TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 8.

Shulman, Haya and Waidner, Michael
Pernul, Günther and Ryan, Michael Y. A. and Weippl, Edgar (eds.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, Springer-Verlag New York, Inc., Vienna, Austria, In: Lecture Notes in Computer Science 9326, 1, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Conference or Workshop Item]

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Merzdovnik, Georg and Kieseberg, Peter and Weippl, Edgar (2014):
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages, IEEE Computer Society, Fribourg, Switzerland, In: ARES '14, ISBN 978-1-4799-4223-7,
DOI: 10.1109/ARES.2014.32,
[Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin and Neitzel, Svenja
Katzenbeisser, Stefan and Lotz, Volkmar and Weippl, Edgar (eds.) (2014):
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 229-241, [Book Section]

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Kieseberg, Peter and Huber, Markus and Leithner, Manuel and Mulazzani, Martin and Weippl, Edgar (2014):
Covert Computation - Hiding code in code through compile-time obfuscation.
In: Computers & Security, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Ullrich, Johanna and Weippl, Edgar (2013):
Cloud Scouting: Services Discovery and Topology Mapping.
In: ACM Cloud Computing Security Workshop (ACM CCSW) 2013, Berlin, Germany, November 2013., [Article]

Kieseberg, Peter and Huber, Markus and Leithner, Manuel and Mulazzani, Martin and Weippl, Edgar (2013):
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security table of contents, ACM, Hangzhou, China, In: ASIA CCS '13, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484384,
[Conference or Workshop Item]

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Steinebach, M. and Wolf, P. and Engelhardt, J.
Schartner, Peter and Weippl, Edgar (eds.) (2010):
Datenschutzrechtliche Betrachtung digitaler Wasserzeichen.
In: Proceeding of D-A-CH Security 2010 -- Bestandsaufnahme - Konzepte - Anwendungen - Perspektive, syssec, [Conference or Workshop Item]

This list was generated on Sat Nov 16 00:39:44 2019 CET.