Follow
Thomas Groß
Thomas Groß
Professor of System Security, Newcastle University
Verified email at ncl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Access control in data processing system
TR Gross, G Karjoth
US Patent 8,875,224, 2014
2272014
Security analysis of the SAML single sign-on browser/artifact profile
T Groß
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2272003
User centricity: a taxonomy and open issues
A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer
Proceedings of the second ACM workshop on Digital identity management, 1-10, 2006
2152006
Efficient attributes for anonymous credentials
J Camenisch, T Groß
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-30, 2012
2102012
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2062009
Cryptographic encoding and decoding of secret data
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,744,077, 2014
942014
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Groß, V Shoup
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
622010
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures
S Bleikertz, C Vogel, T Groß
Proceedings of the 30th annual computer security applications conference, 26-35, 2014
602014
Attributes in cryptographic credentials
JL Camenisch, TR Gross
US Patent 8,281,131, 2012
582012
Browser model for security analysis of browser-based protocols
T Groß, B Pfitzmann, AR Sadeghi
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
572005
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
562015
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
542015
Validity and reliability of the scale internet users’ information privacy concerns (iuipc)
T Groß
Proceedings on Privacy Enhancing Technologies, 2021
512021
Why privacy is all but forgotten
KPL Coopamootoo, T Groß
Proceedings on Privacy Enhancing Technologies, 2017
482017
Defense-in-depth against malicious insiders in the cloud
F Rocha, T Gross, A Van Moorsel
2013 IEEE International Conference on Cloud Engineering (IC2E), 88-97, 2013
442013
Method, system, and computer program product for virtual world access control management
A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer
US Patent App. 12/062,066, 2009
442009
Automated information flow analysis of virtualized infrastructures
S Bleikertz, T Groß, M Schunter, K Eriksson
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
432011
Vertical protocol composition
T Groß, S Modersheim
2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011
422011
Cryptographic proofs in data processing systems
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,527,777, 2013
402013
A virtualization assurance language for isolation and deployment
S Bleikertz, T Groß
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
392011
The system can't perform the operation now. Try again later.
Articles 1–20