Items where Subject is "Cross Cutting Thrusts [OLD] > Threat Analysis and Modeling"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | D | G | H | M | S | T
Number of items at this level: 8.

B

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006) On the Necessity of Rewinding in Secure Multiparty Computation.
UNSPECIFIED
.

D

Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

G

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

H

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019).
Conference: NDSS - Network and Distributed System Security Symposium

M

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

S

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

T

Tombers, Stefan
(2011) Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment.
Bachelors thesis, Saarland University.

This list was generated on Sat May 25 00:02:28 2019 CEST.