TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | G | H | J | K | L | M | N | P | R | S | W
Number of items at this level (without sub-levels): 165.

A

Aderhold, Markus ; Kochtchi, Artjom (2013)
Tailoring PMD to Secure Coding.
Report, Bibliographie

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko (2013)
Choosing a Formalism for Secure Coding: FSM vs. LTL.
Report, Bibliographie

Aderhold, Markus
eds.: Esparza, Javier ; Majumdar, Rupak (2010)
Automated Termination Analysis for Programs with Second-Order Recursion.
Conference or Workshop Item, Bibliographie

Aderhold, Markus ; Cuéllar, Jorge ; Mantel, Heiko ; Sudbrock, Henning (2010)
Exemplary Formalization of Secure Coding Guidelines.
Report, Bibliographie

Aderhold, Markus
eds.: Esparza, J. ; Majumdar, R. (2010)
Automated Termination Analysis for Programs with Second-Order Recursion.
Conference or Workshop Item, Bibliographie

Aderhold, Markus
eds.: Giesl, J. ; Hähnle, R. (2010)
Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
Conference or Workshop Item, Bibliographie

Amann, Sven (2009)
Spezifikation und Codegenerierung von Sicherheitsautomaten.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Amann, Sven (2009)
Spezifikation und Codegenerierung von Sicherheitsautomaten.
Other, Bibliographie

Autexier, Serge ; Hutter, Dieter ; Langenstein, Bruno ; Mantel, Heiko ; Rock, Georg ; Schairer, Axel ; Stephan, Werner ; Vogt, Roland ; Wolpers, Andreas (2000)
VSE: Formal Methods Meet Industrial Needs.
In: International Journal on Software Tools for Technology Transfer, 3 (1)
Article, Bibliographie

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel (1999)
System Description: INKA 5.0 -- A Logic Voyager.
Conference or Workshop Item, Bibliographie

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
eds.: Bert, Didier ; Choppy, C. ; Mosses, P. (1999)
Towards an evolutionary formal software-development using CASL: ABSTRACT.
In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99
Book Section, Bibliographie

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
eds.: Bert, D. ; Choppy, C. ; Mosses, P. (1999)
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
Conference or Workshop Item, Bibliographie

Autexier, Serge ; Mantel, Heiko ; Stephan, Werner
eds.: Herzog, Otthein ; Günter, Andreas (1998)
Simultaneous Quantifier Elimination.
Conference or Workshop Item, Bibliographie

Autexier, Serge ; Mantel, Heiko (1998)
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
Report, Bibliographie

Autexier, Serge ; Mantel, Heiko (1998)
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
Report, Bibliographie

B

Bauereiß, Thomas ; Greiner, Simon ; Herda, Mihai ; Kirsten, Michael ; Li, Ximeng ; Mantel, Heiko ; Mohr, Martin ; Perner, Matthias ; Schneider, David ; Tasch, Markus (2017)
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.
doi: 10.5445/IR/1000092713
Report, Bibliographie

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017)
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item, Bibliographie

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015)
An Automatic Inference of Minimal Security Types.
Conference or Workshop Item, Bibliographie

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014)
Interaction Techniques for Co-located Collaborative TV.
Conference or Workshop Item, Bibliographie

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014)
Scalable Offline Monitoring.
Proceedings of the 14th International Conference on Runtime Verification (RV). Heidelberg, Germany
Conference or Workshop Item, Bibliographie

C

Cremer, Manuel (2017)
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

D

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
The 11th International Symposium on Foundations & Practice of Security (FPS). Montreal, Canada (13, 14 and 15 November 2018)
Conference or Workshop Item, Bibliographie

Dix, Isabella (2018)
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017)
An Experimental Study of a Bucketing Approach.
Uppsala, Sweden
Conference or Workshop Item, Bibliographie

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017)
AVR Processors as a Platform for Language-Based Security.
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
Conference or Workshop Item, Bibliographie

Döweling, Sebastian ; Tahiri, Tarik ; Sowinski, Philipp ; Schmidt, Benedikt ; Khalilbeigi, Mohammadreza (2013)
Support for Collaborative Situation Analysis and Planning in Crisis Management Teams using Interactive Tabletops.
doi: 10.1145/2512349.2512823
Conference or Workshop Item, Bibliographie

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012)
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.-10.05.2012)
doi: 10.1145/2212776.2223823
Conference or Workshop Item, Bibliographie

D'Souza, Deepak ; Holla, Raveendra ; Kulkarni, Janardhan ; Ramesh, Raghavendra Kagalavadi ; Sprick, Barbara (2008)
The Decidability of Model-Checking Information Flow Properties.
Conference or Workshop Item, Bibliographie

D'Souza, Deepak ; Holla, Raveendra ; Kulkarni, Janardhan ; Ramesh, Raghavendra Kagalavadi ; Sprick, Barbara (2008)
The Decidability of Model-Checking Information Flow Properties.
Conference or Workshop Item, Bibliographie

E

Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim (2022)
Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool.
doi: 10.26083/tuprints-00020262
Report, Primary publication, Publisher's Version

Earley, Timothy (2018)
Extending the Language Coverage of Side-Channel Finder AVR.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Ereth, Sarah ; Lortz, Steffen ; Perner, Matthias (2014)
Confidentiality for Android Apps: Specification and Verification.
In: it -- Information Technology, 56 (6)
Article, Bibliographie

Ereth, Sarah ; Mantel, Heiko ; Perner, Matthias (2014)
Towards a Common Specification Language for Information-Flow Security in RS3 and Beyond: RIFL 1.0 - The Language.
Report, Bibliographie

G

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
Article, Bibliographie

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018)
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
Conference or Workshop Item, Bibliographie

Gay, Richard (2017)
A Generic Framework for Enforcing Security in Distributed Systems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017)
Towards Accelerated Usage Control based on Access Correlations.
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
Conference or Workshop Item, Bibliographie

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017)
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item, Bibliographie

Gay, Richard ; Mantel, Heiko ; Sudbrock, Henning (2013)
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels.
Conference or Workshop Item, Bibliographie

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara
ed.: TU Darmstadt (2011)
Service Automata.
Conference or Workshop Item, Bibliographie

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010)
Service Automata for Secure Distributed Systems.
Other, Bibliographie

Gay, Richard (2008)
Interrupt-Related Covert Channels from an Attacker's Perspective.
Rheinisch-Westfälische Technische Hochschule Aachen
Master Thesis, Bibliographie

Gay, Richard (2008)
Interrupt-Related Covert Channels from an Attacker's Perspective.
Rheinisch-Westfälische Technische Hochschule Aachen
Master Thesis, Bibliographie

H

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich (2017)
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
Report, Bibliographie

Hu, Jinwei ; Mantel, Heiko ; Ruhleder, Sebastian (2015)
Enforcing Usage Constraints on Credentials for Web Applications.
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC 2015).
Conference or Workshop Item, Bibliographie

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max (2012)
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.-10.05.2012)
doi: 10.1145/2208276.2208328
Conference or Workshop Item, Bibliographie

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max (2012)
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.-10.05.2012)
doi: 10.1145/2212776.2223828
Conference or Workshop Item, Bibliographie

Huber, Jochen ; Ding, Yun (2012)
Adapting Web Pages Using Graph Partitioning Algorithms for User-Centric Multi-Device Web Browsing.
In: Springer Multimedia Tools and Applications, 51 (3)
doi: 10.1007/s11042-011-0980-1
Article, Bibliographie

Huber, Jochen ; Steimle, Jürgen ; Lissermann, Roman ; Olberding, Simon ; Mühlhäuser, Max (2010)
Wipe'n'Watch: Spatial Interaction Techniques for Interrelated Video Collections on Mobile Devices.
24th BCS Interaction Specialist Group Conference. Dundee, United Kingdom (06.-10.09.2010)
Conference or Workshop Item, Bibliographie

Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2010)
Interaction Techniques for Mobile E-Lectures.
Atlanta, GA, USA
Conference or Workshop Item, Bibliographie

Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2010)
Mobile Interaction Techniques for Interrelated Videos.
Atlanta, USA
doi: 10.1145/1753846.1754014
Conference or Workshop Item, Bibliographie

Hutter, Dieter ; Mantel, Heiko ; Schaefer, Ina ; Schairer, Axel (2007)
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic
Article, Bibliographie

Hutter, Dieter ; Mantel, Heiko ; Schaefer, Ina ; Schairer, Axel (2007)
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In: Journal of Applied Logic
Article, Bibliographie

Hutter, Dieter ; Mantel, Heiko ; Rock, Georg ; Stephan, Werner ; Wolpers, Andreas ; Balser, Michael ; Reif, Wolfgang ; Schellhorn, Gerhard ; Stenzel, Kurt (1998)
VSE: Controlling the Complexity in Formal Software Developments.
Conference or Workshop Item, Bibliographie

Hutter, Dieter ; Mantel, Heiko ; Rock, Georg ; Stephan, Werner ; Wolpers, Andreas ; Balser, Michael ; Reif, Wolfgang ; Schellhorn, Gerhard ; Stenzel, Kurt (1998)
VSE: Controlling the Complexity in Formal Software Developments.
Conference or Workshop Item, Bibliographie

J

Jakobs, Marie-Christine ; Mantel, Heiko
eds.: Margaria, Tiziana ; Steffen, Bernhard (2020)
A Unifying Framework for Dynamic Monitoring and a Taxonomy of Optimizations.
9th International Symposium on Leveraging Applications of Formal Methods (ISoLA 2020). virtual Conference (20.-30.10.)
doi: 10.1007/978-3-030-61470-6_6
Conference or Workshop Item, Bibliographie

K

Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max (2012)
Occlusion-aware Interaction Techniques for Tabletop Systems.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.-10.05.2012)
doi: 10.1145/2212776.2223831
Conference or Workshop Item, Bibliographie

Kiemes, Tom ; Novelli, Francesco ; Oberle, Daniel
eds.: Barros, Alistair ; Oberle, Daniel (2011)
Service Pricing.
In: Handbook of Service Description
Book Section, Bibliographie

Khalilbeigi, Mohammadreza ; Steimle, Jürgen ; Mühlhäuser, Max (2010)
Interaction techniques for hybrid piles of documents on interactive tabletops.
Atlanta, Georgia, USA
doi: 10.1145/1753846.1754083
Conference or Workshop Item, Bibliographie

Kraußer, Tina ; Mantel, Heiko ; Sudbrock, Henning (2007)
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
Report, Bibliographie

Köpf, Boris ; Mantel, Heiko (2007)
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS)
Article, Bibliographie

Köpf, Boris ; Mantel, Heiko (2007)
Transformational Typing and Unification for Automatically Correcting Insecure Programs.
In: International Journal of Information Security (IJIS)
Article, Bibliographie

Krausser, Tina ; Mantel, Heiko ; Sudbrock, Henning (2007)
A Probabilistic Justification of the Combining Calculus under the Uniform Scheduler Assumption.
Report, Bibliographie

Köpf, Boris ; Mantel, Heiko
eds.: Dimitrakos, Theodosis ; Martinelli, Fabio ; Ryan, Peter Y. A. ; Schneider, Steve (2006)
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Conference or Workshop Item, Bibliographie

Köpf, Boris ; Mantel, Heiko
eds.: Dimitrakos, Theodosis ; Martinelli, Fabio ; Ryan, Heiko Y. A. ; Schneider, Steve (2006)
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Conference or Workshop Item, Bibliographie

Köpf, Boris ; Mantel, Heiko (2005)
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Conference or Workshop Item, Bibliographie

Köpf, Boris ; Mantel, Heiko (2005)
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Report, Bibliographie

Köpf, Boris ; Mantel, Heiko (2005)
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Conference or Workshop Item, Bibliographie

Köpf, Boris ; Mantel, Heiko (2005)
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Report, Bibliographie

Kreitz, Christoph ; Mantel, Heiko (2004)
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32
Article, Bibliographie

Kreitz, Christoph ; Mantel, Heiko (2004)
A Matrix Characterization for Multiplicative Exponential Linear Logic.
In: Automated Reasoning (JAR), Kluwer, 32
Article, Bibliographie

Kreitz, Christoph ; Mantel, Heiko (2000)
A Matrix Characterization for Multiplicative Exponential Linear Logic.
Report, Bibliographie

Kreitz, Christoph ; Mantel, Heiko (2000)
A Matrix Characterization for Multiplicative Exponential Linear Logic.
Report, Bibliographie

Kreitz, Christoph ; Mantel, Heiko ; Otten, Jens ; Schmitt, Stephan
ed.: McCune, William (1997)
Connection-Based Proof Construction in Linear Logic.
Conference or Workshop Item, Bibliographie

L

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018)
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94
Article, Bibliographie

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva (2017)
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
Report, Bibliographie

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017)
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
Conference or Workshop Item, Bibliographie

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Bähr, Timo ; Schneider, David (2014)
Cassandra: Towards a Certifying App Store.
Report, Bibliographie

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Weber, Alexandra (2014)
A Sound Information-Flow Analysis for Cassandra.
Report, Bibliographie

Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem ; Bähr, Timo ; Schneider, David ; Weber, Alexandra (2014)
Cassandra: Towards a Certifying App Store for Android.
Conference or Workshop Item, Bibliographie

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Nanayakkara, Suranga ; Mühlhäuser, Max (2014)
EarPut: Augmenting Ear-worn Devices for Ear-based Interaction.
doi: 10.1145/2686612.2686655
Conference or Workshop Item, Bibliographie

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias (2012)
Scheduler-independent Declassifification.
Report, Bibliographie

Lux, Alexander ; Starostin, Artem (2011)
A Tool for Static Detection of Timing Channels in Java.
Conference or Workshop Item, Bibliographie

Lux, Alexander ; Starostin, Artem (2010)
Side Channel Finder (Version 1.0).
Other, Bibliographie

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem (2010)
Side Channel Finder (Version 1.0).
Report, Bibliographie

Lortz, Steffen (2009)
Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten.
Other, Bibliographie

Lux, Alexander ; Mantel, Heiko
eds.: Backes, Michael ; Ning, Peng (2009)
Declassification with Explicit Reference Points.
Conference or Workshop Item, Bibliographie

Lux, Alexander ; Mantel, Heiko
eds.: Degano, P. ; Guttman, J. ; Martinelli, F. (2009)
Who Can Declassify?
Conference or Workshop Item, Bibliographie

Lux, Alexander ; Mantel, Heiko (2008)
Who can declassify?
Conference or Workshop Item, Bibliographie

M

Mantel, Heiko ; Weber, Alexandra (2021)
Towards Leakage Bounds for Side Channels based on Caches and Pipelined Executions.
doi: 10.26083/tuprints-00019755
Report, Primary publication, Publisher's Version

Mantel, Heiko ; Weißmantel, Tim ; Fischlin, Marc ; Weber, Alexandra (2021)
A Comparative Study of Cache Side Channels across AES Implementations and Modes of Operation.
doi: 10.26083/tuprints-00019753
Report, Primary publication, Publisher's Version

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020)
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20). virtual Conference (14.-16.12.)
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Probst, Christian (2019)
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF). Hoboken, NJ, USA (Jun 25, 2019 - Jun 28, 2019)
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018)
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2017)
Vulnerabilities Introduced by Features for Software-based Energy Measurement.
Report, Bibliographie

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017)
A Systematic Study of Cache Side Channels across AES Implementations.
Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Starostin, Artem (2015)
Transforming Out Timing Leaks, More or Less.
Vienna, Austria
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Perner, Matthias ; Sauer, Jens (2014)
Noninterference under Weak Memory Models (Progress Report).
Report, Bibliographie

Mantel, Heiko ; Sands, David ; Sudbrock, Henning (2011)
Assumptions and Guarantees for Compositional Noninterference.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning (2010)
Flexible Scheduler-independent Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning
eds.: Degano, P. ; Guttman, J. ; Martinelli, F. (2009)
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning (2009)
Increasing the Precision of the Combining Calculus (Extended Abstract).
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning (2009)
Increasing the Precision of the Combining Calculus (Extended Abstract).
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning
eds.: Degano, P. ; Guttman, J. ; Martinelli, F. (2009)
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning
eds.: Degano, P. ; Guttman, J. ; Martinelli, F. (2009)
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Conference or Workshop Item, Bibliographie

Molter, Hans Gregor ; Shao, Hui ; Sudbrock, Henning ; Huss, Sorin A. ; Mantel, Heiko (2008)
Designing a Coprocessor for Interrupt Handling on an FPGA.
Report, Bibliographie

Mantel, Heiko ; Sudbrock, Henning (2008)
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning (2008)
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels.
Conference or Workshop Item, Bibliographie

Molter, Gregor ; Shao, Hui ; Sudbrock, Henning ; Huss, Sorin ; Mantel, Heiko (2008)
Designing a Coprocessor for Interrupt Handling on an FPGA.
Report, Bibliographie

Mantel, Heiko ; Sudbrock, Henning ; Kraußer, Tina
ed.: Puebla, German (2007)
Combining Different Proof Techniques for Verifying Information Flow Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Reinhard, Alexander
ed.: Nicola, Rocco De (2007)
Controlling the What and Where of Declassification in Language-Based Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning ; Krausser, Tina
ed.: Puebla, Germán (2007)
Combining Different Proof Techniques for Verifying Information Flow Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning (2007)
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Reinhard, Alexander
ed.: Nicola, Rocco De (2007)
Controlling the What and Where of Declassification in Language-Based Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning ; Kraußer, Tina
ed.: Puebla, German (2006)
Combining Different Proof Techniques for Verifying Information Flow Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sudbrock, Henning ; Krausser, Tina
ed.: Puebla, Germán (2006)
Combining Different Proof Techniques for Verifying Information Flow Security.
Conference or Workshop Item, Bibliographie

Mantel, Heiko (2005)
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Schairer, Axel (2005)
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning
Book Section, Bibliographie

Mantel, Heiko ; Schairer, Axel (2005)
Exploiting Generic Aspects of Security Models in Formal Developments.
In: Mechanizing Mathematical Reasoning
Book Section, Bibliographie

Mantel, Heiko (2005)
The Framework of Selective Interleaving Functions and the Modular Assembly Kit.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sands, David (2004)
Controlled Declassification based on Intransitive Noninterference.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sands, David (2004)
Controlled Declassification based on Intransitive Noninterference.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sabelfeld, Andrei (2003)
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4)
Article, Bibliographie

Mantel, Heiko ; Sabelfeld, Andrei (2003)
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs.
In: Journal of Computer Security (JCS), 11 (4)
Article, Bibliographie

Mantel, Heiko (2003)
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Mantel, Heiko (2002)
On the Composition of Secure Systems.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Schairer, Axel ; Kabatnik, Matthias ; Kreutzer, Michael ; Zugenmaier, Alf (2001)
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
Report, Bibliographie

Mantel, Heiko ; Sabelfeld, Andrei (2001)
A Generic Approach to the Security of Multi-threaded Programs.
Conference or Workshop Item, Bibliographie

Mantel, Heiko (2001)
Preserving Information Flow Properties under Refinement.
Conference or Workshop Item, Bibliographie

Mantel, Heiko
eds.: Olivera, Jose Nuno ; Zave, Pamela (2001)
Information Flow Control and Applications - Bridging a Gap.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Sabelfeld, Andrei (2001)
A Generic Approach to the Security of Multi-threaded Programs.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Schairer, Axel ; Kabatnik, Matthias ; Kreutzer, Michael ; Zugenmaier, Alf (2001)
Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks.
Report, Bibliographie

Mantel, Heiko
eds.: Olivera, Jose Nuno ; Zave, Pamela (2001)
Information Flow Control and Applications -- Bridging a Gap.
Conference or Workshop Item, Bibliographie

Mantel, Heiko (2001)
Preserving Information Flow Properties under Refinement.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Gärtner, Felix (2000)
A Case Study in the Mechanical Verification of Fault Tolerance.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Gärtner, Felix (2000)
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4)
Article, Bibliographie

Mantel, Heiko (2000)
Unwinding Possibilistic Security Properties.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Gärtner, Felix (2000)
A Case Study in the Mechanical Verification of Fault Tolerance.
Conference or Workshop Item, Bibliographie

Mantel, Heiko (2000)
A new framework for possibilistic security - A summary - ABSTRACT.
Report, Bibliographie

Mantel, Heiko ; Gärtner, Felix (2000)
A Case Study in the Mechanical Verification of Fault Tolerance.
In: Journal of Experimental and Theoretical Artificial Intelligence (JETAI), 12 (4)
Article, Bibliographie

Mantel, Heiko (2000)
A new framework for possibilistic security - A summary - ABSTRACT.
Report, Bibliographie

Mantel, Heiko (2000)
Possibilistic Definitions of Security -- An Assembly Kit.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Otten, Jens
ed.: Murray, Neil V. (1999)
linTAP: A Tableau Prover for Linear Logic.
Conference or Workshop Item, Bibliographie

Mantel, Heiko ; Gärtner, Felix (1999)
A Case Study in the Mechanical Verification of Fault Tolerance.
Report, Bibliographie

Mantel, Heiko ; Gärtner, Felix (1999)
A Case Study in the Mechanical Verification of Fault Tolerance.
Report, Bibliographie

Mantel, Heiko ; Kreitz, Christoph
eds.: Dix, Jürgen ; del Cerro, Luis Farinas ; Furbach, Ulrich (1998)
A Matrix Characterization for MELL.
In: Logics in Artificial Intelligence, European Workshop, JELIA '98 : Proceedings
Book Section, Bibliographie

Mantel, Heiko (1998)
Developing a Matrix Characterization for MELL.
Report, Bibliographie

Mantel, Heiko ; Sandner, Enno (1997)
A Framework for Connection Calculi.
Report, Bibliographie

Mantel, Heiko (1996)
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Technische Hochschule Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Mantel, Heiko (1996)
Eine Matrixcharakterisierung für ein Fragment der Linearen Logik.
Technische Hochschule Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

N

Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Weber, Alexandra ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2018)
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.
Report, Bibliographie

P

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017)
Slow TCAM Exhaustion DDoS Attack.
Conference or Workshop Item, Bibliographie

Perner, Matthias (2008)
Information Flow Analysis for CIL.
Other, Bibliographie

R

Reinhard, Alexander (2006)
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
Rheinisch-Westfälische Technische Hochschule Aachen
Master Thesis, Bibliographie

Reinhard, Alexander (2006)
Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken.
Rheinisch-Westfälische Technische Hochschule Aachen
Master Thesis, Bibliographie

S

Schmitz, Martin (2016)
Exploring 3D Printed Interaction.
Eindhoven, Netherlands
doi: 10.1145/2839462.2854105
Conference or Workshop Item, Bibliographie

Schmitz, Martin ; Khalilbeigi, Mohammadreza ; Balwierz, Matthias ; Lissermann, Roman ; Steimle, Jürgen ; Mühlhäuser, Max (2015)
Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
Charlotte, NC, USA
doi: 10.1145/2807442.2807503
Conference or Workshop Item, Bibliographie

Sudbrock, Henning (2013)
Compositional and Scheduler-Independent Information Flow Security.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Steimle, Jürgen ; Huber, Jochen ; Lukosch, Stephan
eds.: Mühlhäuser, Max ; Sesink, Werner ; Kaminski, Andreas ; Steimle, Jürgen (2011)
Disruptive User Interfaces for Technology-enhanced Learning: a Taxonomy”.
In: IATEL : interdisciplinary approaches to technology-enhanced learning
Book Section, Bibliographie

Schneider, Timo (2008)
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.
Other, Bibliographie

Sabelfeld, Andrei ; Mantel, Heiko (2002)
Static Confidentiality Enforcement for Distributed Programs.
Conference or Workshop Item, Bibliographie

Sabelfeld, Andrei ; Mantel, Heiko (2002)
Static Confidentiality Enforcement for Distributed Programs.
Conference or Workshop Item, Bibliographie

W

Weber, Alexandra (2022)
Semantics-Based Cache-Side-Channel Quantification in Cryptographic Implementations.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021208
Ph.D. Thesis, Primary publication, Publisher's Version

Weber, Alexandra ; Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2021)
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography.
26th European Symposium on Research in Computer Security (ESORICS). virtual Conference (04.-08.2021)
Conference or Workshop Item, Bibliographie

Wachsmann, Christian (2014)
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

This list was generated on Sun May 19 00:49:18 2024 CEST.