Markus Schneider

Affiliations:
  • Fraunhofer Gesellschaft, Institute for Secure Information Technology
  • Hagen University, Germany (PhD 1999)


According to our database1, Markus Schneider authored at least 40 papers between 1997 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur.
Datenschutz und Datensicherheit, 2021

2013
F2S2: Fast forensic similarity search through indexing piecewise hash signatures.
Digit. Investig., 2013

2012
Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework.
Proceedings of the Seventh International Conference on Availability, 2012

Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Detecting Fraud Using Modified Benford Analysis.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge.
Datenschutz und Datensicherheit, 2010

Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen - Methoden zur Aufklärung verbotener Handlungen im Spannungsfeld rechtlicher Interessen.
Datenschutz und Datensicherheit, 2010

3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data.
Proceedings of the Computational Forensics - 4th International Workshop, 2010

2008
On handling insider attacks in wireless sensor networks.
Inf. Secur. Tech. Rep., 2008

Defending against false-endorsement-based dos attacks in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
Denial of Service Detection in Mobile Agent Systems with Dependencies in Computations.
Proceedings of the Contributions to Ubiquitous Computing, 2007

A note on the security of code memo.
Proceedings of the 4th International Conference on Mobile Technology, 2007

Customer Loyalty Programs and Privacy Concerns.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007

STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks.
Proceedings of the The Second International Conference on Availability, 2007

2005
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System.
Inf. Syst. Frontiers, 2005

CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2005

A Privacy-Protecting Coupon System.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Towards Certificate-Based Authentication for Future Mobile Communications.
Wirel. Pers. Commun., 2004

A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.
Proceedings of the Financial Cryptography, 2004

A Privacy-Friendly Loyalty System for Electronic Marketplaces.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Note on Certificate Path Verification in Next Generation Mobile Communications.
Proceedings of the Organic and Pervasive Computing, 2004

2003
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach.
Proceedings of the Computer Network Security, 2003

Electronic Payment Systems.
Proceedings of the Digital Rights Management, 2003

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Applying Trust Policies for Protecting Mobile Agents Against DoS.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping.
Proceedings of the Infrastructure Security, International Conference, 2002

Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

A Method for Protecting Mobile Agents against Denial of Service Attacks.
Proceedings of the Cooperative Information Agents VI, 6th International Workshop, 2002

How to Play Sherlock Holmes in the World of Mobile Agents.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
A Phase Model for E-Commerce Business Models and its Application to Security Assessment.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

From Call for Tenders to Sealed-Bid Auction for Mediated Ecommerce.
Proceedings of the Semantic Issues in E-Commerce Systems, 2001

2000
On distribution properties of sequences with perfect linear complexity profile.
Inf. Process. Lett., 2000

1999
Über Methoden der Generierung binärer Pseudozufallsfolgen zur Stromverschlüsselung.
PhD thesis, 1999

Die Rolle der Kryptologie in der Kommunikationstechnik.
Informationstechnik Tech. Inform., 1999

Sicherheit und Perspektiven elektronischer Zahlungssysteme.
Datenschutz und Datensicherheit, 1999

Protecting a Mobile Agent's Route against Collusions.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Methods for Protecting a Mobile Agent's Route.
Proceedings of the Information Security, Second International Workshop, 1999

1997
A Note on the Construction and Upper Bounds of Correlation-Immune Functions.
Proceedings of the Cryptography and Coding, 1997


  Loading...