Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stefan G. Weber
@article{DBLP:journals/corr/Weber14, author = {Stefan G. Weber}, title = {Alltagstaugliche Biometrie: Entwicklungen, Herausforderungen und Chancen}, journal = {CoRR}, volume = {abs/1410.1040}, year = {2014}, url = {http://arxiv.org/abs/1410.1040}, eprinttype = {arXiv}, eprint = {1410.1040}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Weber14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weber13, author = {Stefan G. Weber}, title = {Biometrische IT-Sicherheit - eine Frage des Fingerspitzengef{\"{u}}hls?}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {6}, pages = {371--375}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0143-9}, doi = {10.1007/S11623-013-0143-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weber13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiscram/WeberG13, author = {Stefan G. Weber and Prima Gustien{\'{e}}}, title = {Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles}, journal = {Int. J. Inf. Syst. Crisis Response Manag.}, volume = {5}, number = {2}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/jiscrm.2013040101}, doi = {10.4018/JISCRM.2013040101}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiscram/WeberG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Weber13, author = {Stefan G. Weber}, title = {Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2013}, url = {http://eprint.iacr.org/2013/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Weber13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Weber13a, author = {Stefan G. Weber}, title = {Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2013}, url = {http://eprint.iacr.org/2013/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Weber13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ciss/Weber12, author = {Stefan G. Weber}, title = {Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing}, series = {Cryptology and Information Security Series}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-157-1-i}, doi = {10.3233/978-1-61499-157-1-I}, isbn = {978-1-61499-156-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ciss/Weber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Weber12, author = {Stefan G. Weber}, title = {A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {21}, number = {6}, pages = {297--305}, year = {2012}, url = {https://doi.org/10.1080/19393555.2012.738374}, doi = {10.1080/19393555.2012.738374}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Weber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaise/Weber12, author = {Stefan G. Weber}, title = {Multilaterally secure pervasive cooperation}, journal = {J. Ambient Intell. Smart Environ.}, volume = {4}, number = {2}, pages = {135--136}, year = {2012}, url = {https://doi.org/10.3233/AIS-2012-0140}, doi = {10.3233/AIS-2012-0140}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaise/Weber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Weber12, author = {Stefan G. Weber}, title = {On Transaction Pseudonyms with Implicit Attributes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2012}, url = {http://eprint.iacr.org/2012/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Weber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Weber11a, author = {Stefan G. Weber}, title = {Multilaterally secure pervasive cooperation}, school = {Darmstadt University of Technology, Germany}, year = {2011}, url = {http://tuprints.ulb.tu-darmstadt.de/2842/}, urn = {urn:nbn:de:tuda-tuprints-28422}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Weber11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/WeberKRM11, author = {Stefan G. Weber and Yulian Kalev and Sebastian Ries and Max M{\"{u}}hlh{\"{a}}user}, editor = {Suk{-}Han Lee and Lajos Hanzo and Min Young Chung and Sang{-}Won Lee and Kwangsu Cho}, title = {MundoMessage: enabling trustworthy ubiquitous emergency communication}, booktitle = {Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea, February 21 - 23, 2011}, pages = {29}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1968613.1968649}, doi = {10.1145/1968613.1968649}, timestamp = {Thu, 23 May 2019 16:33:14 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/WeberKRM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/WeberM11, author = {Stefan G. Weber and Max M{\"{u}}hlh{\"{a}}user}, editor = {Santi Caball{\'{e}} and Fatos Xhafa and Ajith Abraham}, title = {Multilaterally Secure Ubiquitous Auditing}, booktitle = {Intelligent Networking, Collaborative Systems and Applications}, series = {Studies in Computational Intelligence}, volume = {329}, pages = {207--233}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16793-5\_10}, doi = {10.1007/978-3-642-16793-5\_10}, timestamp = {Wed, 14 Jun 2017 20:39:12 +0200}, biburl = {https://dblp.org/rec/series/sci/WeberM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BruckerPW10, author = {Achim D. Brucker and Helmut Petritsch and Stefan G. Weber}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Attribute-Based Encryption with Break-Glass}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {237--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_18}, doi = {10.1007/978-3-642-12368-9\_18}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/wistp/BruckerPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icegov/LangerVWSB09, author = {Lucie Langer and Melanie Volkamer and Stefan G. Weber and Axel Schmidt and Johannes Buchmann}, editor = {Tomasz Janowski and Jim Davies}, title = {Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model}, booktitle = {{ICEGOV} 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {322}, pages = {203--210}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1693042.1693084}, doi = {10.1145/1693042.1693084}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icegov/LangerVWSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/Weber09, author = {Stefan G. Weber}, editor = {Youakim Badr and Santi Caball{\'{e}} and Fatos Xhafa and Ajith Abraham and Bego{\~{n}}a Gros}, title = {Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis}, booktitle = {1st International Conference on Intelligent Networking and Collaborative Systems, INCoS 2009, Barcelona, Spain, 4-6 November 2009}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/INCOS.2009.40}, doi = {10.1109/INCOS.2009.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/Weber09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WeberHM08, author = {Stefan G. Weber and Andreas Heinemann and Max M{\"{u}}hlh{\"{a}}user}, title = {Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {958--964}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.195}, doi = {10.1109/ARES.2008.195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WeberHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/PatrikakisKVWTHPRWHCCP07, author = {Charalampos Z. Patrikakis and Pantelis N. Karamolegkos and Athanasios Voulodimos and Mohd Helmy Abd Wahab and Nik Shahidah Afifi Mohd Taujuddin and Christina Hanif and Linda Pareschi and Daniele Riboni and Stefan G. Weber and Andreas Heinemann and Sen{-}Ching S. Cheung and Jayahsri Chaudhari and Jithendra K. Paruchuri}, title = {Security and Privacy in Pervasive Computing}, journal = {{IEEE} Pervasive Comput.}, volume = {6}, number = {4}, pages = {73--75}, year = {2007}, url = {https://doi.org/10.1109/MPRV.2007.86}, doi = {10.1109/MPRV.2007.86}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/PatrikakisKVWTHPRWHCCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WeberAB07, author = {Stefan G. Weber and Roberto Ara{\'{u}}jo and Johannes Buchmann}, title = {On Coercion-Resistant Electronic Elections with Linear Work}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {908--916}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.108}, doi = {10.1109/ARES.2007.108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WeberAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/WeberRH07, author = {Stefan G. Weber and Sebastian Ries and Andreas Heinemann}, editor = {Rainer Koschke and Otthein Herzog and Karl{-}Heinz R{\"{o}}diger and Marc Ronthaler}, title = {Inherent Tradeoffs in Ubiquitous Computing Services}, booktitle = {37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik trifft Logistik, {INFORMATIK} 2007, Bremen, Germany, September 24-27, 2007, Band 1}, series = {{LNI}}, volume = {{P-109}}, pages = {364--368}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22615}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/WeberRH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.