Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Marcel Winandy
2010 – today
- 2013
[e1]John Lyle, Shamal Faily, Marcel Winandy (Eds.): Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), London, United Kingdom, June 20, 2013. CEUR Workshop Proceedings 1011, CEUR-WS.org 2013- 2012
[j2]Marcel Winandy: Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen und Lösungsansätze. Datenschutz und Datensicherheit 36(6): 419-424 (2012)
[c29]Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy: Flexible patient-controlled security for electronic health records. IHI 2012: 727-732- 2011
[c28]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi: A Security Architecture for Accessing Health Records on Mobile Phones. HEALTHINF 2011: 87-96
[c27]Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy: ROPdefender: a detection tool to defend against return-oriented programming attacks. ASIACCS 2011: 40-51
[c26]Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy: Uni-directional trusted path: Transaction confirmation on just one device. DSN 2011: 1-12- 2010
[j1]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010)
[c25]Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy: Patterns for Secure Boot and Secure Storage in Computer Systems. ARES 2010: 569-573
[c24]Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy: Return-oriented programming without returns. ACM Conference on Computer and Communications Security 2010: 559-572
[c23]Marcel Winandy: A Note on the Security in the Card Management System of the German E-Health Card. eHealth 2010: 196-203
[c22]
[c21]Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy: TruWalletM: Secure Web Authentication on Mobile Platforms. INTRUST 2010: 219-236
[c20]Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy: Privilege Escalation Attacks on Android. ISC 2010: 346-360
[c19]Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy: Token-Based Cloud Computing. TRUST 2010: 417-429
2000 – 2009
- 2009
[c18]Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy: TruWallet: trustworthy and migratable wallet-based web authentication. STC 2009: 19-28
[c17]Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy: Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. STC 2009: 49-54
[c16]Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy: A Pattern for Secure Graphical User Interface Systems. DEXA Workshops 2009: 186-190
[c15]Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy: Software distribution as a malware infection vector. ICITST 2009: 1-6
[c14]Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan: Trusted Virtual Domains - Design, Implementation and Lessons Learned. INTRUST 2009: 156-179
[c13]Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy: Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407
[c12]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy: Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172
[c11]Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62- 2008
[c10]Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble: Flexible and secure enterprise rights management based on trusted virtual domains. STC 2008: 71-80
[c9]Yacine Gasmi, Christian Hessmann, Martin Pittenauer, Marcel Winandy: Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis. GI Jahrestagung (1) 2008: 411-416
[c8]Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Property-Based TPM Virtualization. ISC 2008: 1-16- 2007
[c7]Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127- 2006
[c6]Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy: TCG inside?: a note on TPM specification compliance. STC 2006: 47-56
[c5]Ammar Alkassar, Michael Scheibel, Michael Stübel, Ahmad-Reza Sadeghi, Marcel Winandy: Security Architecture for Device Encryption and VPN. ISSE 2006: 54-63- 2005
[c4]Holger Mügge, Tobias Rho, Marcel Winandy, Markus Won, Armin B. Cremers, Pascal Costanza, Roman Englert: Towards Context-Sensitive Intelligence. EWSA 2005: 231-238
[c3]Adrian Spalka, Armin B. Cremers, Marcel Winandy: Multilateral security considerations for adaptive mobile applications. ICETE 2005: 133-137- 2003
[c2]Adrian Spalka, Marcel Winandy: A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks. COMPSAC 2003: 158-163- 2002
[c1]Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka: Protecting Java Component Integrity Against Trojan Horse Programs. IICIS 2002: 99-113
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:16 CEST by the dblp team



