


default search action
Nicolai Kuntze
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c42]Hagen Lauer, Nicolai Kuntze:
Hypervisor-Based Attestation of Virtual Environments. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 333-340 - 2015
- [c41]Andre Rein
, Roland Rieke
, Michael Jäger, Nicolai Kuntze, Luigi Coppolino
:
Trust Establishment in Cooperating Cyber-Physical Systems. CyberICS/WOS-CPS@ESORICS 2015: 31-47 - [c40]Nico Lincke, Nicolai Kuntze, Carsten Rudolph
:
Distributed security management for the IoT. IM 2015: 1373-1376 - [c39]Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
:
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. SEC 2015: 630-644 - 2014
- [b1]Nicolai Kuntze:
Security and trust in peer-to-peer based media distribution. University of Bremen, 2014 - [c38]Alexander Oberle, Pedro Larbig, Nicolai Kuntze, Carsten Rudolph
:
Integrity based relationships and trustworthy communication between network participants. ICC 2014: 610-615 - [c37]Nicolai Kuntze, Carsten Rudolph
, Oliver Hanka:
Security foundation for a distributed cabin core architecture. ISSA 2014: 1-6 - [c36]Norman Göttert
, Nicolai Kuntze, Carsten Rudolph
, Khan Ferdous Wahid:
Trusted neighborhood discovery in critical infrastructures. SmartGridComm 2014: 976-981 - 2013
- [c35]Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph
:
Enhancing Security Testing via Automated Replication of IT-Asset Topologies. ARES 2013: 341-349 - [c34]Martin Schramm, Karl Leidl, Andreas Grzemba, Nicolai Kuntze:
Enhanced embedded device security by combining hardware-based trust mechanisms. CCS 2013: 1395-1398 - [c33]Khan Ferdous Wahid, Nicolai Kuntze, Carsten Rudolph:
Trusted Virtual Machine Management for Virtualization in Critical Environments. ICS-CSR 2013 - [c32]Nicolai Kuntze, Carsten Rudolph:
On the automatic establishment of security relations for devices. IM 2013: 832-835 - [c31]Nicolai Kuntze, Pedro Larbig, Carsten Rudolph:
Demo: Zero touch configuration. IM 2013: 1076-1077 - [c30]Ronald Marx, Nicolai Kuntze, Hagen Lauer:
Bringing VoIP Signatures to Mobile Devices. IPTComm 2013: 3 - [c29]Nicolai Kuntze, Carsten Rudolph
, Hellen Schilling, Aaron Alva, Brooke Brisbois, Barbara Endicott-Popovsky:
Seizure of digital data and "selective suppression" of digital evidence. SADFE 2013: 1-6 - [c28]Alexander Oberle, Andre Rein, Nicolai Kuntze, Carsten Rudolph
, Janne Paatero, Andrew Lunn, Péter Rácz:
Integrating trust establishment into routing protocols of today's MANETs. WCNC 2013: 2369-2374 - 2012
- [c27]Ronald Marx, Nicolai Kuntze, Carsten Rudolph
, Ingo Bente, Jörg Vieweg:
Trusted service access with dynamic security infrastructure configuration. APCC 2012: 730-735 - [c26]Kai-Oliver Detken, Alexander Oberle, Nicolai Kuntze, Evren Eren:
Simulation environment for mobile Virtualized Security Appliances. IDAACS-SWS 2012: 113-118 - [c25]Nicolai Kuntze, Carsten Rudolph
, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen, Thomas Kemmerich:
On the Creation of Reliable Digital Evidence. IFIP Int. Conf. Digital Forensics 2012: 3-17 - [c24]Nicolai Kuntze, Carsten Rudolph
, Janne Paatero:
Establishing Trust between Nodes in Mobile Ad-Hoc Networks. INTRUST 2012: 48-62 - 2011
- [c23]Nicolai Kuntze, Carsten Rudolph
:
Secure Digital Chains of Evidence. SADFE 2011: 1-8 - 2010
- [c22]Nicolai Kuntze, Roland Rieke
, Günther Diederich, Richard Sethmann, Karsten Sohr
, Tanveer Mustafa, Kai-Oliver Detken:
Secure Mobile Business Information Processing. EUC 2010: 672-678 - [c21]Nicolai Kuntze, Carsten Rudolph
:
Privacy in Distributed Commercial Applications. HCC 2010: 214-224 - [c20]Jennifer Richter, Nicolai Kuntze, Carsten Rudolph
:
Security Digital Evidence. SADFE 2010: 119-130 - [c19]Julian Schütte
, Nicolai Kuntze, Andreas Fuchs, Atta Badii:
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. SEC 2010: 90-102 - [c18]Nicolai Kuntze, Carsten Rudolph
, Andreas Fuchs:
Trust in Peer-to-Peer Content Distribution Protocols. WISTP 2010: 76-89
2000 – 2009
- 2009
- [c17]Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. CSE (2) 2009: 781-786 - [c16]Zaharina Velikova, Julian Schütte
, Nicolai Kuntze:
Towards security in decentralized workflows. ICUMT 2009: 1-6 - [c15]Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt:
Implementation of a Trusted Ticket System. SEC 2009: 152-163 - [i14]Nicolai Kuntze, Jürgen Repp, Hervais Simo Fhom, Andreas Fuchs, Ine-Saf Benaissa:
Final Architecture Specification of security, privacy, and incentive mechanisms. CoRR abs/0911.3343 (2009) - 2008
- [c14]Nicolai Kuntze, Julian Schütte
:
Securing Decentralized Workflows in Ambient Environments. EUC (2) 2008: 361-366 - [c13]Nicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph
:
Trust in Business Processes. ICYCS 2008: 1992-1997 - [c12]Rachid El Khayari, Nicolai Kuntze, Andreas U. Schmidt:
Spam Over Internet Telephony and How to Deal with it. ISSA 2008: 1-25 - [c11]Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:
Evaluating Measures and Countermeasures for SPAM over Internet Telephony. ISSE 2008: 329-340 - [c10]Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth:
Trust for Location-Based Authorisation. WCNC 2008: 3163-3168 - [c9]Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper:
On the Deployment of Mobile Trusted Modules. WCNC 2008: 3169-3174 - [c8]Carsten Rudolph
, Nicolai Kuntze, Zaharina Velikova:
Secure Web Service Workflow Execution. VODCA@FOSAD 2008: 33-46 - [i13]Andreas U. Schmidt, Nicolai Kuntze, Rachid El Khayari:
SPAM over Internet Telephony and how to deal with it. CoRR abs/0806.1610 (2008) - 2007
- [c7]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Ticket Systems and Applications. SEC 2007: 49-60 - [c6]Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:
Non-Repudiation in Internet Telephony. SEC 2007: 361-372 - [c5]Nicolai Kuntze, Andreas U. Schmidt:
Trustworthy Content Push. WCNC 2007: 2909-2912 - [i12]Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper:
On the deployment of Mobile Trusted Modules. CoRR abs/0712.2113 (2007) - [i11]Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth:
Trust for Location-based Authorisation. CoRR abs/0712.2231 (2007) - [i10]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Ticket Systems and Applications. CoRR abs/cs/0701144 (2007) - [i9]Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:
Non-Repudiation in Internet Telephony. CoRR abs/cs/0701145 (2007) - [i8]Nicolai Kuntze, Andreas U. Schmidt:
Protection of DVB Systems by Trusted Computing. CoRR abs/cs/0702086 (2007) - 2006
- [c4]Nicolai Kuntze, Andreas U. Schmidt:
Transitive Trust in Mobile Scenarios. ETRICS 2006: 73-85 - [c3]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Computing in Mobile Action. ISSA 2006: 1-12 - [i7]Nicolai Kuntze, Andreas U. Schmidt:
Transitive trust in mobile scenarios. CoRR abs/cs/0603051 (2006) - [i6]Christian Hett, Nicolai Kuntze, Andreas U. Schmidt:
A secure archive for Voice-over-IP conversations. CoRR abs/cs/0606032 (2006) - [i5]Nicolai Kuntze, Andreas U. Schmidt:
Trusted Computing in Mobile Action. CoRR abs/cs/0606045 (2006) - [i4]Christian Hett, Nicolai Kuntze, Andreas U. Schmidt:
Security and Non-Repudiation for Voice-Over-IP Conversations. CoRR abs/cs/0606068 (2006) - [i3]Nicolai Kuntze, Dominique Maehler, Andreas U. Schmidt:
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems. CoRR abs/cs/0607142 (2006) - [i2]Nicolai Kuntze, Andreas U. Schmidt:
Trustworthy content push. CoRR abs/cs/0612061 (2006) - 2005
- [c2]Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt:
Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung. DFN-Arbeitstagung über Kommunikationsnetze 2005: 191-204 - [c1]Andreas U. Schmidt, Nicolai Kuntze, Thomas Rauch:
Security for Distributed Web-Services via Aspect-Oriented Programming. ISSA 2005: 1-12 - [i1]Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt:
Security for Distributed Web-Applications via Aspect-Oriented Programming. CoRR abs/cs/0507071 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint