Seguir
Thomas Groß
Thomas Groß
Professor of System Security, Newcastle University
Dirección de correo verificada de ncl.ac.uk - Página principal
Título
Citado por
Citado por
Año
Security analysis of the SAML single sign-on browser/artifact profile
T Groß
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2292003
Access control in data processing system
TR Gross, G Karjoth
US Patent 8,875,224, 2014
2272014
Efficient attributes for anonymous credentials
J Camenisch, T Groß
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-30, 2012
2222012
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2142009
User centricity: a taxonomy and open issues
A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer
Proceedings of the second ACM workshop on Digital identity management, 1-10, 2006
2142006
Cryptographic encoding and decoding of secret data
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,744,077, 2014
972014
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Groß, V Shoup
Annual Cryptology Conference, 255-276, 2010
642010
Attributes in cryptographic credentials
JL Camenisch, TR Gross
US Patent 8,281,131, 2012
612012
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures
S Bleikertz, C Vogel, T Groß
Proceedings of the 30th annual computer security applications conference, 26-35, 2014
602014
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
582015
Browser model for security analysis of browser-based protocols
T Groß, B Pfitzmann, AR Sadeghi
European Symposium on Research in Computer Security, 489-508, 2005
582005
Validity and reliability of the scale internet users’ information privacy concerns (iuipc)
T Groß
Proceedings on Privacy Enhancing Technologies, 2021
572021
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
542015
Why privacy is all but forgotten
KPL Coopamootoo, T Groß
Proceedings on Privacy Enhancing Technologies, 2017
522017
Method, system, and computer program product for virtual world access control management
A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer
US Patent App. 12/062,066, 2009
442009
Defense-in-depth against malicious insiders in the cloud
F Rocha, T Gross, A Van Moorsel
2013 IEEE International Conference on Cloud Engineering (IC2E), 88-97, 2013
422013
Vertical protocol composition
T Groß, S Modersheim
2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011
422011
Automated information flow analysis of virtualized infrastructures
S Bleikertz, T Groß, M Schunter, K Eriksson
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
422011
Cryptographic proofs in data processing systems
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,527,777, 2013
412013
A virtualization assurance language for isolation and deployment
S Bleikertz, T Groß
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
392011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20