The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marcel Winandy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Adrian Spalka, Marcel Winandy
    A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:158-163 [Conf]
  2. Holger Mügge, Tobias Rho, Marcel Winandy, Markus Won, Armin B. Cremers, Pascal Costanza, Roman Englert
    Towards Context-Sensitive Intelligence. [Citation Graph (0, 0)][DBLP]
    EWSA, 2005, pp:231-238 [Conf]
  3. Adrian Spalka, Armin B. Cremers, Marcel Winandy
    Multilateral security considerations for adaptive mobile applications. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:133-137 [Conf]
  4. Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka
    Protecting Java Component Integrity Against Trojan Horse Programs. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:99-113 [Conf]

  5. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]


  6. Patterns for Secure Boot and Secure Storage in Computer Systems. [Citation Graph (, )][DBLP]


  7. Flexible and secure enterprise rights management based on trusted virtual domains. [Citation Graph (, )][DBLP]


  8. TCG inside?: a note on TPM specification compliance. [Citation Graph (, )][DBLP]


  9. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. [Citation Graph (, )][DBLP]


  10. TruWallet: trustworthy and migratable wallet-based web authentication. [Citation Graph (, )][DBLP]


  11. A Pattern for Secure Graphical User Interface Systems. [Citation Graph (, )][DBLP]


  12. Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis. [Citation Graph (, )][DBLP]


  13. Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. [Citation Graph (, )][DBLP]


  14. Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]


  15. Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]


  16. Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. [Citation Graph (, )][DBLP]


  17. Token-Based Cloud Computing. [Citation Graph (, )][DBLP]


  18. Security Architecture for Device Encryption and VPN. [Citation Graph (, )][DBLP]


  19. Trusted Virtual Domains - Design, Implementation and Lessons Learned. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002