Nicolai Kuntze

According to our database1, Nicolai Kuntze authored at least 49 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Hypervisor-Based Attestation of Virtual Environments.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Distributed security management for the IoT.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Trust Establishment in Cooperating Cyber-Physical Systems.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

2014
Security and trust in peer-to-peer based media distribution.
PhD thesis, 2014

Trusted neighborhood discovery in critical infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Security foundation for a distributed cabin core architecture.
Proceedings of the 2014 Information Security for South Africa, 2014

Integrity based relationships and trustworthy communication between network participants.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Integrating trust establishment into routing protocols of today's MANETs.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Seizure of digital data and "selective suppression" of digital evidence.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Bringing VoIP Signatures to Mobile Devices.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013

On the automatic establishment of security relations for devices.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Demo: Zero touch configuration.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Trusted Virtual Machine Management for Virtualization in Critical Environments.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

Enhanced embedded device security by combining hardware-based trust mechanisms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Enhancing Security Testing via Automated Replication of IT-Asset Topologies.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Establishing Trust between Nodes in Mobile Ad-Hoc Networks.
Proceedings of the Trusted Systems, 4th International Conference, 2012

On the Creation of Reliable Digital Evidence.
Proceedings of the Advances in Digital Forensics VIII, 2012

Simulation environment for mobile Virtualized Security Appliances.
Proceedings of the 1st International IEEE Symposium on Wireless Systems, 2012

Trusted service access with dynamic security infrastructure configuration.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2011
Secure Digital Chains of Evidence.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2010
Trust in Peer-to-Peer Content Distribution Protocols.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Security Digital Evidence.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Privacy in Distributed Commercial Applications.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

Secure Mobile Business Information Processing.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Final Architecture Specification of security, privacy, and incentive mechanisms
CoRR, 2009

Implementation of a Trusted Ticket System.
Proceedings of the Emerging Challenges for Security, 2009

Towards security in decentralized workflows.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Reliable Identities Using Off-the-Shelf Hardware Security in MANETs.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Secure Web Service Workflow Execution.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

On the Deployment of Mobile Trusted Modules.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Trust for Location-Based Authorisation.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Evaluating Measures and Countermeasures for SPAM over Internet Telephony.
Proceedings of the ISSE 2008, 2008

Spam Over Internet Telephony and How to Deal with it.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Trust in Business Processes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Securing Decentralized Workflows in Ambient Environments.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Protection of DVB Systems by Trusted Computing
CoRR, 2007

Trustworthy Content Push.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Non-Repudiation in Internet Telephony.
Proceedings of the New Approaches for Security, 2007

Trusted Ticket Systems and Applications.
Proceedings of the New Approaches for Security, 2007

2006
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
CoRR, 2006

Security and Non-Repudiation for Voice-Over-IP Conversations
CoRR, 2006

A secure archive for Voice-over-IP conversations
CoRR, 2006

Trusted Computing in Mobile Action.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Transitive Trust in Mobile Scenarios.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Security for Distributed Web-Applications via Aspect-Oriented Programming
CoRR, 2005

Security for Distributed Web-Services via Aspect-Oriented Programming.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung.
Proceedings of the "Heute schon das Morgen sehen", 2005


  Loading...