TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 23.

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications, 38, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, Rome, Italy, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010), [Conference or Workshop Item]

Chen, Liqun and Dietrich, Kurt and Löhr, Hans and Sadeghi, Ahmad-Reza and Wachsmann, Christian and Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: Information Security Conference (ISC), Springer, In: LNCS, 6531, [Conference or Workshop Item]

Löhr, Hans and Pöppelmann, Thomas and Rave, Johannes and Steegmanns, Martin and Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Cesena, Emanuele and Ramunno, Gianluca and Vernizzi, Davide (2010):
Anonymous Authentication with TLS and DAA.
In: TRUST2010, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-298, 5, [Article]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-294, 34, (5), [Article]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: USENIX LISA 2009, USENIX, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), [Conference or Workshop Item]

Gajek, Sebastian and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: Proceedings of the 2nd International Conference on Trusted Computing, Springer, In: LNCS, 5471, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Vishik, Claire and Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: 5th Information Security Practice and Experience Conference (ISPEC'09), Springer, In: LNCS, 5451, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Löhr, Hans and Manulis, Mark and Escalante, Alberto (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, [Conference or Workshop Item]

Chen, Liqun and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, Springer-Verlag, In: Lecture Notes in Computer Science, 4886, [Conference or Workshop Item]

Chen, Liqun and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security, 11th International Conference, ISC 2008, Springer, In: Lecture Notes in Computer Science, 5222, [Conference or Workshop Item]

Armknecht, Frederik and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Springer, In: Lecture Notes in Computer Science, 4991, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Ramasamy, Hari Govind and Schulz, Stefan and Schunter, Matthias (2007):
Enhancing Grid Security Using Trusted Virtualization.
In: 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Springer Verlag, Hong Kong, China, In: LNCS, 4610, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark and Escalante, Alberto (2007):
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting.
In: 11th International Conference on Financial Cryptography and Data Security (FC 2007), Springer Verlag, Scarborough, Trinidad and Tobago, In: LNCS, 4886, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Löhr, Hans and Chen, Liquen and Landfermann, Rainer and Rohe, Markus (2006):
A Protocol for Property-Based Attestation.
In: First ACM Workshop on Scalable Trusted Computing (STC'06), [Conference or Workshop Item]

This list was generated on Sat Jul 20 01:53:46 2019 CEST.