Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Andreas Schaad"'
Autor:
Andreas Schaad, Dominik Binder
Publikováno v:
Foundations and Practice of Security ISBN: 9783031301216
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::386ad2e626081202f3461c9162bbf391
https://doi.org/10.1007/978-3-031-30122-3_28
https://doi.org/10.1007/978-3-031-30122-3_28
Autor:
Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder
Publikováno v:
Foundations and Practice of Security ISBN: 9783031081460
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a50623a470d47d24ec3be765fb227bc4
https://doi.org/10.1007/978-3-031-08147-7_24
https://doi.org/10.1007/978-3-031-08147-7_24
Autor:
Andreas Schaad, Dominik Binder
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030913557
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d838fac85ead26d2a4e473970ad4fc78
https://doi.org/10.1007/978-3-030-91356-4_12
https://doi.org/10.1007/978-3-030-91356-4_12
Autor:
Dominik Binder, Andreas Schaad
Publikováno v:
Lecture Notes in Computer Science
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec)
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.274-285, ⟨10.1007/978-3-030-49669-2_16⟩
Data and Applications Security and Privacy XXXIV ISBN: 9783030496685
DBSec
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec)
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.274-285, ⟨10.1007/978-3-030-49669-2_16⟩
Data and Applications Security and Privacy XXXIV ISBN: 9783030496685
DBSec
Part 4: Visualization and Analytics for Security; International audience; Threat Modelling is an accepted technique to identify general threats as early as possible in the software development lifecycle. Previous work of ours did present an open-sour
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::931a19a8e18492fd84b35767e4d29108
https://hal.inria.fr/hal-03243644/document
https://hal.inria.fr/hal-03243644/document
Publikováno v:
SACMAT
Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of code. In traditional systems a secur
Publikováno v:
ICETE (2)
Blockchain frameworks enable the immutable storage of data. A still open practical question is the so called “oracle” problem, i.e. the way how real world data is actually transferred into and out of a blockchain while preserving its integrity. W
Autor:
Andreas Schaad, Tobias Reski
Publikováno v:
ICETE (2)
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appe
Publikováno v:
ICETE (2)
Publikováno v:
SECRYPT
Autor:
Andreas Schaad
Publikováno v:
Digitale Welt. 2:51-52