|
Search the dblp DataBase
Marcel Winandy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Adrian Spalka, Marcel Winandy
A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:158-163 [Conf]
- Holger Mügge, Tobias Rho, Marcel Winandy, Markus Won, Armin B. Cremers, Pascal Costanza, Roman Englert
Towards Context-Sensitive Intelligence. [Citation Graph (0, 0)][DBLP] EWSA, 2005, pp:231-238 [Conf]
- Adrian Spalka, Armin B. Cremers, Marcel Winandy
Multilateral security considerations for adaptive mobile applications. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:133-137 [Conf]
- Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka
Protecting Java Component Integrity Against Trojan Horse Programs. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:99-113 [Conf]
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]
Patterns for Secure Boot and Secure Storage in Computer Systems. [Citation Graph (, )][DBLP]
Flexible and secure enterprise rights management based on trusted virtual domains. [Citation Graph (, )][DBLP]
TCG inside?: a note on TPM specification compliance. [Citation Graph (, )][DBLP]
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. [Citation Graph (, )][DBLP]
TruWallet: trustworthy and migratable wallet-based web authentication. [Citation Graph (, )][DBLP]
A Pattern for Secure Graphical User Interface Systems. [Citation Graph (, )][DBLP]
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis. [Citation Graph (, )][DBLP]
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. [Citation Graph (, )][DBLP]
Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]
Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. [Citation Graph (, )][DBLP]
Token-Based Cloud Computing. [Citation Graph (, )][DBLP]
Security Architecture for Device Encryption and VPN. [Citation Graph (, )][DBLP]
Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|