


default search action
Markus Schneider 0002
Person information
- affiliation: Fraunhofer Gesellschaft, Institute for Secure Information Technology
- affiliation (PhD 1999): Hagen University, Germany
Other persons with the same name
- Markus Schneider — disambiguation page
- Markus Schneider 0001 — University of Florida, Gainesville, FL, USA (and 1 more)
- Markus Schneider 0003 — Thomson Corporate Research, Hannover, Germany
- Markus Schneider 0004 — TU München
- Markus Schneider 0005
— University of Ulm, Germany (and 1 more)
- Markus Schneider 0006 — Institut für Textiltechnik, Rheinisch-Westfälische Technische Hochschule Aachen, Aachen, Germany
- Markus Schneider 0007 — Institute of Production Science, Karlsruhe Institute of Technology,Karlsruhe, Germany
- Markus Schneider 0008 — Center for Tele-Information, Technical University of Denmark, Lyngby, Denmark
- Markus Schneider 0009
— University of Edinburgh, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Michael Kreutzer, Markus Schneider:
Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur. Datenschutz und Datensicherheit 45(4): 249-253 (2021)
2010 – 2019
- 2013
- [j9]Christian Winter, Markus Schneider, York Yannikos
:
F2S2: Fast forensic similarity search through indexing piecewise hash signatures. Digit. Investig. 10(4): 361-371 (2013) - 2012
- [c27]Christian Winter, Markus Schneider, York Yannikos
:
Model-Based Digit Analysis for Fraud Detection Overcomes Limitations of Benford Analysis. ARES 2012: 255-261 - [c26]York Yannikos
, Christian Winter, Markus Schneider:
Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework. ARES 2012: 613-619 - [c25]Tobias Hahn, Thomas Kunz, Markus Schneider, Sven Vowe:
Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses. TrustCom 2012: 850-856 - 2011
- [c24]Christian Winter, Markus Schneider, York Yannikos
:
Detecting Fraud Using Modified Benford Analysis. IFIP Int. Conf. Digital Forensics 2011: 129-141 - 2010
- [j8]Dennis Heinson, York Yannikos
, Frederik Franke, Christian Winter, Markus Schneider:
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen - Methoden zur Aufklärung verbotener Handlungen im Spannungsfeld rechtlicher Interessen. Datenschutz und Datensicherheit 34(2): 75-79 (2010) - [j7]York Yannikos
, Christian Winter, Frederik Franke, Markus Schneider:
Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge. Datenschutz und Datensicherheit 34(2): 90-95 (2010) - [c23]York Yannikos
, Frederik Franke, Christian Winter, Markus Schneider:
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data. ICWF 2010: 200-211
2000 – 2009
- 2008
- [j6]Christoph Krauß
, Markus Schneider, Claudia Eckert:
On handling insider attacks in wireless sensor networks. Inf. Secur. Tech. Rep. 13(3): 165-172 (2008) - [c22]Christoph Krauß
, Markus Schneider, Claudia Eckert:
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs. WiMob 2008: 586-591 - [c21]Christoph Krauß
, Markus Schneider, Claudia Eckert:
Defending against false-endorsement-based dos attacks in wireless sensor networks. WISEC 2008: 13-23 - 2007
- [c20]Christoph Krauß
, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. ARES 2007: 310-317 - [c19]Oliver Hinz, Eva Gerstmeier, Omid Tafreschi, Matthias Enzmann, Markus Schneider:
Customer Loyalty Programs and Privacy Concerns. Bled eConference 2007: 32 - [c18]Ruben Wolf, Markus Schneider:
A note on the security of code memo. Mobility Conference 2007: 261-267 - [p2]Biljana Cubaleska, Markus Schneider:
Denial of Service Detection in Mobile Agent Systems with Dependencies in Computations. Contributions to Ubiquitous Computing 2007: 249-268 - 2005
- [j5]Matthias Enzmann, Markus Schneider:
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System. Inf. Syst. Frontiers 7(4-5): 359-370 (2005) - [c17]Liqun Chen
, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 - [c16]Joao Girão, Dirk Westhoff, Markus Schneider:
CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. ICC 2005: 3044-3049 - 2004
- [j4]Kpatcha M. Bayarou, Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Sebastian Rohr, Markus Schneider:
Towards Certificate-Based Authentication for Future Mobile Communications. Wirel. Pers. Commun. 29(3-4): 283-301 (2004) - [c15]Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Markus Schneider:
A Note on Certificate Path Verification in Next Generation Mobile Communications. ARCS 2004: 273-287 - [c14]Matthias Enzmann, Markus Schneider:
A Privacy-Friendly Loyalty System for Electronic Marketplaces. EEE 2004: 385-393 - [c13]Matthias Enzmann, Marc Fischlin, Markus Schneider:
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. Financial Cryptography 2004: 24-38 - 2003
- [c12]Ruben Wolf, Thomas Keinz, Markus Schneider:
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach. DEXA Workshops 2003: 209-214 - [c11]Ruben Wolf, Markus Schneider:
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. MMM-ACNS 2003: 267-278 - [p1]Ahmad-Reza Sadeghi, Markus Schneider:
Electronic Payment Systems. Digital Rights Management 2003: 113-137 - 2002
- [c10]Biljana Cubaleska, Weidong Qiu, Markus Schneider:
How to Play Sherlock Holmes in the World of Mobile Agents. ACISP 2002: 449-463 - [c9]Biljana Cubaleska, Markus Schneider:
A Method for Protecting Mobile Agents against Denial of Service Attacks. CIA 2002: 297-311 - [c8]Matthias Enzmann, Thomas Kunz, Markus Schneider:
Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents. EC-Web 2002: 314-323 - [c7]Matthias Enzmann, Thomas Kunz, Markus Schneider:
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping. InfraSec 2002: 199-213 - [c6]Biljana Cubaleska, Markus Schneider:
Applying Trust Policies for Protecting Mobile Agents Against DoS. POLICY 2002: 198-201 - 2001
- [c5]Omid Amirhamzeh Tafreschi, Markus Schneider, Peter Fankhauser, Bendick Mahleko, Thomas Tesch:
From Call for Tenders to Sealed-Bid Auction for Mediated Ecommerce. DS-9 2001: 69-86 - [c4]Manfred Hauswirth, Mehdi Jazayeri, Markus Schneider:
A Phase Model for E-Commerce Business Models and its Application to Security Assessment. HICSS 2001 - 2000
- [j3]Markus Schneider:
On distribution properties of sequences with perfect linear complexity profile. Inf. Process. Lett. 74(3-4): 175-182 (2000)
1990 – 1999
- 1999
- [b1]Markus Schneider:
Über Methoden der Generierung binärer Pseudozufallsfolgen zur Stromverschlüsselung. University of Hagen, Germany, Shaker 1999, ISBN 978-3-8265-6750-6, pp. 1-240 - [j2]Hagen Hagemann, Sonja Schaup, Markus Schneider:
Sicherheit und Perspektiven elektronischer Zahlungssysteme. Datenschutz und Datensicherheit 23(1) (1999) - [j1]Firoz Kaderali, Werner Poguntke, Markus Schneider:
Die Rolle der Kryptologie in der Kommunikationstechnik. Informationstechnik Tech. Inform. 41(1): 42-47 (1999) - [c3]Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:
Methods for Protecting a Mobile Agent's Route. ISW 1999: 57-71 - [c2]Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:
Protecting a Mobile Agent's Route against Collusions. Selected Areas in Cryptography 1999: 215-225 - 1997
- [c1]Markus Schneider:
A Note on the Construction and Upper Bounds of Correlation-Immune Functions. IMACC 1997: 295-306
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint