Virtual subscriber identity module AU Schmidt, N Kuntze, M Kasper US Patent 9,253,588, 2016 | 283 | 2016 |
Techniques for secure channelization between UICC and a terminal I Cha, CV Rathi, YC Shah, LJ Guccione, AU Schmidt, N Kuntze US Patent 8,503,376, 2013 | 191 | 2013 |
Virtual subscriber identity module LJ Guccione, AU Schmidt, N Kuntze, M Kasper, YC Shah, I Cha US Patent App. 12/234,146, 2009 | 74 | 2009 |
Security digital evidence J Richter, N Kuntze, C Rudolph 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital …, 2010 | 64 | 2010 |
On the deployment of mobile trusted modules AU Schmidt, N Kuntze, M Kasper 2008 IEEE Wireless Communications and Networking Conference, 3169-3174, 2008 | 64 | 2008 |
A user-centric privacy manager for future energy systems HS Fhom, N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti 2010 International Conference on Power System Technology, 1-7, 2010 | 48 | 2010 |
Implementation of a trusted ticket system A Leicher, N Kuntze, AU Schmidt IFIP International Information Security Conference, 152-163, 2009 | 47 | 2009 |
Hypervisor-based attestation of virtual environments H Lauer, N Kuntze 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 32 | 2016 |
Trusted ticket systems and applications N Kuntze, AU Schmidt IFIP International Information Security Conference, 49-60, 2007 | 31 | 2007 |
Secure digital chains of evidence N Kuntze, C Rudolph 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011 | 29 | 2011 |
A trusted information agent for security information and event management L Coppolino, M JÂager, N Kuntze, R Rieke SECURITY ANALYSIS OF SYSTEM BEHAVIOUR 265, 2014 | 28 | 2014 |
Interoperable device identification in smart-grid environments N Kuntze, C Rudolph, I Bente, J Vieweg, J von Helden 2011 IEEE Power and Energy Society General Meeting, 1-7, 2011 | 28 | 2011 |
Trust infrastructures for future energy networks N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti IEEE PES General Meeting, 1-7, 2010 | 26 | 2010 |
Employing trusted computing for the forward pricing of pseudonyms in reputation systems N Kuntze, AU Schmidt, D Mähler Employing Trusted Computing for the Forward Pricing of Pseudonyms in …, 2006 | 25 | 2006 |
Secure web service workflow execution C Rudolph, N Kuntze, Z Velikova Electronic Notes in Theoretical Computer Science 236, 33-46, 2009 | 24 | 2009 |
On the creation of reliable digital evidence N Kuntze, C Rudolph, A Alva, B Endicott-Popovsky, J Christiansen, ... Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012 | 18 | 2012 |
Transitive trust in mobile scenarios N Kuntze, AU Schmidt International Conference on Emerging Trends in Information and Communication …, 2006 | 18 | 2006 |
Trusted infrastructures for identities B Fichtinger, E Herrmann, N Kuntze, AU Schmidt na, 2007 | 17 | 2007 |
Trusted computing in mobile action N Kuntze, AU Schmidt arXiv preprint cs/0606045, 2006 | 17 | 2006 |
Subscriber authentication in cellular networks with trusted virtual sims M Kasper, N Kuntze, AU Schmidt 2008 10th International Conference on Advanced Communication Technology 2 …, 2008 | 16 | 2008 |