default search action
Andreas U. Schmidt
Person information
- affiliation: Novalyst IT AG, Karben, Germany
- affiliation (former): Fraunhofer-Insitute for Secure Information Technology (SIT), Darmstadt, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i20]Andreas U. Schmidt, Sven Knudsen, Tobias Niehoff, Klaus Schwietz:
Planning Distributed Security Operations Centers in Multi-Cloud Landscapes: A Case Study. CoRR abs/2303.03141 (2023)
2010 – 2019
- 2013
- [j11]Andreas U. Schmidt, Andreas Leicher, Andreas Brett, Yogendra Shah, Inhyok Cha:
Tree-formed verification data for trusted platforms. Comput. Secur. 32: 19-35 (2013) - [j10]Dolores Howry, Yogendra Shah, Andreas U. Schmidt:
Evolution of trust systems from PCs to mobile devices: Building secured and trusted ecosystems. IEEE Veh. Technol. Mag. 8(1): 70-80 (2013) - 2012
- [c20]Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:
Scalable Trust Assessment and Remediation of Wireless Devices. MobiSec 2012: 55-56 - [c19]Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:
Smart OpenID: A Smart Card Based OpenID Protocol. SEC 2012: 75-86 - [e4]Ramjee Prasad, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, Flaminia L. Luccio:
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 94, Springer 2012, ISBN 978-3-642-30243-5 [contents] - [e3]Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 107, Springer 2012, ISBN 978-3-642-33391-0 [contents] - 2011
- [j9]Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha, Louis Guccione:
Sender Scorecards. IEEE Veh. Technol. Mag. 6(1): 52-59 (2011) - 2010
- [j8]Andreas U. Schmidt, Andreas Leicher, Inhyok Cha, Yogendra Shah:
Trusted Platform Validation and Management. Int. J. Dependable Trust. Inf. Syst. 1(2): 1-31 (2010) - [c18]Andreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha:
Trusted Computing enhanced OpenID. ICITST 2010: 1-8 - [e2]Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 47, Springer 2010, ISBN 978-3-642-17501-5 [contents] - [i19]Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha:
Tree-formed Verification Data for Trusted Platforms. CoRR abs/1007.0642 (2010) - [i18]Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha:
Secure Operations on Tree-Formed Verification Data. CoRR abs/1008.3253 (2010)
2000 – 2009
- 2009
- [j7]Andreas U. Schmidt:
On the Superdistribution of Digital Goods. J. Univers. Comput. Sci. 15(2): 401-425 (2009) - [j6]Inhyok Cha, Yogendra Shah, Andreas U. Schmidt, Andreas Leicher, Michael Victor Meyerstein:
Trust in M2M communication. IEEE Veh. Technol. Mag. 4(3): 69-75 (2009) - [c17]Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt:
Implementation of a Trusted Ticket System. SEC 2009: 152-163 - [e1]Andreas U. Schmidt, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 17, Springer 2009, ISBN 978-3-642-04433-5 [contents] - 2008
- [c16]Andreas U. Schmidt:
Free-Riding and Competition in Network Markets for Digital Goods. HICSS 2008: 299 - [c15]Nicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph:
Trust in Business Processes. ICYCS 2008: 1992-1997 - [c14]Rachid El Khayari, Nicolai Kuntze, Andreas U. Schmidt:
Spam Over Internet Telephony and How to Deal with it. ISSA 2008: 1-25 - [c13]Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:
Evaluating Measures and Countermeasures for SPAM over Internet Telephony. ISSE 2008: 329-340 - [c12]Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth:
Trust for Location-Based Authorisation. WCNC 2008: 3163-3168 - [c11]Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper:
On the Deployment of Mobile Trusted Modules. WCNC 2008: 3169-3174 - [i17]Andreas U. Schmidt:
On the Superdistribution of Digital Goods. CoRR abs/0806.1543 (2008) - [i16]Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:
SPAM over Internet Telephony and how to deal with it. CoRR abs/0806.1610 (2008) - 2007
- [c10]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Ticket Systems and Applications. SEC 2007: 49-60 - [c9]Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:
Non-Repudiation in Internet Telephony. SEC 2007: 361-372 - [c8]Nicolai Kuntze, Andreas U. Schmidt:
Trustworthy Content Push. WCNC 2007: 2909-2912 - [i15]Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper:
On the deployment of Mobile Trusted Modules. CoRR abs/0712.2113 (2007) - [i14]Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth:
Trust for Location-based Authorisation. CoRR abs/0712.2231 (2007) - [i13]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Ticket Systems and Applications. CoRR abs/cs/0701144 (2007) - [i12]Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:
Non-Repudiation in Internet Telephony. CoRR abs/cs/0701145 (2007) - [i11]Nicolai Kuntze, Andreas U. Schmidt:
Protection of DVB Systems by Trusted Computing. CoRR abs/cs/0702086 (2007) - 2006
- [j5]Andreas U. Schmidt:
Multi-level markets and incentives for information goods. Inf. Econ. Policy 18(2): 125-138 (2006) - [c7]Nicolai Kuntze, Andreas U. Schmidt:
Transitive Trust in Mobile Scenarios. ETRICS 2006: 73-85 - [c6]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Computing in Mobile Action. ISSA 2006: 1-12 - [c5]Andreas U. Schmidt, Jan Piechalski:
Authorised Translations of Electronic Documents. ISSA 2006: 1-14 - [i10]Nicolai Kuntze, Andreas U. Schmidt:
Transitive trust in mobile scenarios. CoRR abs/cs/0603051 (2006) - [i9]Christian Hett, Nicolai Kuntze, Andreas U. Schmidt:
A secure archive for Voice-over-IP conversations. CoRR abs/cs/0606032 (2006) - [i8]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Computing in Mobile Action. CoRR abs/cs/0606045 (2006) - [i7]Jan Piechalski, Andreas U. Schmidt:
Authorised Translations of Electronic Documents. CoRR abs/cs/0606046 (2006) - [i6]Christian Hett, Nicolai Kuntze, Andreas U. Schmidt:
Security and Non-Repudiation for Voice-Over-IP Conversations. CoRR abs/cs/0606068 (2006) - [i5]Nicolai Kuntze, Dominique Maehler, Andreas U. Schmidt:
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems. CoRR abs/cs/0607142 (2006) - [i4]Nicolai Kuntze, Andreas U. Schmidt:
Trustworthy content push. CoRR abs/cs/0612061 (2006) - 2005
- [j4]Andreas U. Schmidt:
A model for prejudiced learning in noisy environments. Appl. Math. Comput. 168(1): 354-379 (2005) - [j3]Andreas U. Schmidt:
Asymptotic hyperfunctions, tempered hyperfunctions, and asymptotic expansions. Int. J. Math. Math. Sci. 2005(5): 755-788 (2005) - [c4]Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt:
Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. DFN-Arbeitstagung über Kommunikationsnetze 2005: 191-204 - [c3]Andreas U. Schmidt, Zbynek Loebl:
Legal Security for Transformations of Signed Documents: Fundamental Concepts. EuroPKI 2005: 255-270 - [c2]Andreas U. Schmidt, Nicolai Kuntze, Thomas Rauch:
Security for Distributed Web-Services via Aspect-Oriented Programming. ISSA 2005: 1-12 - [c1]Stefanie Fischer-Dieskau, Thomas Kunz, Andreas U. Schmidt, Ursula Viebeg:
Grundkonzepte rechtssicherer Transformation signierter Dokumente. Sicherheit 2005: 401-412 - [i3]Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt:
Security for Distributed Web-Applications via Aspect-Oriented Programming. CoRR abs/cs/0507071 (2005) - 2004
- [i2]Andreas U. Schmidt:
On Incentive Systems Based on Multi-Level Marketing of Virtual Goods. CoRR cs.GT/0409028 (2004) - 2003
- [j2]Thomas Kunz, Ulrich Pordesch, Andreas U. Schmidt:
Das Präsentationsproblem der XML-Signatur und seine Lösung durch Profiles. Datenschutz und Datensicherheit 27(12) (2003) - [i1]Andreas U. Schmidt:
A Model for Prejudiced Learning in Noisy Environments. CoRR nlin.AO/0306055 (2003) - 2000
- [j1]Andreas U. Schmidt:
Signiertes XML und das Präsentationsproblem. Datenschutz und Datensicherheit 24(3) (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint