Seguir
Thomas Groß
Thomas Groß
Professor of System Security, Newcastle University
Dirección de correo verificada de ncl.ac.uk - Página principal
Título
Citado por
Citado por
Año
Access control in data processing system
TR Gross, G Karjoth
US Patent 8,875,224, 2014
2272014
Security analysis of the SAML single sign-on browser/artifact profile
T Groß
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2242003
User centricity: a taxonomy and open issues
A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer
Proceedings of the second ACM workshop on Digital identity management, 1-10, 2006
2092006
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2042009
Efficient attributes for anonymous credentials
J Camenisch, T Groß
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-30, 2012
2032012
Cryptographic encoding and decoding of secret data
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,744,077, 2014
912014
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Groß, V Shoup
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
622010
Transaction auditing for data security devices
P Bichsel, JL Camenisch, TR Gross
US Patent 8,688,988, 2014
602014
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures
S Bleikertz, C Vogel, T Groß
Proceedings of the 30th annual computer security applications conference, 26-35, 2014
592014
Browser model for security analysis of browser-based protocols
T Groß, B Pfitzmann, AR Sadeghi
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
562005
Attributes in cryptographic credentials
JL Camenisch, TR Gross
US Patent 8,281,131, 2012
542012
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
502015
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
492015
Why privacy is all but forgotten
KPL Coopamootoo, T Groß
Proceedings on Privacy Enhancing Technologies, 2017
442017
Method, system, and computer program product for virtual world access control management
A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer
US Patent App. 12/062,066, 2009
442009
Defense-in-depth against malicious insiders in the cloud
F Rocha, T Gross, A Van Moorsel
2013 IEEE International Conference on Cloud Engineering (IC2E), 88-97, 2013
432013
Automated information flow analysis of virtualized infrastructures
S Bleikertz, T Groß, M Schunter, K Eriksson
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
432011
Vertical protocol composition
T Groß, S Modersheim
2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011
412011
Cryptographic proofs in data processing systems
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,527,777, 2013
382013
A virtualization assurance language for isolation and deployment
S Bleikertz, T Groß
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
382011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20