Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
hal_authIdPerson_i : 1003788
Image document

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

Daniel Schreckling , Stephan Huber , Focke Höhne , Joachim Posegga
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers hal-01485933v1

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

Pierangela Samarati , Michael Tunstall , Joachim Posegga , Konstantinos Markantonakis , Damien Sauveron
Springer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books hal-01550529v1

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems

Ioannis Askoxylakis , Henrich C. Pöhls , Joachim Posegga
Springer, LNCS-7322, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30955-7⟩
Books hal-01534316v1
Image document

Malleable Signatures for Resource Constrained Platforms

Henrich C. Pöhls , Stefan Peters , Kai Samelin , Joachim Posegga , Hermann De Meer
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, ⟨10.1007/978-3-642-38530-8_2⟩
Conference papers hal-01485931v1
Image document

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

Daniel Schreckling , Joachim Posegga , Johannes Köstler , Matthias Schaff
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.208-223, ⟨10.1007/978-3-642-30955-7_18⟩
Conference papers hal-01534306v1