default search action
Matthias Schunter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i3]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020)
2010 – 2019
- 2019
- [j7]Matthias Schunter, Andreas Wespi:
Editorial: Special issue on IoT security and privacy. Comput. Networks 148: 280-282 (2019) - [c42]Andrew Paverd, Marcus Völp, Ferdinand Brasser, Matthias Schunter, N. Asokan, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c41]Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. NDSS 2019 - 2018
- [c40]Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. ESORICS (1) 2018: 595-617 - 2016
- [c39]Matthias Schunter:
Intel Software Guard Extensions: Introduction and Open Research Challenges. SPRO@CCS 2016: 1 - [c38]Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter:
SANA: Secure and Scalable Aggregate Network Attestation. CCS 2016: 731-742 - [c37]Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter:
POSTER: Toward a Secure and Scalable Attestation. WISEC 2016: 229-230 - 2015
- [c36]N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
SEDA: Scalable Embedded Device Attestation. CCS 2015: 964-975 - [e1]Mauro Conti, Matthias Schunter, Ioannis G. Askoxylakis:
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9229, Springer 2015, ISBN 978-3-319-22845-7 [contents] - 2014
- [c35]Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter:
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks. ESORICS (1) 2014: 76-93 - 2013
- [c34]Matthias Schunter:
Data Security and Privacy in 2025? Secure Data Management 2013: 37-41 - 2012
- [c33]Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter:
Secure cloud maintenance: protecting workloads against insider attacks. AsiaCCS 2012: 83-84 - [c32]Johannes Behl, Tobias Distler, Florian Heisig, Rüdiger Kapitza, Matthias Schunter:
Providing fault-tolerant execution of web-service-based workflows within clouds. CloudCP@EuroSys 2012: 7:1-7:6 - [i2]Rüdiger Kapitza, Matthias Schunter, Marc Shapiro, Paulo Veríssimo, Michael Waidner:
Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281). Dagstuhl Reports 2(7): 56-72 (2012) - 2011
- [j6]Ninja Marnau, Norbert Schirmer, Eva Schlehahn, Matthias Schunter:
TClouds - Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud. Datenschutz und Datensicherheit 35(5): 333-337 (2011) - [c31]Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson:
Automated Information Flow Analysis of Virtualized Infrastructures. ESORICS 2011: 392-415 - [c30]Rüdiger Glott, Elmar Husmann, Ahmad-Reza Sadeghi, Matthias Schunter:
Trustworthy Clouds Underpinning the Future Internet. Future Internet Assembly 2011: 209-222 - [r6]Matthias Schunter:
Certified Mail. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 195-196 - [r5]Matthias Schunter:
Contract Signing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 253-254 - [r4]Matthias Schunter:
Fair Exchange. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 447-448 - 2010
- [j5]Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, HariGovind V. Ramasamy, Gianluca Ramunno, Ahmad-Reza Sadeghi, Matthias Schunter, Christian Stüble:
Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18(1): 89-121 (2010) - [c29]Sören Bleikertz, Matthias Schunter, Christian W. Probst, Dimitrios Pendarakis, Konrad Eriksson:
Security audits of multi-tier virtual infrastructures in public infrastructure clouds. CCSW 2010: 93-102 - [c28]Rüdiger Kapitza, Matthias Schunter, Christian Cachin, Klaus Stengel, Tobias Distler:
Storyboard: Optimistic Deterministic Multithreading. HotDep 2010
2000 – 2009
- 2009
- [c27]Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. INTRUST 2009: 156-179 - 2008
- [c26]Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter:
Policy enforcement and compliance proofs for Xen virtual machines. VEE 2008: 101-110 - 2007
- [c25]Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384 - [c24]Tyrone Grandison, Marcel Bilger, L. O'Connor, Marcel Graf, Morton Swimmer, Matthias Schunter, Andreas Wespi, Nev Zunic:
Elevating the Discussion on Security Management: The Data Centric Paradigm. BDIM 2007: 84-93 - [c23]Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter:
Towards automated provisioning of secure virtualized networks. CCS 2007: 235-245 - [c22]Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner:
Architecting Dependable and Secure Systems Using Virtualization. WADS 2007: 124-149 - [c21]Matthias Schunter, Michael Waidner:
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232 - 2006
- [c20]Chris Vanden Berghe, Matthias Schunter:
Privacy Injector - Automated Privacy Enforcement Through Aspects. Privacy Enhancing Technologies 2006: 99-117 - [p2]Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Quality of Protection 2006: 13-24 - [i1]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. IACR Cryptol. ePrint Arch. 2006: 41 (2006) - 2005
- [r3]Matthias Schunter:
Certified Mail. Encyclopedia of Cryptography and Security 2005 - [r2]Matthias Schunter:
Contract Signing. Encyclopedia of Cryptography and Security 2005 - [r1]Matthias Schunter:
Fair Exchange. Encyclopedia of Cryptography and Security 2005 - 2004
- [j4]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004) - [c19]Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter:
Efficient comparison of enterprise privacy policies. SAC 2004: 375-382 - 2003
- [c18]Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner:
Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449 - [c17]Michael Backes, Birgit Pfitzmann, Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180 - [c16]Michael Backes, Matthias Schunter:
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. NSPW 2003: 67-74 - [c15]Günter Karjoth, Matthias Schunter, Els Van Herreweghen:
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. POLICY 2003: 135-146 - 2002
- [c14]Günter Karjoth, Matthias Schunter:
A Privacy Policy Model for Enterprises. CSFW 2002: 271-281 - [c13]Ahmad-Reza Sadeghi, Matthias Schunter, Sandra Steinbrecher:
Private Auctions with Multiple Rounds and Multiple Items. DEXA Workshops 2002: 423-427 - [c12]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487 - [c11]Paul Ashley, Calvin Powers, Matthias Schunter:
From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. NSPW 2002: 43-50 - [c10]Günter Karjoth, Matthias Schunter, Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84 - [c9]Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter:
E-P3P privacy policies and privacy authorization. WPES 2002: 103-109 - 2000
- [b1]Matthias Schunter:
Optimistic fair exchange. Saarland University, Germany, 2000
1990 – 1999
- 1999
- [j3]Matthias Schunter, Michael Waidner, Dale Whinnett:
The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinf. 41(3): 238-247 (1999) - [c8]Matthias Schunter, Michael Waidner, Dale Whinnett:
The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 1999: 11 - [c7]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Cryptographic Security of Reactive Systems. Workshop on Secure Architectures and Information Flow 1999: 59-77 - 1998
- [j2]Matthias Schunter, Michael Waidner, Dale Whinnett:
A Status Report on the SEMPER Framework for Secure Electronic Commerce. Comput. Networks 30(16-18): 1501-1510 (1998) - [c6]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 - 1997
- [j1]Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Trusting Mobile User Devices and Security Modules. Computer 30(2): 61-68 (1997) - [c5]N. Asokan, Matthias Schunter, Michael Waidner:
Optimistic Protocols for Fair Exchange. CCS 1997: 7-17 - [p1]Gerrit Bleumer, Matthias Schunter:
Privacy Oriented Clearing for the German Health-Care System. Personal Medical Information 1997: 175-194 - 1996
- [c4]Birgit Pfitzmann, Matthias Schunter:
Asymmetric Fingerprinting (Extended Abstract). EUROCRYPT 1996: 84-95 - 1995
- [c3]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132 - [c2]Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329- - 1994
- [c1]Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint