default search action
Peter Schoo
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Peter Schoo:
Navigating the CRA: A Brief Analysis of European Cyber Resilience Act and Resulting Actions for Product Development. IoTBDS 2024: 245-251
2010 – 2019
- 2019
- [c25]Angelo Liguori, Peter Schoo, Marcel Winandy:
Mind the Shift: Secure Migration of Containerized Processes in Edge Computing. CSCloud/EdgeCom 2019: 204-209 - 2015
- [c24]Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, Peter Schoo:
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers. APF 2015: 104-123 - 2013
- [c23]Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo:
Collaboratively Exchanging Warning Messages between Peers While under Attack. ARES 2013: 726-731 - [c22]Dennis Titze, Hans Hofinger, Peter Schoo:
Using Secure Multiparty Computation for Collaborative Information Exchange. TrustCom/ISPA/IUCC 2013: 1717-1722 - [c21]Lucio Studer Ferreira, Ramón Agüero, Luisa Caeiro, Avi Miron, Michael Soellner, Peter Schoo, Lucian Suciu, Andreas Timm-Giel, Asanga Udugama:
Open connectivity services for the future internet. WCNC 2013: 2363-2368 - 2012
- [c20]Peter Schoo, Manfred Schäfer, André Egners, Hans Hofinger, Sascha Wessel, Marián Kühnel, Sascha Todt, Michael Montag:
Collaboration between Competing Mobile Network Operators to Improve CIIP. CRITIS 2012: 215-227 - [c19]Hans Hofinger, Alexander Kiening, Peter Schoo:
When browsing leaves footprints: automatically detect privacy violations. MPM@EuroSys 2012: 9:1-9:6 - [c18]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Volker Fusenig, Peter Schoo:
N-ary tree based key distribution in a network as a service provisioning model. ICACCI 2012: 952-960 - [c17]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Peter Schoo:
Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks. ICDM Workshops 2012: 416-423 - [c16]Peter Schoo, Ronald Marx:
Threat Model Based Security Evaluation of Open Connectivity Services. MONAMI 2012: 313-322 - 2011
- [j5]Martin Brunner, Peter Schoo, Hans Hofinger, Christopher Roblee, Sascha Todt:
Forschungsansätze zur Effizienzsteigerung heutiger IT-Frühwarnsysteme. Datenschutz und Datensicherheit 35(4): 253-257 (2011) - 2010
- [c15]Martin Brunner, Hans Hofinger, Christopher Roblee, Peter Schoo, Sascha Todt:
Anonymity and Privacy in Distributed Early Warning Systems. CRITIS 2010: 81-92 - [c14]Peter Schoo, Volker Fusenig, Victor Souza, Márcio Melo, Paul Murray, Hervé Debar, Houssem Medhioub, Djamal Zeghlache:
Challenges for Cloud Networking Security. MONAMI 2010: 298-313
2000 – 2009
- 2009
- [j4]Peter Schoo:
Co-opetition Enabling Security for Cooperative Networks: Authorizing Composition Agreement Negotiations between Ambient Networks. Wirel. Pers. Commun. 49(3): 415-430 (2009) - 2004
- [c13]Anand R. Prasad, Peter Schoo, Hu Wang:
An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective. SAINT Workshops 2004: 689-695 - [c12]Mortaza S. Bargh, R. J. Hulsebosch, Henk Eertink, Anand R. Prasad, Hu Wang, Peter Schoo:
Fast authentication methods for handovers between IEEE 802.11 wireless LANs. WMASH 2004: 51-60 - 2002
- [c11]Octavian Tirla, Alejandro Bascuñana Muñoz, Peter Schoo, Serge Tessier:
Accounting management in heterogenous mobile access networks: the MIND approach. PIMRC 2002: 1047-1052 - 2000
- [c10]Peter Schoo:
Service Creation Techniques for Software Development and Deployment. IS&N 2000: 133-134
1990 – 1999
- 1999
- [c9]Tim O. Eckardt, Christian Egelhaaf, Peter Schoo:
On the design of interworking reference points for information networking. DAIS 1999: 91-102 - [c8]Christian Egelhaaf, Peter Schoo, Andreas Zisowsky, Mike Fisher:
Integration of a Legacy Application into a TINA Retailer Environment. ISADS 1999: 198-205 - [c7]Peter Schoo, Christian Egelhaaf, Tim O. Eckardt, Nazim Agoulmine, Michael Tschichholz:
Modularization of TINA Reference Points for Information Networking. IS&N 1999: 446-458 - 1998
- [j3]Klaus-Peter Eckert, Eckhard Moeller, Peter Schoo, Gerd Schürmann, Michael Tschichholz:
Verteilte Objekttechnologie in der Telekommunikation. Prax. Inf.verarb. Kommun. 21(3): 149-154 (1998) - 1997
- [c6]Klaus-Peter Eckert, Peter Schoo:
Engineering Frameworks: A Prerequisite for the Design and Implementation of Distributed Enterprise Objects. EDOC 1997: 170- - [c5]Klaus-Peter Eckert, Marinko Festini, Peter Schoo, Gerd Schürmann:
TANGRAM: development of object-oriented frameworks for TINA-C-based multimedia telecommunication applications. ISADS 1997: 43-50 - 1996
- [j2]Christian Egelhaaf, Eckhard Moeller, Peter Schoo:
Developing Distributed Multimedia Telecommunication Applications. IEEE Multim. 3(4): 76-81 (1996) - [c4]M. Khayrat Durmosch, Christian Egelhaaf, Klaus-Dietric Engel, Peter Schoo:
Design and Implementation of a Multimedia Communication Service in a Distributed Environment Based on the TINA-C Architecture. TreDS 1996: 108-121 - 1995
- [j1]Peter Schoo:
Beyond intelligent networks. Comput. Commun. 18(11): 791-792 (1995) - [c3]Hendrik Berndt, Martin D. Chapman, Peter Schoo, Ingmar Tönnby:
A Comparison of Architectures for Future Telecommunication Services. IS&N 1995: 476-488 - 1994
- [c2]Peter Schoo:
Component Models and Service Creation - Introduction. IS&N 1994: 121-122 - 1991
- [c1]Peter Schoo, Ingmar Tönnby:
The ROSA Object Model. Open Distributed Processing 1991: 291-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-31 02:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint