Access control in data processing system TR Gross, G Karjoth US Patent 8,875,224, 2014 | 227 | 2014 |
Security analysis of the SAML single sign-on browser/artifact profile T Groß 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 226 | 2003 |
User centricity: a taxonomy and open issues A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer Proceedings of the second ACM workshop on Digital identity management, 1-10, 2006 | 211 | 2006 |
Efficient attributes for anonymous credentials J Camenisch, T Groß ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-30, 2012 | 205 | 2012 |
Anonymous credentials on a standard java card P Bichsel, J Camenisch, T Groß, V Shoup Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 204 | 2009 |
Cryptographic encoding and decoding of secret data JL Camenisch, TR Gross, TS Heydt-Benjamin US Patent 8,744,077, 2014 | 92 | 2014 |
Credential authenticated identification and key exchange J Camenisch, N Casati, T Groß, V Shoup Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 62 | 2010 |
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures S Bleikertz, C Vogel, T Groß Proceedings of the 30th annual computer security applications conference, 26-35, 2014 | 58 | 2014 |
Attributes in cryptographic credentials JL Camenisch, TR Gross US Patent 8,281,131, 2012 | 55 | 2012 |
Browser model for security analysis of browser-based protocols T Groß, B Pfitzmann, AR Sadeghi Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 55 | 2005 |
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers B Arief, MAB Adzmi, T Gross IEEE Security & Privacy 13 (1), 71-76, 2015 | 53 | 2015 |
Proactive security analysis of changes in virtualized infrastructures S Bleikertz, C Vogel, T Groß, S Mödersheim Proceedings of the 31st annual computer security applications conference, 51-60, 2015 | 52 | 2015 |
Why privacy is all but forgotten KPL Coopamootoo, T Groß Proceedings on Privacy Enhancing Technologies, 2017 | 45 | 2017 |
Method, system, and computer program product for virtual world access control management A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer US Patent App. 12/062,066, 2009 | 44 | 2009 |
Defense-in-depth against malicious insiders in the cloud F Rocha, T Gross, A Van Moorsel 2013 IEEE International Conference on Cloud Engineering (IC2E), 88-97, 2013 | 43 | 2013 |
Automated information flow analysis of virtualized infrastructures S Bleikertz, T Groß, M Schunter, K Eriksson Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 43 | 2011 |
Vertical protocol composition T Groß, S Modersheim 2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011 | 41 | 2011 |
Cryptographic proofs in data processing systems JL Camenisch, TR Gross, TS Heydt-Benjamin US Patent 8,527,777, 2013 | 38 | 2013 |
A virtualization assurance language for isolation and deployment S Bleikertz, T Groß 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 38 | 2011 |
Validity and reliability of the scale internet users’ information privacy concerns (iuipc) T Groß Proceedings on Privacy Enhancing Technologies, 2021 | 35 | 2021 |