Thomas Groß
Thomas Groß
Lecturer Security, Privacy and Trust, University of Newcastle upon Tyne
Geverifieerd e-mailadres voor
Geciteerd door
Geciteerd door
Access control in data processing system
TR Gross, G Karjoth
US Patent 8,875,224, 2014
Security analysis of the SAML single sign-on browser/artifact profile
T Groß
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
User centricity: a taxonomy and open issues
A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer
Journal of Computer Security 15 (5), 493-527, 2007
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Efficient attributes for anonymous credentials
J Camenisch, T Groß
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Cryptographic encoding and decoding of secret data
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,744,077, 2014
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Groß, V Shoup
Annual Cryptology Conference, 255-276, 2010
Browser model for security analysis of browser-based protocols
T Groß, B Pfitzmann, AR Sadeghi
European Symposium on Research in Computer Security, 489-508, 2005
Automated information flow analysis of virtualized infrastructures
S Bleikertz, T Groß, M Schunter, K Eriksson
European Symposium on Research in Computer Security, 392-415, 2011
A virtualization assurance language for isolation and deployment
S Bleikertz, T Groß
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
Method, system, and computer program product for virtual world access control management
A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer
US Patent App. 12/062,066, 2009
Vertical protocol composition
T Groß, S Modersheim
2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011
Attributes in cryptographic credentials
JL Camenisch, TR Gross
US Patent 8,281,131, 2012
SAML artifact information flow revisited
T Groß, B Pfitzmann
In IEEE Workshop on Web Services Security (WSSS), 84-100, 2006
Tailoring the dolev-yao abstraction to web services realities
M Backes, T Groβ
Proceedings of the 2005 workshop on Secure web services, 65-74, 2005
Cryptographic protocols of the identity mixer library
P Bichsel, C Binding, J Camenisch, T Groß, T Heydt-Benjamin, D Sommer, ...
Tech. Rep. RZ 3730, Tech. Rep., 2009
Rethinking accountable privacy supporting services
J Camenisch, T Groß, TS Heydt-Benjamin
Proceedings of the 4th ACM workshop on Digital identity management, 1-8, 2008
Tag identification system
M Backes, TR Gross, G Karjoth
US Patent 8,009,016, 2011
Proving a WS-Federation passive requestor profile
T Groß, B Pfitzmann
Proceedings of the 2004 workshop on Secure web service, 77-86, 2004
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20