J. Univers. Comput. Sci., 2009

Implementation of a Trusted Ticket System.
Proceedings of the Emerging Challenges for Security, 2009

2008
On the Deployment of Mobile Trusted Modules.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Trust for Location-Based Authorisation.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Evaluating Measures and Countermeasures for SPAM over Internet Telephony.
Proceedings of the ISSE 2008, 2008

Spam Over Internet Telephony and How to Deal with it.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Trust in Business Processes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Free-Riding and Competition in Network Markets for Digital Goods.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Protection of DVB Systems by Trusted Computing
CoRR, 2007

Trustworthy Content Push.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Non-Repudiation in Internet Telephony.
Proceedings of the New Approaches for Security, 2007

Trusted Ticket Systems and Applications.
Proceedings of the New Approaches for Security, 2007

2006
Multi-level markets and incentives for information goods.
Inf. Econ. Policy, 2006

Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
CoRR, 2006

Security and Non-Repudiation for Voice-Over-IP Conversations
CoRR, 2006

A secure archive for Voice-over-IP conversations
CoRR, 2006

Authorised Translations of Electronic Documents.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Trusted Computing in Mobile Action.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Transitive Trust in Mobile Scenarios.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Asymptotic hyperfunctions, tempered hyperfunctions, and asymptotic expansions.
Int. J. Math. Math. Sci., 2005

Security for Distributed Web-Applications via Aspect-Oriented Programming
CoRR, 2005

A model for prejudiced learning in noisy environments.
Appl. Math. Comput., 2005

Grundkonzepte rechtssicherer Transformation signierter Dokumente.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Security for Distributed Web-Services via Aspect-Oriented Programming.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Legal Security for Transformations of Signed Documents: Fundamental Concepts.
Proceedings of the Public Key Infrastructure, 2005

Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung.
Proceedings of the "Heute schon das Morgen sehen", 2005

2004
On Incentive Systems Based on Multi-Level Marketing of Virtual Goods
CoRR, 2004

2003
Das Präsentationsproblem der XML-Signatur und seine Lösung durch Profiles.
Datenschutz und Datensicherheit, 2003

2000
Signiertes XML und das Präsentationsproblem.
Datenschutz und Datensicherheit, 2000


  Loading...