TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 43.

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza :
A trusted versioning file system for passive mobile storage devices.
J. Network and Computer Applications
[Konferenz- oder Workshop-Beitrag] , (2014)

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel :
Poster: On the Usability of Secure GUIs.

[Anderes] , (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2011)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011)
[Konferenz- oder Workshop-Beitrag] , (2011)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
[Konferenz- oder Workshop-Beitrag] , (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics
[Konferenz- oder Workshop-Beitrag] , (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Lhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
Biomedical Engineering Systems and Technologies
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems
[Konferenz- oder Workshop-Beitrag] , (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
1st ACM International Health Informatics Symposium (IHI 2010)
[Konferenz- oder Workshop-Beitrag] , (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Privilege Escalation Attacks on Android.
ISC 2010: Proceedings of the 13th Information Security Conference
[Konferenz- oder Workshop-Beitrag] , (2010)

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel :
Return-Oriented Programming without Returns.
In: CCS '10 . ACM
[Konferenz- oder Workshop-Beitrag] , (2010)

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel :
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag] , (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.

[Report] , (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Artikel] , (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.

[Report] , (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 34 (5) pp. 289-294.
[Artikel] , (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Patterns for Secure Boot and Secure Storage in Computer Systems.
4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),
[Konferenz- oder Workshop-Beitrag] , (2010)

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
International Conference on Trusted Systems (INTRUST) Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
USENIX LISA 2009 USENIX
[Konferenz- oder Workshop-Beitrag] , (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[Konferenz- oder Workshop-Beitrag] , (2009)

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
4th ACM Workshop on Scalable Trusted Computing
[Konferenz- oder Workshop-Beitrag] , (2009)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09 . ACM
[Konferenz- oder Workshop-Beitrag] , (2009)

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications IEEE
[Konferenz- oder Workshop-Beitrag] , (2009)

Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Einsatz von Sicherheitskernen und Trusted Computing.
D-A-CH Security
[Konferenz- oder Workshop-Beitrag] , (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel :
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS , 5471 . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel :
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS , 5451 . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Husseiki, Rani ; Gasmi, Yacine ; Stewin, Patrick ; Unger, Martin :
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
3rd ACM Workshop on Scalable Trusted Computing
[Konferenz- oder Workshop-Beitrag] , (2008)

Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Property-Based TPM Virtualization.
In: LNCS (5222).
[Konferenz- oder Workshop-Beitrag] , (2008)

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel :
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI , 1 (133).
[Konferenz- oder Workshop-Beitrag] , (2008)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers.

[Report] , (2007)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing.
Second International Conference on Availability, Reliability and Security (ARES 2007)
[Konferenz- oder Workshop-Beitrag] , (2007)

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel :
Trusted User-Aware Web Authentication.
Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),
[Konferenz- oder Workshop-Beitrag] , (2007)

Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian ; Wachsmann, Christian ; Winandy, Marcel :
TCG Inside? - A Note on TPM Specification Compliance.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC). ACM Press
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Selhorst, Marcel ; Stüble, Christian ; Winandy, Marcel :
TCG Inside? - A Note on TPM Specification Compliance.
ACM Workshop on Scalable Trusted Computing (ACMSTC) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Scheibel, Michael :
Design and Implementation of a Secure Linux Device Encryption Architecture.
LinuxTag
[Konferenz- oder Workshop-Beitrag] , (2006)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel :
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06).
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Alkassar, Ammar ; Scheibel, Michael :
Security Architecture for Device Encryption and VPN.
Information Security Solution Europe (ISSE06)
[Konferenz- oder Workshop-Beitrag] , (2006)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
In: Workshop on Information and System Security (WISSEC'06).
[Konferenz- oder Workshop-Beitrag] , (2006)

Gajek, Sebastian ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.
Workshop on Information and System Security (WISSEC'06)
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska :
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
[Artikel] , (2005)

Sadeghi, Ahmad-Reza ; Winandy, Marcel ; Stüble, Christian ; Selhorst, Marcel ; Senft, Oska :
New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy.
In: Datenschutz und Datensicherheit, 9
[Artikel] , (2005)

Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel :
Multilateral Security Considerations for Adaptive Mobile Applications.
2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005) INSTICC
[Konferenz- oder Workshop-Beitrag] , (2005)

Diese Liste wurde am Sat Dec 15 02:33:19 2018 CET generiert.