Marcel Winandy
According to our database1,
Marcel Winandy
authored at least 39 papers
between 2002 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
2016
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2014
J. Netw. Comput. Appl., 2014
2012
Security and trust architectures for protecting sensitive data on commodity computing platforms.
PhD thesis, 2012
Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen und Lösungsansätze.
Datenschutz und Datensicherheit, 2012
Proceedings of the ISSE 2012, 2012
Proceedings of the ACM International Health Informatics Symposium, 2012
2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011
Proceedings of the Biomedical Engineering Systems and Technologies, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the ACM International Health Informatics Symposium, 2010
Proceedings of the Electronic Healthcare - Third International Conference, 2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the ARES 2010, 2010
2009
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the ISSE 2006, 2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
2005
Multilateral security considerations for adaptive mobile applications.
Proceedings of the ICETE 2005, 2005
Proceedings of the Software Architecture, 2nd European Workshop, 2005
2003
A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2002
Protecting Java Component Integrity Against Trojan Horse Programs.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002