|
Search the dblp DataBase
Hanno Langweg:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hanno Langweg
With Gaming Technology towards Secure User Interfaces. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:44-50 [Conf]
- Adrian Spalka, Hanno Langweg
Protecting the User from the Data: Security and Privacy Aspects of Public Web Access. [Citation Graph (0, 0)][DBLP] AH, 2002, pp:440-443 [Conf]
- Adrian Spalka, Hanno Langweg
Notes on Application-Orientated Access Control. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:451-455 [Conf]
- Hanno Langweg
Sichere Benutzeroberflächen mittels DirektX. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:227-236 [Conf]
- Adrian Spalka, Armin B. Cremers, Hanno Langweg
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:403-420 [Conf]
- Hanno Langweg
Malware Attacks on Electronic Signatures Revisited. [Citation Graph (0, 0)][DBLP] Sicherheit, 2006, pp:244-255 [Conf]
- Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka
Protecting Java Component Integrity Against Trojan Horse Programs. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:99-113 [Conf]
- Adrian Spalka, Armin B. Cremers, Hanno Langweg
Trojan horse attacks on software for electronic signatures. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Hanno Langweg, Tommy Kristiansen
Extending the Trusted Path in Client-Server Interaction [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Framework for malware resistance metrics. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|