Items where Subject is "Cross Cutting Thrusts [OLD] > Threat Analysis and Modeling"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 8.

Conference or Workshop Item

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS - Network and Distributed System Security Symposium

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence


Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

Tombers, Stefan
(2011) Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment.
Bachelors thesis, Saarland University.


Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006) On the Necessity of Rewinding in Secure Multiparty Computation.

This list was generated on Fri Jul 10 00:02:25 2020 CEST.