On the integration of harware-based trust in embedded devices

Pedro Larbig , Nicolai Kuntze , Carsten Rudolph , Andreas Fuchs
Konferenz für ARM-Systementwicklung

4
2013
Resilient core networks for energy distribution

Nicolai Kuntze , Carsten Rudolph , Sally Leivesley , David Manz
2014 IEEE PES General Meeting| Conference & Exposition 1 -5

3
2014
Securing digital evidence

Jennifer Richter , Nicolai Kuntze , Carsten Rudolph
MA thesis. Technische Universität Darmstadt

3
2009
Sicherstellung elektronischer Daten und selektive Datenlöschung

Hellen Schilling , Carsten Rudolph , Nicolai Kuntze
HRRS Onlinezeitschrift für Höchstrichterliche Rechtsprechung im Strafrecht ( 6/2013) 207 -2012

2
2013
Zero touch configuration

Nicolai Kuntze , Pedro Larbig , Carsten Rudolph
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013) 1076 -1077

2
2013
Forensic readiness for cloud-based distributed workflows

Carsten Rudolph , Nicolai Kuntze , Barbara Endicott-Popovsky
ICCSM2013-Proceedings of the International Conference on Cloud Security Management: ICCSM 2013 59 -59

1
2013
Beweiswert digitaler Asservate

Lambert Grosskopf , Nicolai Kuntze , Carsten Rudolph
ITRB Der IT-Rechts-Berater ( 4/2013) 90 -92

1
2013
Erratum to: On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios

Nicolai Kuntze , Carsten Rudolph
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings 30 E1 -E1

2015
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios

Nicolai Kuntze , Andreas Fuchs , Carsten Rudolph
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings 30 630 -644

2015
Sicherheit von Messgeräten und der Beweiswert digitaler Daten

Carsten Rudolph , Lambert Großkopf , Barbara Endicott-Popovsky , Thomas Kemmerich

2012
SCENARIOS FOR RELIABLE AND SECURE DIGITAL EVIDENCE

Nicolai Kuntze , Carsten Rudolph , Thomas Kemmerich , Barbara Endicott-Popovsky

Project no. 223850 NANODATACENTERS

Nicolai Kuntze , Jürgen Repp , Andreas Leicher , Andreas Brett

Virtual subscriber identity module

Andreas U Schmidt , Nicolai Kuntze , Michael Kasper

286
2016
Techniques for secure channelization between UICC and a terminal

Inhyok Cha , Chinmayee V Rathi , Yogendra C Shah , Louis J Guccione

194
2013
Virtual subscriber identity module

Louis J Guccione , Andreas U Schmidt , Nicolai Kuntze , Michael Kasper

76
2009
Employing trusted computing for the forward pricing of pseudonyms in reputation systems

Nicolai Kuntze , Andreas U Schmidt , Dominique Mähler
Axmedis 2006: proceedings of the 2nd International conference on automated production of cross media content for multi-channel distribution...-(Atti; 29) 1000 -1005

29
2006
Trusted computing in mobile action

Nicolai Kuntze , Andreas U Schmidt
arXiv preprint cs/0606045

19
2006
Trusted Infrastructures for Identities

Barbara Fichtinger , Eckehard Herrmann , Nicolai Kuntze , Andreas U Schmidt

11
2007
Spam over internet telephony and how to deal with it

Andreas U Schmidt , Nicolai Kuntze , Rachid El Khayari
arXiv preprint arXiv:0806.1610

12
2008