default search action
Marcel Winandy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
- [b1]Marcel Winandy:
Security and trust architectures for protecting sensitive data on commodity computing platforms. Ruhr University Bochum, Shaker 2012, ISBN 978-3-8440-1315-3, pp. 1-268
Journal Articles
- 2014
- [j3]Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A trusted versioning file system for passive mobile storage devices. J. Netw. Comput. Appl. 38: 65-75 (2014) - 2012
- [j2]Marcel Winandy:
Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen und Lösungsansätze. Datenschutz und Datensicherheit 36(6): 419-424 (2012) - 2010
- [j1]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Trusted virtual domains: Color your network. Datenschutz und Datensicherheit 34(5): 289-294 (2010)
Conference and Workshop Papers
- 2019
- [c35]Angelo Liguori, Peter Schoo, Marcel Winandy:
Mind the Shift: Secure Migration of Containerized Processes in Edge Computing. CSCloud/EdgeCom 2019: 204-209 - 2016
- [c34]Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. CODASPY 2016: 139-141 - 2012
- [c33]Thomas Hupperich, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Flexible patient-controlled security for electronic health records. IHI 2012: 727-732 - [c32]Michael Gröne, Marcel Winandy:
Applying a Security Kernel Framework to Smart Meter Gateways. ISSE 2012: 252-259 - 2011
- [c31]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A Security Architecture for Accessing Health Records on Mobile Phones. HEALTHINF 2011: 87-96 - [c30]Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Securing the Access to Electronic Health Records on Mobile Phones. BIOSTEC (Selected Papers) 2011: 365-379 - [c29]Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy:
ROPdefender: a detection tool to defend against return-oriented programming attacks. AsiaCCS 2011: 40-51 - [c28]Lucas Davi, Alexandra Dmitrienko, Christoph Kowalski, Marcel Winandy:
Trusted virtual domains on OKL4: secure information sharing on smartphones. STC@CCS 2011: 49-58 - [c27]Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy:
Uni-directional trusted path: Transaction confirmation on just one device. DSN 2011: 1-12 - 2010
- [c26]Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Patterns for Secure Boot and Secure Storage in Computer Systems. ARES 2010: 569-573 - [c25]Hans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy:
Trusted virtual domains on OpenSolaris: usable secure desktop environments. STC@CCS 2010: 91-96 - [c24]Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy:
Return-oriented programming without returns. CCS 2010: 559-572 - [c23]Marcel Winandy:
A Note on the Security in the Card Management System of the German E-Health Card. eHealth 2010: 196-203 - [c22]Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
Securing the e-health cloud. IHI 2010: 220-229 - [c21]Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWalletM: Secure Web Authentication on Mobile Platforms. INTRUST 2010: 219-236 - [c20]Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy:
Privilege Escalation Attacks on Android. ISC 2010: 346-360 - [c19]Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy:
Token-Based Cloud Computing. TRUST 2010: 417-429 - 2009
- [c18]Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWallet: trustworthy and migratable wallet-based web authentication. STC 2009: 19-28 - [c17]Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy:
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. STC 2009: 49-54 - [c16]Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy:
A Pattern for Secure Graphical User Interface Systems. DEXA Workshops 2009: 186-190 - [c15]Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy:
Software distribution as a malware infection vector. ICITST 2009: 1-6 - [c14]Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. INTRUST 2009: 156-179 - [c13]Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy:
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ISPEC 2009: 396-407 - [c12]Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy:
Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA 2009: 159-172 - [c11]Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy:
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. TRUST 2009: 45-62 - 2008
- [c10]Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble:
Flexible and secure enterprise rights management based on trusted virtual domains. STC 2008: 71-80 - [c9]Yacine Gasmi, Christian Hessmann, Martin Pittenauer, Marcel Winandy:
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis. GI Jahrestagung (1) 2008: 411-416 - [c8]Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Property-Based TPM Virtualization. ISC 2008: 1-16 - 2007
- [c7]Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127 - 2006
- [c6]Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy:
TCG inside?: a note on TPM specification compliance. STC 2006: 47-56 - [c5]Ammar Alkassar, Michael Scheibel, Michael Stübel, Ahmad-Reza Sadeghi, Marcel Winandy:
Security Architecture for Device Encryption and VPN. ISSE 2006: 54-63 - 2005
- [c4]Holger Mügge, Tobias Rho, Marcel Winandy, Markus Won, Armin B. Cremers, Pascal Costanza, Roman Englert:
Towards Context-Sensitive Intelligence. EWSA 2005: 231-238 - [c3]Adrian Spalka, Armin B. Cremers, Marcel Winandy:
Multilateral security considerations for adaptive mobile applications. ICETE 2005: 133-137 - 2003
- [c2]Adrian Spalka, Marcel Winandy:
A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks. COMPSAC 2003: 158-163 - 2002
- [c1]Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka:
Protecting Java Component Integrity Against Trojan Horse Programs. IICIS 2002: 99-113
Editorship
- 2013
- [e1]John Lyle, Shamal Faily, Marcel Winandy:
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), London, United Kingdom, June 20, 2013. CEUR Workshop Proceedings 1011, CEUR-WS.org 2013 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint