Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Market-Driven Code Provisioning to Mobile Secure Hardware., , , , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 387-404. Springer, (2015)Towards Modular and Flexible Access Control on Smart Mobile Devices.. Darmstadt University of Technology, Germany, (2016)Towards Permission-Based Attestation for the Android Platform - (Short Paper)., , , , , , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 108-115. Springer, (2011)Mobile Platform Security, , , , , , and . Synthesis Lectures on Information Security, Privacy, and Trust Morgan & Claypool Publishers, (2013)Phonion: Practical Protection of Metadata in Telephony Networks., , , , , , , , and . PoPETs, 2017 (1): 170-187 (2017)Digital Rights Management - Dealmaker for E-business?. WELCOM, volume 2232 of Lecture Notes in Computer Science, page 11-12. Springer, (2001)ASM: A Programmable Interface for Extending Android Security., , , and . USENIX Security Symposium, page 1005-1019. USENIX Association, (2014)Smart and Secure Cross-Device Apps for the Internet of Advanced Things., , , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 272-290. Springer, (2015)ConXsense: automated context classification for context-aware access control., , , , and . AsiaCCS, page 293-304. ACM, (2014)Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies., , and . USENIX Security Symposium, page 131-146. USENIX Association, (2013)