Publications
clear filter)
: Kreutzer M (Journal Articles
Years: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994back to the top of all publications
2005
back to the year overview- Kreutzer M, Kähmer M
Selbstheilende Dienstfindung für IT-Netze in mobilen Feldkrankenhäusern
2005 Wirtschaftsinformatik (WI), volume: 47, issue: 3, pages: 196 - 202
2002
back to the year overview- Müller G, Kreutzer M
Erst die neue Technologie, danach die Sicherheit
2002 it+ti, Oldenbourg, München
2001
back to the year overview- Mantel H, Schairer A, Kabatnik M, Kreutzer M, Zugenmaier A
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks
2001 Technical Report, Institut für Informatik Universität Freiburg, issue: 159 - Kreutzer M, Zugenmaier A
Verbindlichkeit durch netzinterne Sicherheitsdienste (engl.: Reaching Accountability by Security Services inside Networks)
2001 IT Sicherheit, it+ti, issue: 5
Books
Years: 2010 | 2009 | 2008 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 1996back to the top of all publications
2008
back to the year overview- Nova Editors
Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security
Schmidt A, Kreutzer M, Accorsi R
2002
back to the year overview- Oldenbourg Verlag
Telematik- und Kommunikationssysteme in der vernetzten Wirtschaft, Lehrbücher Wirtschaftsinformatik
Müller G, Eymann T, Kreutzer M
Book chapters
Years: 2016 | 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1987back to the top of all publications
2003
back to the year overview- Müller G, Kreutzer M, Strasser M, Eymann T, Hohl A, Nopper N, Sackmann S, Coroama V
Geduldige Technologie für ungeduldige Patienten: Führt Ubiquitous Computing zu mehr Selbstbestimmung?
In: Total vernetzt – Szenarien einer informatisierten Welt, pages: 159 - 186, F. Mattern (ed.), Springer (Berlin, Heidelberg, New York), 2003
Conference papers
Years: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986back to the top of all publications
2004
back to the year overview- Spahic A, Kreutzer M, Kähmer M, Chandratilleke S
Pre-Authentication using Infrared
2004 Privacy, Security and Trust within the Context of Pervasive Computing – Proceedings of the Workshop at Pervasive04 (SPPC) - Angermann M, Strang T, Kähmer M, Kreutzer M
Rapidly Deployable Infrastructures for Communications and Localization in Disaster Management - Scenarios, Requirements and Concepts
2004 United Nations International Workshop on the Use of Space Technology for Disaster Management - Kreutzer M, Kähmer M
Scalable Service Discovery in MANETS exemplified in Mobile Hospitals
2004 Proceedings of IADIS International Conference, e-Society - Kreutzer M, Kähmer M
Service Discovery with Higher Order Services in Mobile Hospitals
2004 17th IEEE Symposium on Computer-Based Medical Systems (CBMS) Proceedings of the 17th IEEE Symposium on Computer- Based Medical Systems (CBMS), pages: 460 - 465 - Kreutzer M, Kähmer M
Ubiquitous Computing Technology in Infrastructureless Environments
2004 Proceedings of IEEE International Conference on Systems, Man and Cybernetics (SMC)
2003
back to the year overview- Chandratilleke S, Kreutzer M
Credential-basierte Ad-hoc-Authentifikation für Funknetze
2003 Netzguide E-Security - Zugenmaier A, Kreutzer M, Müller G
The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment
2003 Kommunikation in Verteilten Systemen (KiVS) '03 Leipzig
2002
back to the year overview- Jendricke U, Kreutzer M, Zugenmaier A
Mobile Identity Management
2002 Workshop on Security in Ubiquitous Computing (UBICOMP), Göteborg, Schweden
2001
back to the year overview- Zugenmaier A, Kreutzer M, Kabatnik M
Enhancing Applications with Approved Location Stamps
2001 IEEE, Intelligent Network Workshop, Boston, MA, USA
2000
back to the year overview- Keck D, Kabatnik M, Kreutzer M, Zugenmaier A
Multilateral Security in Intelligent Networks
2000 IEEE, Intelligent Network Workshop, Cape Town, South Africa