Personal Homepage of Dr. Andreas U. Schmidt

Valid XHTML 1.0!
Valid CSS!
Best viewed with Firefox
firefox logo

This Web page is copyrighted © 2004-22 by Andreas U. Schmidt, all rights reserved

Unless otherwise stated, all original material authored by Andreas U. Schmidt, and contained in this site, in particular scientific articles, presentations and other scholarly material, is licensed under a
Creative Commons License
Creative Commons Licence.

The material is presented to ensure timely dissemination of scholarly and technical work. Wherever a copyright © is indicated, copyright and all rights in the works are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder

Last modified: Monday, Thursday, June 25, 14:06:00 Central European Time 2020

picture of A U Schmidt, © 2004-07, all rights reserved.
© 2004-20 Andreas U. Schmidt, all rights reserved.

Contact

Dr. Andreas U. Schmidt CEO, novalyst IT AG Robert-Bosch Strasse 38 61184 Karben, Germany Tel. +49 6039 9154 1501 e-mail: andreas.schmidt (at) novalyst.de private e-mail: andreas.u.schmidt (at) googlemail.com

Short CV

1989-1994 Studies in mathematics and physics at the Johann Wolfgang Goethe-Universität, Frankfurt am Main, Germany
1994 Diploma (Dipl.-Math.) in mathematics, Johann Wolfgang Goethe-Universität, Frankfurt am Main, Germany
1999 Doctoral degree (Dr. phil. nat.) in mathematics, Johann Wolfgang Goethe-Universität, Frankfurt am Main
1999/2000 Postdoctoral Research at the GMD in the Institute for Secure Telecooperation, working group 'Marketplace Internet' (MINT), Darmstadt, Germany
2000/2001 Research fellowship at the Department of Mathematics and Applied Mathematics of the University of Durban-Westville, now part of the University of Kwazulu-Natal, South Africa, funded by the Deutsche Forschungsgemeinschaft (DFG)
2001/2002 DFG research fellowship at the Dipartimento di Fisica, Università di Pisa, and INFN, Italy
Oct 2002 - Nov 2008 Senior Researcher at the Fraunhofer-Institute for Secure Information Technology SIT, working group Transaction and Document Security TaD, and Secure Mobile Systems (SIMS), Darmstadt, Germany
Dec 2008 - June 2009 Area Head of the Security Area at the Create-Net Research Consortium, Trento, Italy.
2009 - 2012 General Chair of the Conference MobiSec on Secure Mobile Systems.
2013-2014 General Chair of the Conference PRISMS "Privacy and Security in Mobile Systems", co-sponsored by IEEE, part of the "Global Wireless Summit."
From July 2009 - May 2022 Chief Information Officer of ARTEC IT Solutions AG, Karben, Germany
From 2007 - Current Co-founder and director of the board of novalyst IT AG, Karben, Germany
Reviewer for   Computers and Security
Member of the Editorial Board of the Journal of Cyber Security and Mobility

Research Interests

Mathematics & Physics: Quantum Zeno Effect; Quantum Statistical Mechanics; Axiomatic and Algebraic Quantum Field Theory; Hyperfunctions and Hyperfunction Quantum Field Theory; Indefinite Inner Product Spcaes; Asymptotic Methods; Mathematical Economics; Noisy Dynamical Systems;
Computer Science: Information Security; Data Protection and Privacy; Mobile Security; Identity Management; Trusted Computing; Information Economy; Voice-over-IP Security; Digital Signatures; Long-Term Security; Theoretical and Applied Information Economy; Quantum Cryptography; Post-Quantum Cryptography; Modeling of Learning Automata and Agent Societies; Formal Methods in Secure Telecooperation; Security Policies in Open Collaboration Environments; Digital Rights Management;

By Subject Classification

MSC: 34F05, 46C20, 46Fxx (46F05, 46F15, 46F20), 46L60, 46N10, 47B50, 47D03, 47D60, 81Pxx (81P15, 81P68), 81Q10, 81R15, 81T05, 90B60, 91A15, 91A26, 91Bxx (91B60, 91B62), 91E40
PACS: 02.30.-f, 02.30.Sa, 02.30.Tb, 02.50.Le, 03.65Db, 03.67.Dd, 03.67.Hk, 03.65.Xp, 03.70.+k, 05.30.-d
ACM: C.2.0, D.1.5, H.1.1, H.4.1, J.1, K.4.4, K.5.1, K.6.5
JEL: C51, C67, D4

Publications (in approximately inverse chronological order)

P69
Multi-Factor Authentication as a Service
DOI resolution link Together with Yogendra Shah, Vinod Choiy, Lakshmi Subramanian
IEEE Mobile Cloud 2015, March 30 2015-April 3 2015, San Francisco, CA, pp. 144-150.
P68
Network based Aggregation Server for Federated WiFi Access
Together with Yogendra Shah, Yousif Targali, Lakshmi Subramanian, Aamer Chaudry
Contribution to Wireless World Research Forum Meeting 31, Vancouver, Canada, 22 - 24 October, 2013.
PDF EN WWRF paper version of October 2013.
P67
Evolution of Trust Systems from PCs to Mobile Devices: Building Secured and Trusted Ecosystems
DOI resolution link Together with Dolores Howry and Yogendra Shah
In: IEEE Vehicular Technology Magazine, Vol. 8, no. 1 (2013), 70-80. Enhanced, revised paper of a contribution at Wireless World Research Forum Meeting 29, Berlin, Germany, Oct 23-25, 2012.
PDF EN WWRF paper version of September 2012.
P66
Tree-formed verification data for trusted platforms
DOI resolution link Together with Andreas Leicher, Andreas Brett, Yogendra Shah, Inhyok Cha
In: Computers & Security, 32 (2013), 19-35.
PDF EN arXiv e-print version.
P65
Security and Privacy in Mobile Information and Communication Systems
DOI resolution link Book edited together with Giovanni Russello and Ioannis Krontiris and Shiguo Lian
th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (LNICST), Vol. 107. Springer-Verlag, Berlin, Heidelberg, New York. ISBN 978-3-642-33391-0.
P64
Smart OpenID: A Smart Card Based OpenID Protocol
DOI resolution link Together with Andreas Leicher, Yogendra Shah
In: Information Security and Privacy Research. 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Vol. 376 of IFIP Advances in Information and Communication Technology. Springer (2012), pp. 75-86.
PDF EN Proceedings preprint version.
P63
Trusted computing enhanced user authentication with OpenID and trustworthy user interface
DOI resolution link Together with Andreas Leicher, Yogendra Shah, Inhyok Cha
In: International Journal of Internet Technology and Secured Transactions, vol. 3, no. 4 (2011), 331-353.
PDF EN Journal preprint version.
P62
Security and Privacy in Mobile Information and Communication Systems
DOI resolution link Book edited together with Ramjee Prasad, Károly Farks, Giovanni Russello and Flaminia L. Luccio
Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (LNICST), Vol. 94. Springer-Verlag, Berlin, Heidelberg, New York. ISBN 978-3-642-30244-2.
P61
Sender Scorecards: Prevention of Unsolicited Communication in IMS Networks
DOI resolution link Together with Andreas Leicher, Inhyok Cha, Yogendra Shah, and Louis Guccione
In: IEEE Vehicular Technology Magazine, Vol. 5, no. 1 (2011), 52-59. Enhanced, revised paper of a contribution at Wireless World Research Forum Meeting 25, London, UK, 2010.
PDF EN WWRF paper version of September 2010.
P60
Efficient Application SSO for Evolved Mobile Networks
Together with Andreas Leicher, Inhyok Cha, and Yogendra Shah
Contribution to Wireless World Research Forum Meeting 25, London, UK, 2010.
PDF EN WWRF paper version of September 2010.
P59
Security and Privacy in Mobile Information and Communication Systems
DOI resolution link Book edited together with Giovanni Russello, Antonio Lioy, Neeli R. Prasad, and Shiguo Lian.
Proceedings of the Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (LNICST), Vol. 47. Springer-Verlag, Berlin, Heidelberg, New York. ISBN 978-3-642-17502-2.
P58
Trusted Computing enhanced OpenID
Together with Andreas Leicher, Inhyok Cha, and Yogendra Shah
Proc. 2010 International Conference for Internet Technology and Secured Transactions (ICITST).
P57
Trusted Platform Validation and Management
DOI resolution link Together with Andreas Leicher, Inhyok Cha, and Yogendra Shah
International Journal of Dependable and Trustworthy Information Systems (IJDTIS), vol. 1, no. 2 (2010), 1-31.
P56
Security and Privacy in Mobile Information and Communication Systems
DOI resolution link Book edited together with Shiguo Lian.
Proceedings of the First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (LNICST), Vol. 17. Springer-Verlag, Berlin, Heidelberg, New York. ISBN 978-3-642-04433-5.
P55
Trust in M2M Communications
DOI resolution link Together with Inhyok Cha, Yogendra Shah, Andreas Leicher, and Mike Meyerstein
In: IEEE Vehicular Technology Magazine, Vol. 4, no. 3 (2009), 69-75. Enhanced revised version of a contribution at Wireless World Research Forum Meeting 22, Paris, France, 5-7 May, 2009.
PDF EN WWRF paper version of May 2009.
P54
Scaling Concepts between Trust and Enforcement
DOI resolution link Together with Inhyok Cha, and Andreas Leicher
In, Zheng Yan (Ed.), Trust Modeling and Management in Digital Environments: From Social Concept to System Development. IGI Global Publishing, 2009, pp. 20-57.
P53
Trusted Watermarks
Together with Andreas Brett and Nicolai Kuntze
DOI resolution link In: Proceedings of 2009 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB 2009) 13-15 May 2009 - Bilbao, Spain, pp. 1-7.
PDF EN Final version of March 2009.
PDF EN Poster presented at the symposium.
P52
Injecting Trust to Cryptographic Key Management
Together with Gökhan Bal and Nicolai Kuntze
Proceedings of the The 11th International Conference on Advanced Communication Technology (ICACT 2009), Feb. 15~18, 2009, Phoenix Park, Korea, pp. 1197-1201.
PDF EN Final version of 19th January 2009.
P51
On the Superdistribution of Digital Goods
Journal of Universal Computer Science, vol. 15 (2009) 401-425.
Extended version of [P46]
PDF EN Final journal version.
P50
Implementation of a Trusted Ticket System
Together with Andreas Leicher and Nicolai Kuntze
In: Dimitris Gritzalis and Javier Lòpez (Eds.). Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. International Federation for Information Processing (IFIP), Vol 297, pp. 152-163, Springer-Verlag, Boston, 2009.
PDF EN Final version of 6 January 2009.
P49
Evaluating Measures and Countermeasures for SPAM over Internet Telephony
Together with Nicolai Kuntze and Rachid El Khayari
In: Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider (Eds.), ISSE 2008, Securing Electronic Business Processes. Highligths of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Barcelona, Vieweg + Teubner, 2008, pp. 329-340.
PDF EN Final version of 7 July 2008.
P48
Trust in business processes
Together with Nicolai Kuntze, Zaharina Velikova, Carsten Rudolph
DOI resolution link Proceedings of the 9th International Conference for Young Computer Scientists, 2008. ICYCS 2008 (pp. 1992-1997).
Section: 2008 International Symposium on Trusted Computing (TrustCom 2008), Zhang Jia Jie, Hunan, China - November 18-20, 2008
PDF EN Final version of 13 June 2008. ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
P47
SPAM over Internet Telephony and how to deal with it
Together with Nicolai Kuntze and Rachid El Khayari
Refereed contribution to the 7th annual Conference Information Security South Africa (ISSA 2008) University of Johannesburg, South Africa, 7 -9 July 2008.
PDF EN Final version of 3 June 2008.
PDF EN Slides of the corresponding presentation. Version of 5 July 2008.
P46
On the Superdistribution of Digital Goods
DOI resolution link In: Proceedings of 2008 Third International Conference on Communications and Networking in China (CHINACOM'08) (pp. 1236-1243). IEEE
Invited paper at the Wokshop 2008 International Workshop on Multimedia Security in Communication (MUSIC'08) August 25-27, 2008, Hangzhou, China.
PDF EN Final version of 03. June 2008. ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
PDF EN Slides of the corresponding presentation. Version of 28. August 2008.
P45
Trust in the Value-Creation Chain of Multimedia Goods
Together with Nicolai Kuntze
Contributed chapter. In Shiguo Lian and Yan Zhang (Eds.): Handbook of Research on Secure Multimedia Distribution, IGI Global Publishing, 2009. ISBN 978-1-60566-262-6.
P44
Rechtssichere Transformation signierter Dokumente
Together with Alexander Roßnagel
Nomos Verlag, Baden-Baden, 2008. ISBN 978-3-8329-2983-1.
P43
Trusted Computing in mobiler Anwendung: Von Zugangskontrolle zu Identitäten
Together with Nicolai Kuntze
In: Norbert Pohlmann, Helmut Reimer (Hrsg.): Trusted Computing : Ein Weg zu neuen IT-Sicherheitsarchitekturen oder Ein Quantensprung in der IT-Sicherheit, pp. 187-206, Vieweg-Verlag, Wiesbaden 2007.
P42
Subscriber Authentication in Cellular Networks with Trusted Virtual SIMs
Together with Nicolai Kuntze and Michael Kasper
DOI resolution link Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT2008), Feb. 17-20, 2008, Phoenix Park, Korea, IEEE.
PDF EN Final version of 1. January 2008. ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
P41
On the deployment of Mobile Trusted Modules
Together with Nicolai Kuntze and Michael Kasper
DOI resolution link Proceedings of the Wireless Communications and Networking Conference WCNC 2008, Las Vegas, USA, 31 March - 2 April 2008, IEEE.
star Received best paper award (PDF) at IEEE WCNC 2008.
PDF EN Final version of 13. December 2007. ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
PDF EN Slides of the corresponding presentation. Version of 08. April 2008.
P40
Trust for Location-based Authorisation
Together with Nicolai Kuntze and Jörg Abendroth
DOI resolution link Proceedings of the Wireless Communications and Networking Conference WCNC 2008, Las Vegas, USA, 31 March - 2 April 2008, IEEE.
PDF EN Final version of 13. December 2007. ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
PDF EN Slides of the corresponding presentation. Version of 08. April 2008.
P39
Trusted Infrastructures for Identities
Together with Barbara Fichtinger, Eckehard Herrmann, and Nicolai Kuntze
In: Virtual Goods: Technology, Economy, and Legal Aspects. Proceedings of the 5th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, Koblenz, October 11-13, 2007. Rüdiger Grimm and Berthold Hass (Eds.). Nova Publishers, 2008.
PDF EN Final version of 30. August 2007.
PDF EN Slides of the corresponding presentation held by Barbara Fichtinger.
P38
Free riding and competition in network markets for digital goods
DOI resolution link In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS-41), January 7-10, 2008.
starNominated for best paper award at HICSS-41
PDF EN Final version of 19. August 2007. ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
PPT EN Slides of the corresponding presentation. Version of 10. January 2008
P37
Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security
Book edited together with Michael Kreutzer and Rafael Accorsi
Nova Publishers, Hauppauge, NY, 2007. ISBN 1-60021-912-8
P36
Protection of DVB Systems by Trusted Computing
Together with Nicolai Kuntze
Contribution to the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the Orange County Convention Center, Orlando, FL, USA.
PDF EN Final version of 14. February 2007. ©2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
P35
Non-Repudiation in Internet Telephony
DOI resolution link Together with Nicolai Kuntze and Christian Hett
In: New Approaches for Security, Privacy, and Trust in Complex Systems. International Federation for Information Processing, Vol 232, pp. 361-372, Springer, Boston, 2007. Proceedings of the IFIP sec2007, Sandton, South Africa 14-16 May 2007
PDF EN Final version of 23. January 2007.
PDF EN Slides of the corresponding presentation. Version of 15th May 2007.
P34
Trusted Ticket Systems and Applications
DOI resolution link Together with Nicolai Kuntze
In: New Approaches for Security, Privacy, and Trust in Complex Systems. International Federation for Information Processing, Vol 232, pp. 49-60, Springer, Boston, 2007. Proceedings of the IFIP sec2007. Sandton, South Africa 14-16 May 2007
PDF EN Final version of 23. January 2007.
PDF EN Slides of the corresponding presentation held by Nicolai Kuntze. Version of 14th May 2007.
P33
Trustworthy content push
Together with Nicolai Kuntze
DOI resolution link In: Proceedings of the Wireless Communications and Networking Conference WCNC 2007, Hong Kong, 11-15 March 2007, IEEE.
PDF EN Final version of 11. December 2006. ©2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
P32
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Together with Nicolai Kuntze and Dominique Mähler
In: Axmedis 2006 : proceedings of the 2nd international Conference on automated production of cross media content for multi-channel distribution; Workshops Tutorials Applications and Industrial, Kia Ng, Atta Badii, and Pierfrancesco Bellini (eds.). pp. 145-149, Atti del Convegno, Leeds (UK), Firenze University Press, 2006.
Refereed contribution to the Workshop Virtual Goods at the Conference AXMEDIS 2006, 13.-15. December 2006, Leeds, UK
PDF EN Final version of 29. August 2006.
PDF EN Slides of the corresponding presentation held by Nicolai Kuntze. Version of 4th January 2007.
P31
Security and Non-Repudiation for Voice-Over-IP Conversations
Together with Christian Hett and Nicolai Kuntze
Wireless World Research Forum Meeting 17, Heidelberg, Germany 15.-17. November 2006.
Poster presentation at the Conference Information Security South Africa (ISSA 2006) Sandton, South Africa, 5 -7 July 2006.
PDF EN Version of 14 June 2006: ACM class added, arXived; 8 June 2006: Final conference version.
PDF EN The posters that won the best poster award at the ISSA conference. Version of 30 June 2006.
P30
Authorised Translations of Electronic Documents
Together with Jan Piechalski
Refereed contribution to the Conference Information Security South Africa (ISSA 2006) Sandton, South Africa, 5 -7 July 2006.
PDF EN Version of 10 June 2006: ACM class added, arXived; 8 June 2006: Final conference version.
PDF EN Slides of the corresponding presentation. Version of 28 June 2006.
P29
Trusted Computing in Mobile Action
Together with Nicolai Kuntze
Refereed contribution to the Conference Information Security South Africa (ISSA 2006) Sandton, South Africa, 5 -7 July 2006.
PDF EN Version of 10 June 2006: ACM class added, arXived; 8 June 2006: Final conference version.
PDF EN Slides of the corresponding presentation. Version of 22 June 2006.
P28
A secure archive for Voice-over-IP conversations
Together with Christian Hett and Nicolai Kuntze
In: Proceedings of the 3rd Annual VoIP Security Workshop (VSW06), Berlin, Germany 1st-2nd June 2006.
PDF EN Final version 25. April 2006; 31. May 2006: ACM copyright notice added.
© ACM, (2006) 1-59593-387-5. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of VSW06, June, 2006, Berlin, Germany.
PDF EN Slides of the corresponding talk presented by Christian Hett.
P27
A Mobile service architecture utilising trusted computing
Together with Nicolai Kuntze
Wirless World Research Forum Meeting 16 (WWRF 16), 26. - 28. April 2006, Shanghai, China.
PDF EN Version of 15. April 2006.
P26
Transitive trust in mobile scenarios
DOI resolution link Together with Nicolai Kuntze
In: Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006, Günter Müller (Ed.), Lecture Notes in Computer Science, Vol. 3995 Springer-Verlag, 2006, pp. 73-85.
PDF EN Pre-refereed version of 10. January 2006. © (of the proceedings version) Springer-Verlag.
PDF EN Slides of the corresponding presentation. Version of 7 June 2006.
P25
Trusted Integration of Mobile Platforms into Service-oriented Networks
Together with Dr. Michael Marhöfer, Siemens AG
Extended Summary of a talk presented at the 11th German-Japanese Symposium "Security, Privacy and Safety in the Information Society" of the Münchner Kreis, Tokio, Japan, 13th-16th September 2005.
PDF EN Extended Summary, version of 5. August 2005.
PDF EN Slides of the corresponding talk presented by Prof. Claudia Eckert.
P24
Aspect-Oriented Security for Web-Applications
Together with Nicolai Kuntze and Thomas Rauch
In: Sachar Paulus, Norbert Pohlmann, Helmut Reimer (Eds.), ISSE 2005 Securing Electronic Business Processes, Highligths of the Information Security Solutions Europe 2005 Conference, Vieweg-Verlag, September 2005, pp. 83-91.
P23
Multi-level markets and incentives for information goods
DOI resolution link Information Economics and Policy 18 no. 2 (2006) 125-138.
PDF EN Version of 6. December 2005: typos corrected; 21. April 2005: Revised submission to IEP.
P22
Incentive Systems in Multi-Level Markets for Virtual Goods
Workshop Virtual Goods at the Conference AXMEDIS 2005, 30. November - 2. December 2005, Florence, Italy.
Axmedis 2005, Proceedings of the 1st International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Volume for Workshops, Industrial, and Application Sessions, Paolo Nesi, Kia Ng, Jaime Delgado (Eds.), Firenze University Press, 2005 (Atti 22), pp. 134-141. ISBN 88-8453-354-6 (online), 88-8453-354-4 (print)
PDF EN Version of 17. June 2005: Competition model added, discussion revised; 25. February 2005: Title changed, restructured, minor additions and revisions; 14. September 2004: first version.
PDF EN Slides of the corresponding presentation. Version of 24 November 2005
P21
Security for Distributed Web-Applications via Aspect-Oriented Programming
Together with Nicolai Kuntze and Thomas Rauch
Refereed contribution to the Conference Information Security South Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005.
PDF EN Version of 29 July 2005: ACM class added, arXived; 7 June 2005: Final conference version.
PDF EN Slides of the corresponding presentation. Version of 26 June 2005
P20
Sicherheit in verteilten Web-Applikationen durch aspektorientierte Programmierung
Together with Nicolai Kuntze and Thomas Rauch
Refereed contribution to the 19. DFN-Arbeitstagung über Kommunikationsnetze, Handwerkskammer Düsseldorf, Germany, 18.-20 May 2005.
In: Jan Van Knop and Wilhelm Haverkamp and Eike Jessen (Hrsg.) "Heute schon das Morgen sehen." 19. DFN-Jahrestagung über Kommunikationsnetze. GI-Edition, Lecture Notes in Informatics (LNI), Vol. P-73, pp. 95-108, 2005.
PDF DE Version of 29 April 2005
P19
Konzepte für rechtssichere Transformationen signierter Dokumente
Together with Thomas Kunz and Ursula Viebeg
Datenschutz und Datensicherheit (DuD) 29 (Mai 2005) 5, 279-285
P18
Legal Security for Transformations of Signed Documents: Fundamental Concepts
DOI resolution link Together with Zbyněk Loebl
Refereed contribution to the Second European PKI Workshop, University of Kent, England 30. June - 1. July 2005.
In: Proceedings of the Second European PKI Workshop, D. Chadwick and G. Zhao (Eds.) Lecture Notes in Computer Science, vol. 3545, pp. 255-270, Springer-Verlag, 2005.
PDF EN Version of 10 June 2005: page numbers added; 31 May 2005: typos and grammatical errors corrected; © Springer-Verlag
PDF EN Proceedings version, © Springer-Verlag
PDF EN Corresponding presentation held by Zbyněk Loebl
P17
Grundkonzepte rechtssicherer Transformation signierter Dokumente
Together with Stefanie Fischer-Dieskau, Thomas Kunz, Ursula Viebeg
Refereed contribution to the Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG2005) at the Konferenz Sicherheit 2005, 2. Jahrestagung des Fachbereichs Sicherheit der GI, at the University of Regensburg, Germany, 5-8 April 2005.
In: Hannes Federrath (Ed.): Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, GI-Edition, Lecture Notes in Informatics (LNI), Vol. P-62, pp. 401-412, 2005.
PDF DE Version of 18 November 2004
PDF DE Slides of the corresponding presentation. Version of 6 April 2005
P16
Asymptotic Hyperfunctions, Tempered Hyperfunctions, and Asymptotic Expansions
DOI resolution link International Journal of Mathematics and Mathematical Sciences 2005 5 (May 2005) 755-788
PDF PS EN Version of 14 April 2005: typos and minor corrections; 3 July 2004: minor revisions; 25 February 2002: Revised, Typos corrected
P15
A Model for Prejudiced Learning in Noisy Environments
DOI resolution link Applied Mathematics and Computation 168/1 (2005) 354-379
PDF EN Version of 6 August 2004, minor revisions of text and references
PDF PS EN Version of 6 August 2004; reduced resolution graphics
P14
Interoperability Challenges for DRM Systems
Together with Omid Tafreschi, Ruben Wolf
Refereed paper for the GI WG ECOM / IFIP TC 6, WG 6.11 Workshop on Virtual Goods 2004, Technical University of Ilmenau, Germany, 28 - 29 May 2004. Published exclusively on the Web.
PDF EN Version of 6 April 2004
PDF EN Slides of the corresponding presentation. Version of 29 May 2004
P13
Implementierung von Security Policies in offenen Telekollaborationen
Together with Michael Herfert, Peter Ochsenschläger, Jürgen Repp, Roland Rieke, Martin Schmucker, Steven Vettermann, Uwe Böttge, Cristina Escaleira, Dirk Rüdiger
In: D.A.CH Security 2004, Patrick Horster ed., Syssec, Sauerlach, Austria 2004. pp. 37-49. Refereed paper for the Conference D.A.CH Security 2004, joint conference of GI, OCG, BITKOM, SI, and TeleTrusT, at the university of Basle, Switzerland, 30-31 March 2004
PDF PS DE Version of 29 January 2004: Abstract added
PDF DE Slides of the corresponding presentation. Version of 1 April 2004: revised including conference feedback
P12
Mathematics of the Quantum Zeno Effect
In: Mathematical Physics Research on the Leading Edge, Charles V. Benton ed., Nova Science Publishers, Hauppauge NY, pp. 113-143, ISBN 1-59033-905-3, 2004
PDF PS EN 5. October 2004: Revision including published corrigenda to [P9], further typos corrected; 30. January 2004: minor changes, typos corrected;
P11
XML-Signatur Anwendungsprofile als Weg zur Lösung des Präsentationsproblems
Together with Thomas Kunz and Ulrich Pordesch
Datenschutz und Datensicherheit (DuD) 27/12 (December 2003) 740-745
PDF DE Final version Â©
P10
Phragmén-Lindelöf principles of type L^p
Applied Mathematics E-Notes 3 (2003) 178-182
PDF PS EN Version of 25 May 2003
PDF EN © Published journal version
P9
Zeno Dynamics in Quantum Statistical Mechanics
DOI resolution link Journal of Physics A: Mathematical and General 36 (January 2003) 1135-1148
DOI resolution link Corrigendum: ibid. 37 (June 2004) 11309-11310
PDF PS EN5. 10. 2004: Revision including published corrigendum, further typos corrected; 3.Â&xnbsp;JanuaryÂ&xnbsp;2003: final; 16.Â&xnbsp;12.Â&xnbsp;2002: revised; 12.Â&xnbsp;9.Â&xnbsp;2002: typos corrected, references updated and added, acknowledgements added, style polished;
PDF EN © Published journal version
PDF EN © Corrigenda to the published journal version
P8
A Note on Heat Kernel Estimates on Weighted Graphs with Two-Sided Bounds on the Weights
Applied Mathematics E-Notes 2 (2002) 25-28
PDF PS EN Version of 10 February 2002: Typos corrected
PDF EN © Published journal version
P7
Zeno Dynamics of von Neumann Algebras
DOI resolution link Journal of Physics A: Mathematical and General 35 (August 2002) 7817-7825
PDF PS EN Version of 17 AugustÂ&xnbsp;2002: Further typos corrected; 10 July 2002: Revised; 17 May 2002: Typos corrected; added: references, PACS numbers
PDF PS EN © Published journal version
P6
Infinite Infrared Regularization and a State Space for the Heisenberg Algebra
DOI resolution link Journal of Mathematical Physics 36 no. 1 (January 2002) 243-259
DOI resolution link Erratum: ibid. 43 no. 6 (June 2002) 3412
PDF PS EN Version of 03 March 2003: Typos corrected, address updated; 20 February 2002: Reference added
PDF PS EN © Published journal version
PDF EN © Erratum to the published journal version
P5
A Model for Prejudiced Behaviour and a Noisy Dynamical System
GMD Report 104, GMD German National Research Center for Information Technology, Institute for Secure Telecooperation, Darmstadt, Germany, July 2000, ISSN 1435-2702
PDF EN Version of July 2000
P4
Signiertes XML und das Präsentationsproblem
Datenschutz und Datensicherheit (DuD) 24/3 (März 2000) 153-158
PDF DE Published journal version Â©
P3
Asymptotische Hyperfunktionen, temperierte Hyperfunktionen und asymptotische Entwicklungen
Logos-Verlag, Berlin, 1998, ISBN 3-89722-127-6
PhD Dissertation, Johann Wolfgang Goethe-Universität Frankfurt am Main, Germany, 1999
PDF PS DE Version of 15 May 2003: Typos corrected
PDF PS DE List of errata for the printed edition
P2
Mathematical Problems of Gauge Quantum Field Theory: A Survey of the Schwinger Model
Universitatis Iagellonicae Acta Mathematica Fasciculus XXXIV (1997) 113-134
PDF PS EN Version of March 2002: Typos corrected, references and address updated
Extended version of a talk at the First Frankfurt-Krakow Operator Theory Seminar, Iagellonian University, Krakow, Poland, April 1996
P1
Algebraische und konforme Quantenfeldtheorie
Logos-Verlag, Berlin, 1997, ISBN 3-931216-49-7
Diploma Thesis, Johann Wolfgang Goethe-Universität Frankfurt am Main, Germany, 1994
PDF PS DE Version of 5 August 1999: Typos corrected
PDF PS DE List of errata for the printed edition

E-Prints

E3
Planning Distributed Security Operations Centers in Multi-Cloud Landscapes: A Case Study
Preprint, Novalyst IT, NOZ Digital, 2022
PDF EN Version of 06 March 2023.
E2
Secure Operations on Tree-Formed Verification Data
Preprint, Novalyst IT, 2010
PDF EN Version of 19 August 2010.
E1
Euclidean Reconstruction in Quantum Field Theory: Between Tempered Distributions and Fourier Hyperfunctions
Preprint, Johann Wolfgang Goethe-Universitãt, Frankfurt am Main, Germany, October 1997
PDF PS EN Version of 23 October 1997. Talk at the 2nd Frankfurt-Krakow Operator Theory Seminar, Iagellonian University, Krakow, Poland, 7-11 April 1997

Lectures

SS07
Trusted Computing: Introduction and Applications
Lectures at the Technical University Darmstadt, summer term 2007.
PDF ENLecture 01: TC History and Introduction.
PDF ENLecture 02: TPM Architecture, Base Functionality, and Key Hierarchy.
PDF ENLecture 03: The CRTM and authenticated boot process.
PDF ENLecture 04: Authorisation,.sealing and binding.
PDF ENLecture 05: Remote, and Direct Anonymous Attestation.
PDF ENLecture 06: The evolution of mobile businesses and the TCG MPWG Specifications.
PDF ENLecture 07: Trust in Identity Management Systems.
PDF ENLecture 08: Trusted Software Stack and TCG Infrastructure.
PDF ENLecture 09: Mobile Applications.

Presentations (selected)

T1
Digitale Signaturen mit XML
Presentation at the Workshop "Web-Security", in the CAST-Forum of the ZGDV, Darmstadt, Germany, 29 June 2000
PDF DE Version of 29 June 2000
T2
Phase Transitions of the Logistic Map with Inhomogeneous Noise
Presentation at the third Hanno Rund Conference, University of Natal, Durban, South Africa, 13-16 September 2000
PDF EN Version of 15 September 2000
PDF PS EN Printed Abstract
T3
Estimates for the Heat Kernel on Weighted Graphs
Presentation at the University of Natal, Pietermaritzburg, South Africa, 25 May 2001
PDF PS EN Version of 24 May 2001
T4
Zeno Dynamics in Quantum Statistical Mechanics
Presentation at the Università di Pisa, Pisa, Itlay 3 July 2002, the conference on `Irreversible Quantum Dynamics', the Abdus Salam ICTP, Trieste, Italy, 29 July - 2 August 2002, and the University of Natal, Pietermaritzburg, South Africa, 14 May 2003
PDF PS EN Version of 24 April 2003: examples added; 16 December 2002: revised; 12 Sptember 2002: typos corrected, references added
T5
Infinite Infrared Regularization in Krein Spaces
Presentation at the AMS Southeastern Sectional Meeting 14-16 March 2003, and the Workshop `Asymptotic Analysis, Stability, and Generalized Functions', 17-19 March 2003, Louisiana State University, Baton Rouge, Louisiana
PDF PS EN Version of 5 March 2003
T6
XML-Signaturen und das Präsentationsproblem / XML-Signatures and the Presentation Problem
Together with Thomas Kunz and Ulrich Pordesch
Presentation at the Workshop "XML-Signatur", at the TU-Ilmenau, Ilmenau, Germany, 3-4 April 2003 organised by XML-Uni and BSI. Also presented at the University of Natal, Durban, South Africa, 16 May 2003. Also presented at the conference "Informatik 2003" of the Gesellschaft für Informatik, Johann Wolfgang Goethe-Universität, Frankfurt am Main, Germany 29 September - 2 October 2003,
PDF DE Version of 3 April 2003
PDF EN Version of 16 May 2003
PDF DE Abridged version of 2 October 2003
T7
Kryptographie im Zeitalter des Quantencomputers / Cryptography in the Age of Quantum Computers
Presentation at the Workshop "Wie sicher ist Kryptographie", in the CAST-Forum of the ZGDV, Darmstadt, Germany, 21 August 2003
PDF DE Version of 21 August 2003
PDF EN Version of 21 August 2003
T8
Rechtssicherheit bei der Transformation signierter Dokumente
Presentation at the Workshop "Public-Key-Infrastrukturen", in the CAST-Forum of the ZGDV, Darmstadt, Germany, 20 January 2005
PDF DE Version of 18 January 2005
T9
Revisions- und Rechtssicherheit beim Umgang mit elektronisch signierten Dokumenten
Presentation at the MarcusEvans Conference "Unternehmensweites Vertragsmanagement", 16.-17. October 2006, Hotel Hilton, Köln.
PDF DE Version of 29 September 2006
T10
Rechtssicherheit bei der Transformation signierter Dokumente
Presentation at the Workshop "Public-Key-Infrastrukturen", in the CAST-Forum of the ZGDV, Darmstadt, Germany, 25 January 2007
PDF DE Version of 17 January 2007
T11
TransiDoc - Technologie für sichere Transformation
Presentation at the Fachkonferenz Rechtssichere elektronische Archivierung, Bundesministerium für Wirtschaft und Technologie, Berlin, Germany, 13.12.2007.
PDF DE Version of 13 December 2007
T12
Total Information Governance - Trading Old Risks for New Ones?
Presentation at the ISGIG 2008: First International Symposium on Global Information Governance, March 13 - 14, 2008, Pisa, Italy.
PDF EN Version of 13 March 2008

Other Documents

D1
Ergänzende Notizen zur Quantenfeld- und Stringtheorie
Lecture Notes, Johann Wolfgang Goethe-Universität, Frankfurt am Main, Germany, 1996
PDF PS DE Version of March 1996. Skript mit mathematischen Ergänzungen zur Vorlesung von Prof, Dr. F. Constantinescu, Wintersemester 1995/96
D2
The Need for Collaboration Infrastructures for Signed Digital Documents
FP7 position paper on "Collaborative Working Environments (CWE)". Presented at a Workshop of the European Commission, Information Society and Media Directorate-General, Emerging Technologies and Infrastructures, New Working Environments, Brussels, 16th March 2006.
PDF EN Version of 7th March 2006.

Supervised Theses

Completed

TH1
Verbindliche Verträge in signiertem XML
Thomas Kunz
PDF DE Diploma Thesis, Johann Wolfgang Goethe-Universität, Frankfurt am Main, Germany, 22. March 2001
TH2
Sicheres Outsourcing mit verteilten Webservices
Nicolai Kuntze and Thomas Rauch
PDF DE Diploma Thesis, Technical University Darmstadt, Germany, 10. February 2005
TH3
Spamfilterung mittels Texterkennungsverfahren
Ulrike Petersen
PDF DE Diploma Thesis, Technical University Darmstadt, Germany, 23. February 2007
TH4
Beglaubigte Übersetzung elektronisch signierter Dokumente
Jan Piechalski
PDF DE Thesis advertisement
PDF DE Diploma Thesis, Technical University Darmstadt, Germany, 27. July 2006
PDF EN Slides of the final thesis presentation. Version of 28 July 2006.
TH5
Security and Non-Repudiation for Voice-over-IP conversations
Christian Hett
PDF EN Thesis advertisement
PDF EN Diploma Thesis, Technical University Darmstadt, Germany, 1. September 2006
PDF DE Slides of the final thesis presentation. Version of 31. August 2006.
TH6
Trusted Infrastructures for Identities
Barbara Fichtinger
PDF EN Thesis advertisement
PDF EN Diploma Thesis, FH Hagenberg, Austria, May 2007
TH7
Virtualisation of a SIM card using trusted computing
Michael Kasper
PDF EN Thesis advertisement
TH8
SPAM over Internet Telephony and how to deal with it
Rachid El Khayari, TU Darmstadt
PDF EN Thesis advertisement
PDF EN Diploma Thesis, Technical University Darmstadt, Germany, June 2008.
PDF DE Slides of the final thesis presentation. Version of 18. August 2008.
`
TH9
Trusted Watermarks
Andreas Brett, TU Darmstadt
PDF EN Thesis advertisement
TH10
Trusted Ticket Systems
Andreas Leicher, Johann Wolfgang Goethe-University Frankfurt
PDF EN Thesis advertisement
TH11
Trusted Computing Security for Web-Browsers
Raja Sekhar Kannamanani
PDF EN Thesis advertisement
TH12
Trusted Computing Security for Web-Browsers II
Gökhan Bal, Johann Wolfgang Goethe-University Frankfurt
PDF EN Thesis advertisement
TH13
Securing Digital Evidence
Jennifer Richter, TU Darmstadt
PDF EN Thesis advertisement
TH14
Non-Repudiation for Voice over IP Archiving
Ju Zhunli, TU Darmstadt
PDF EN Thesis advertisement

Patents (selected)

US1
US10044713B2 OpenID/Local OpenID Security
US Patent. Together with Andreas Leicher and Yogendra Shah.
PDF EN US Patent US10044713B2; Patent granted on August 7, 2018.
DE1
DE102006025369B4 Verfahren und Vorrichtung zur Sicherung der Integrität und/oder Nichtabstreitbarkeit von paketbasierter, zeitkritischer Kommunkation
Patent of the Fraunhofer-Gesellschaft. Together with Nicolai Kuntze and Christian Hett.
PDF DE Deutsche Patentschrift DE102006025369B4; Patent erteilt am 25.10.2007.

Links of Interest

Digital Publishing

eprints.org

The valuable effort to help scientists to guarantee open access to their own work. Covers everything one needs to know about self-archiving policies, procedures, and technology.

DOI Foundation

The aim of this effort is to provide unique, persistent identifiers for digital objects. Although not restricted to the scholarly domain, the DOI scheme has been quickly adopted by many scientific publishers. Another intention behind DOI is the creation of an identifier system that may be used to protect intellectual property rights, and for Digital Rights Management (DRM) systems. This Website uses the DOI resolution service DOI resolution link dx.doi.org wherever possible, to refer to published material.

The Open Archives Initiative (OAI)

Open Archives defined an XML-based data format and a protocol for the automatic harvesting of bibliographic information providers. A typical use case are front-ends for the arXiv. Besides open sources like the arXiv, some scientific publishers like the Institute of Physics are supporting the protocol.

Web Publishing Resources

Among the many resources used to create this page these four are most notable: SELFHTML is the de facto standard for HTML/XHTML/CSS references in the German-speaking domain (an English translation exists); meyerweb.com and DZINELABS give some good examples for advanced CSS usage; Without a good Unicode reference, a Web author can hardly do anymore.

English

Close reading will unveil that this author's English still wants improvement (and perhaps will continue to do so, perpetually). Help and consolation he found in this Guide to Grammar and Writing, and in these Advanced English lessons. One of the most extraordinary, free Web dictionaries is LEO's German-English dictionary.

Other

Braufuchs

Take a look at my beer.

Karate Dojo Zanshin

I enjoy practising Karate (Shotokan-style) and am acting president of the Karate Dojo Zanshin in Frankfurt on the Main. Visit the site of my home club.