Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Marcel Winandy
@inproceedings{DBLP:conf/cscloud/LiguoriSW19, author = {Angelo Liguori and Peter Schoo and Marcel Winandy}, editor = {Meikang Qiu}, title = {Mind the Shift: Secure Migration of Containerized Processes in Edge Computing}, booktitle = {6th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019}, pages = {204--209}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00027}, doi = {10.1109/CSCLOUD/EDGECOM.2019.00027}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/LiguoriSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HoffmannRMWGH16, author = {Johannes Hoffmann and Teemu Rytilahti and Davide Maiorca and Marcel Winandy and Giorgio Giacinto and Thorsten Holz}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {139--141}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857737}, doi = {10.1145/2857705.2857737}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HoffmannRMWGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CatuognoLWS14, author = {Luigi Catuogno and Hans L{\"{o}}hr and Marcel Winandy and Ahmad{-}Reza Sadeghi}, title = {A trusted versioning file system for passive mobile storage devices}, journal = {J. Netw. Comput. Appl.}, volume = {38}, pages = {65--75}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.05.006}, doi = {10.1016/J.JNCA.2013.05.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CatuognoLWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2013wash, editor = {John Lyle and Shamal Faily and Marcel Winandy}, title = {Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing {(TRUST} 2013), London, United Kingdom, June 20, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1011}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1011}, urn = {urn:nbn:de:0074-1011-6}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/2013wash.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Winandy12, author = {Marcel Winandy}, title = {Security and trust architectures for protecting sensitive data on commodity computing platforms}, school = {Ruhr University Bochum}, year = {2012}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-201503013170}, urn = {urn:nbn:de:101:1-201503013170}, isbn = {978-3-8440-1315-3}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Winandy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Winandy12, author = {Marcel Winandy}, title = {Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen und L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {419--424}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0151-1}, doi = {10.1007/S11623-012-0151-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Winandy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihi/HupperichLSW12, author = {Thomas Hupperich and Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Gang Luo and Jiming Liu and Christopher C. Yang}, title = {Flexible patient-controlled security for electronic health records}, booktitle = {{ACM} International Health Informatics Symposium, {IHI} '12, Miami, FL, USA, January 28-30, 2012}, pages = {727--732}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2110363.2110448}, doi = {10.1145/2110363.2110448}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ihi/HupperichLSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/GroneW12, author = {Michael Gr{\"{o}}ne and Marcel Winandy}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Applying a Security Kernel Framework to Smart Meter Gateways}, booktitle = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012}, pages = {252--259}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-658-00333-3\_24}, doi = {10.1007/978-3-658-00333-3\_24}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/GroneW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/DmitrienkoHLWS11, author = {Alexandra Dmitrienko and Zecir Hadzic and Hans L{\"{o}}hr and Marcel Winandy and Ahmad{-}Reza Sadeghi}, editor = {Vicente Traver and Ana L. N. Fred and Joaquim Filipe and Hugo Gamboa}, title = {A Security Architecture for Accessing Health Records on Mobile Phones}, booktitle = {{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011}, pages = {87--96}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 18 Oct 2022 21:16:17 +0200}, biburl = {https://dblp.org/rec/conf/biostec/DmitrienkoHLWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/DmitrienkoHLSW11, author = {Alexandra Dmitrienko and Zecir Hadzic and Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Ana L. N. Fred and Joaquim Filipe and Hugo Gamboa}, title = {Securing the Access to Electronic Health Records on Mobile Phones}, booktitle = {Biomedical Engineering Systems and Technologies - 4th International Joint Conference, {BIOSTEC} 2011, Rome, Italy, January 26-29, 2011, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {273}, pages = {365--379}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29752-6\_27}, doi = {10.1007/978-3-642-29752-6\_27}, timestamp = {Sat, 19 Oct 2019 20:01:11 +0200}, biburl = {https://dblp.org/rec/conf/biostec/DmitrienkoHLSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaviSW11, author = {Lucas Davi and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {ROPdefender: a detection tool to defend against return-oriented programming attacks}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {40--51}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966920}, doi = {10.1145/1966913.1966920}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaviSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaviDKW11, author = {Lucas Davi and Alexandra Dmitrienko and Christoph Kowalski and Marcel Winandy}, editor = {Yan Chen and Shouhuai Xu and Ahmad{-}Reza Sadeghi and Xinwen Zhang}, title = {Trusted virtual domains on {OKL4:} secure information sharing on smartphones}, booktitle = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011}, pages = {49--58}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046582.2046592}, doi = {10.1145/2046582.2046592}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaviDKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/FilyanovMSW11, author = {Atanas Filyanov and Jonathan M. McCune and Ahmad{-}Reza Sadeghi and Marcel Winandy}, title = {Uni-directional trusted path: Transaction confirmation on just one device}, booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011}, pages = {1--12}, publisher = {{IEEE} Compute Society}, year = {2011}, url = {https://doi.org/10.1109/DSN.2011.5958202}, doi = {10.1109/DSN.2011.5958202}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/FilyanovMSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CatuognoLMSSW10, author = {Luigi Catuogno and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marcel Winandy}, title = {Trusted virtual domains: Color your network}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {289--294}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0089-0}, doi = {10.1007/S11623-010-0089-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CatuognoLMSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LohrSW10, author = {Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Marcel Winandy}, title = {Patterns for Secure Boot and Secure Storage in Computer Systems}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {569--573}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.110}, doi = {10.1109/ARES.2010.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LohrSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LohrPRSW10, author = {Hans L{\"{o}}hr and Thomas P{\"{o}}ppelmann and Johannes Rave and Martin Steegmanns and Marcel Winandy}, editor = {Shouhuai Xu and N. Asokan and Ahmad{-}Reza Sadeghi}, title = {Trusted virtual domains on OpenSolaris: usable secure desktop environments}, booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010}, pages = {91--96}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1867650}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LohrPRSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CheckowayDDSSW10, author = {Stephen Checkoway and Lucas Davi and Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Hovav Shacham and Marcel Winandy}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Return-oriented programming without returns}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {559--572}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866370}, doi = {10.1145/1866307.1866370}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CheckowayDDSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ehealth/Winandy10, author = {Marcel Winandy}, editor = {Martin Szomszor and Patty Kostkova}, title = {A Note on the Security in the Card Management System of the German E-Health Card}, booktitle = {Electronic Healthcare - Third International Conference, eHealth 2010, Casablanca, Morocco, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {69}, pages = {196--203}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23635-8\_25}, doi = {10.1007/978-3-642-23635-8\_25}, timestamp = {Fri, 02 Jun 2017 20:50:08 +0200}, biburl = {https://dblp.org/rec/conf/ehealth/Winandy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihi/LohrSW10, author = {Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Tiffany C. Veinot and {\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and Gang Luo and Henrique Andrade and Neil R. Smalheiser}, title = {Securing the e-health cloud}, booktitle = {{ACM} International Health Informatics Symposium, {IHI} 2010, Arlington, VA, USA, November 11 - 12, 2010, Proceedings}, pages = {220--229}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1882992.1883024}, doi = {10.1145/1882992.1883024}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ihi/LohrSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BugielDKSW10, author = {Sven Bugiel and Alexandra Dmitrienko and Kari Kostiainen and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Liqun Chen and Moti Yung}, title = {TruWalletM: Secure Web Authentication on Mobile Platforms}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {219--236}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_15}, doi = {10.1007/978-3-642-25283-9\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/BugielDKSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DaviDSW10, author = {Lucas Davi and Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Privilege Escalation Attacks on Android}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {346--360}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_30}, doi = {10.1007/978-3-642-18178-8\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/DaviDSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SadeghiSW10, author = {Ahmad{-}Reza Sadeghi and Thomas Schneider and Marcel Winandy}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Token-Based Cloud Computing}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {417--429}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_30}, doi = {10.1007/978-3-642-13869-0\_30}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/SadeghiSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GajekLSW09, author = {Sebastian Gajek and Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Shouhuai Xu and N. Asokan and Cristina Nita{-}Rotaru and Jean{-}Pierre Seifert}, title = {TruWallet: trustworthy and migratable wallet-based web authentication}, booktitle = {Proceedings of the 4th {ACM} Workshop on Scalable Trusted Computing, {STC} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {19--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655108.1655112}, doi = {10.1145/1655108.1655112}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GajekLSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaviSW09, author = {Lucas Davi and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Shouhuai Xu and N. Asokan and Cristina Nita{-}Rotaru and Jean{-}Pierre Seifert}, title = {Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks}, booktitle = {Proceedings of the 4th {ACM} Workshop on Scalable Trusted Computing, {STC} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {49--54}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655108.1655117}, doi = {10.1145/1655108.1655117}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaviSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/FischerSW09, author = {Thomas Fischer and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {A Min Tjoa and Roland R. Wagner}, title = {A Pattern for Secure Graphical User Interface Systems}, booktitle = {Database and Expert Systems Applications, DEXA, International Workshops, Linz, Austria, August 31-September 4, 2009, Proceedings}, pages = {186--190}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DEXA.2009.76}, doi = {10.1109/DEXA.2009.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/FischerSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GrobertSW09, author = {Felix Gr{\"{o}}bert and Ahmad{-}Reza Sadeghi and Marcel Winandy}, title = {Software distribution as a malware infection vector}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402538}, doi = {10.1109/ICITST.2009.5402538}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GrobertSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/CatuognoDEKRSSSWZ09, author = {Luigi Catuogno and Alexandra Dmitrienko and Konrad Eriksson and Dirk Kuhlmann and Gianluca Ramunno and Ahmad{-}Reza Sadeghi and Steffen Schulz and Matthias Schunter and Marcel Winandy and Jing Zhan}, editor = {Liqun Chen and Moti Yung}, title = {Trusted Virtual Domains - Design, Implementation and Lessons Learned}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_10}, doi = {10.1007/978-3-642-14597-1\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/CatuognoDEKRSSSWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LohrSVW09, author = {Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Claire Vishik and Marcel Winandy}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {396--407}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_34}, doi = {10.1007/978-3-642-00843-6\_34}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LohrSVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/CatuognoLMSW09, author = {Luigi Catuogno and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Adam Moskowitz}, title = {Transparent Mobile Storage Protection in Trusted Virtual Domains}, booktitle = {Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, {USA}}, pages = {159--172}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/lisa09/tech/full\_papers/catuogno.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/CatuognoLMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LohrSSWW09, author = {Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marion Weber and Marcel Winandy}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {45--62}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_4}, doi = {10.1007/978-3-642-00587-9\_4}, timestamp = {Sat, 28 Aug 2021 16:06:55 +0200}, biburl = {https://dblp.org/rec/conf/trust/LohrSSWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GasmiSSUWHS08, author = {Yacine Gasmi and Ahmad{-}Reza Sadeghi and Patrick Stewin and Martin Unger and Marcel Winandy and Rani Husseiki and Christian St{\"{u}}ble}, editor = {Shouhuai Xu and Cristina Nita{-}Rotaru and Jean{-}Pierre Seifert}, title = {Flexible and secure enterprise rights management based on trusted virtual domains}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing, {STC} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {71--80}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456455.1456467}, doi = {10.1145/1456455.1456467}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GasmiSSUWHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/GasmiHPW07, author = {Yacine Gasmi and Christian Hessmann and Martin Pittenauer and Marcel Winandy}, editor = {Heinz{-}Gerd Hegering and Axel Lehmann and Hans J{\"{u}}rgen Ohlbach and Christian Scheideler}, title = {Sicherheitsprobleme elektronischer Wahlausz{\"{a}}hlungssysteme in der Praxis}, booktitle = {38. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Beherrschbare Systeme - dank Informatik, {INFORMATIK} 2008, Munich, Germany, September 8-13, 2008, Band 1}, series = {{LNI}}, volume = {{P-133}}, pages = {411--416}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21400}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/GasmiHPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SadeghiSW08, author = {Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marcel Winandy}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Property-Based {TPM} Virtualization}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {1--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_1}, doi = {10.1007/978-3-540-85886-7\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/SadeghiSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GajekSSW07, author = {Sebastian Gajek and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marcel Winandy}, title = {Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {120--127}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.59}, doi = {10.1109/ARES.2007.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GajekSSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SadeghiSSWW06, author = {Ahmad{-}Reza Sadeghi and Marcel Selhorst and Christian St{\"{u}}ble and Christian Wachsmann and Marcel Winandy}, editor = {Ari Juels and Gene Tsudik and Shouhuai Xu and Moti Yung}, title = {{TCG} inside?: a note on {TPM} specification compliance}, booktitle = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing, {STC} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {47--56}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179474.1179487}, doi = {10.1145/1179474.1179487}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SadeghiSSWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/AlkassarSSSW06, author = {Ammar Alkassar and Michael Scheibel and Michael St{\"{u}}bel and Ahmad{-}Reza Sadeghi and Marcel Winandy}, editor = {Sachar Paulus and Norbert Pohlmann and Helmut Reimer}, title = {Security Architecture for Device Encryption and {VPN}}, booktitle = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy}, pages = {54--63}, publisher = {Vieweg}, year = {2006}, url = {https://doi.org/10.1007/978-3-8348-9195-2\_7}, doi = {10.1007/978-3-8348-9195-2\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/AlkassarSSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsa/MuggeRWWCCE05, author = {Holger M{\"{u}}gge and Tobias Rho and Marcel Winandy and Markus Won and Armin B. Cremers and Pascal Costanza and Roman Englert}, editor = {Ronald Morrison and Fl{\'{a}}vio Oquendo}, title = {Towards Context-Sensitive Intelligence}, booktitle = {Software Architecture, 2nd European Workshop, {EWSA} 2005, Pisa, Italy, June 13-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3527}, pages = {231--238}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11494713\_16}, doi = {10.1007/11494713\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ewsa/MuggeRWWCCE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/SpalkaCW05, author = {Adrian Spalka and Armin B. Cremers and Marcel Winandy}, editor = {Joaquim Filipe and Luminita Vasiu}, title = {Multilateral security considerations for adaptive mobile applications}, booktitle = {{ICETE} 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005}, pages = {133--137}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Tue, 07 Nov 2006 14:13:57 +0100}, biburl = {https://dblp.org/rec/conf/icete/SpalkaCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SpalkaW03, author = {Adrian Spalka and Marcel Winandy}, title = {A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks}, booktitle = {27th International Computer Software and Applications Conference {(COMPSAC} 2003): Design and Assessment of Trustworthy Software-Based Systems, 3-6 November 2003, Dallas, TX, USA, Proceedings}, pages = {158--163}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CMPSAC.2003.1245336}, doi = {10.1109/CMPSAC.2003.1245336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SpalkaW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/WinandyCLS02, author = {Marcel Winandy and Armin B. Cremers and Hanno Langweg and Adrian Spalka}, editor = {Michael Gertz}, title = {Protecting Java Component Integrity Against Trojan Horse Programs}, booktitle = {Integrity and Internal Control in Information Systems V, {IFIP} {TC11/WG11.5} Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany}, series = {{IFIP} Conference Proceedings}, volume = {251}, pages = {99--113}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 07 Dec 2020 17:16:29 +0100}, biburl = {https://dblp.org/rec/conf/tc11-5/WinandyCLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.