Seguir
Thomas Groß
Thomas Groß
Professor of System Security, Newcastle University
Email confirmado em ncl.ac.uk - Página inicial
Título
Citado por
Citado por
Ano
Access control in data processing system
TR Gross, G Karjoth
US Patent 8,875,224, 2014
2272014
Security analysis of the SAML single sign-on browser/artifact profile
T Groß
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2242003
User centricity: a taxonomy and open issues
A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer
Proceedings of the second ACM workshop on Digital identity management, 1-10, 2006
2092006
Efficient attributes for anonymous credentials
J Camenisch, T Groß
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-30, 2012
2032012
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2022009
Cryptographic encoding and decoding of secret data
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,744,077, 2014
912014
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Groß, V Shoup
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
622010
Transaction auditing for data security devices
P Bichsel, JL Camenisch, TR Gross
US Patent 8,688,988, 2014
602014
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures
S Bleikertz, C Vogel, T Groß
Proceedings of the 30th annual computer security applications conference, 26-35, 2014
592014
Browser model for security analysis of browser-based protocols
T Groß, B Pfitzmann, AR Sadeghi
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
562005
Attributes in cryptographic credentials
JL Camenisch, TR Gross
US Patent 8,281,131, 2012
532012
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
502015
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
492015
Why privacy is all but forgotten
KPL Coopamootoo, T Groß
Proceedings on Privacy Enhancing Technologies, 2017
442017
Method, system, and computer program product for virtual world access control management
A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer
US Patent App. 12/062,066, 2009
442009
Defense-in-depth against malicious insiders in the cloud
F Rocha, T Gross, A Van Moorsel
2013 IEEE International Conference on Cloud Engineering (IC2E), 88-97, 2013
432013
Automated information flow analysis of virtualized infrastructures
S Bleikertz, T Groß, M Schunter, K Eriksson
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
432011
Vertical protocol composition
T Groß, S Modersheim
2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011
412011
Cryptographic proofs in data processing systems
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,527,777, 2013
382013
A virtualization assurance language for isolation and deployment
S Bleikertz, T Groß
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
382011
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20