Christian Stüble

According to our database1, Christian Stüble authored at least 30 papers between 2003 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Towards Transparent Information on Individual Cloud Service Usage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Wie schützt sich die Industrie vor Wirtschaftsspionage 4.0.
Datenschutz und Datensicherheit, 2015

2012
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen - Vom Mikrokern bis zu Capabilities - Verschiedene Lösungsansätze für die App-Trennung und -Kontrolle.
Datenschutz und Datensicherheit, 2012

Securing Smartphone Compartments: Approaches and Solutions.
Proceedings of the ISSE 2012, 2012

2010
Towards automated security policy enforcement in multi-tenant virtual data centers.
J. Comput. Secur., 2010

Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

<i>µ</i>TSS - A Simplified Trusted Software Stack.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Towards a Trusted Mobile Desktop.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

2009
Secure offline superdistribution for mobile platforms.
Int. J. Appl. Cryptogr., 2009

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009

A practical property-based bootstrap architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Property-Based TPM Virtualization.
Proceedings of the Information Security, 11th International Conference, 2008

Securing Peer-to-Peer Distributions for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2008

Flexible and secure enterprise rights management based on trusted virtual domains.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Enabling Fairer Digital Rights Management with Trusted Computing.
Proceedings of the Information Security, 10th International Conference, 2007

A Security Architecture for Enterprise Rights Management.
Proceedings of the ISSE/SECURE 2007, 2007

Realizing property-based attestation and sealing with commonly available hard- and software.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

Enhancing Grid Security Using Trusted Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007

2006
TCG inside?: a note on TPM specification compliance.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

A protocol for property-based attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
Towards multilaterally secure computing platforms - with open source and trusted computing.
Inf. Secur. Tech. Rep., 2005

Towards Multilateral-Secure DRM Platforms.
Proceedings of the Information Security Practice and Experience, 2005

An Open Approach for Designing Secure Electronic Immobilizers.
Proceedings of the Information Security Practice and Experience, 2005

Secure Data Management in Trusted Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Property-based attestation for computing platforms: caring about properties, not mechanisms.
Proceedings of the New Security Paradigms Workshop 2004, 2004

Enhancing Security of Computing Platforms with TC-Technology.
Proceedings of the ISSE 2004, 2004

2003
Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen.
Datenschutz und Datensicherheit, 2003

Taming "Trusted Platforms" by Operating System Design.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Secure object identification: or: solving the Chess Grandmaster Problem.
Proceedings of the New Security Paradigms Workshop 2003, 2003


  Loading...