What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Groß
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2021
journals/popets
Validity and Reliability of the Scale Internet Users' Information Privacy Concerns (IUIPC).
Thomas Groß
2020
conf/asiacrypt
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System.
Syh-Yuan Tan
Thomas Groß
2017
journals/popets
Why Privacy Is All But Forgotten.
Kovila P. L. Coopamootoo
Thomas Groß
2016
conf/soups
Effect of Cognitive Effort on Password Choice.
Thomas Groß
Kovila P. L. Coopamootoo
Amina Al-Jabri
2015
conf/fc
Signatures and Efficient Proofs on Committed Graphs and NP-Statements.
Thomas Groß
2015
conf/acsac
Proactive Security Analysis of Changes in Virtualized Infrastructures.
Sören Bleikertz
Carsten Vogel
Thomas Groß
Sebastian Mödersheim
2014
conf/ccs
Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs.
Thomas Groß
2014
conf/acsac
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures.
Sören Bleikertz
Carsten Vogel
Thomas Groß
2013
conf/ccs
Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads.
Thomas Groß
Marit Hansen
2011
conf/ccs
Automated verification of virtualized infrastructures.
Sören Bleikertz
Thomas Groß
Sebastian Mödersheim
2011
conf/esorics
Automated Information Flow Analysis of Virtualized Infrastructures.
Sören Bleikertz
Thomas Groß
Matthias Schunter
Konrad Eriksson
2009
conf/ccs
Anonymous credentials on a standard java card.
Patrik Bichsel
Jan Camenisch
Thomas Groß
Victor Shoup
2008
conf/ccs
Efficient attributes for anonymous credentials.
Jan Camenisch
Thomas Groß
2005
conf/esorics
Browser Model for Security Analysis of Browser-Based Protocols.
Thomas Groß
Birgit Pfitzmann
Ahmad-Reza Sadeghi
2003
conf/acsac
Security Analysis of the SAML Single Sign-on Browser/Artifact Profile.
Thomas Groß
Coauthors
Ahmad-Reza Sadeghi
(1)
Amina Al-Jabri
(1)
Birgit Pfitzmann
(1)
Carsten Vogel
(2)
Jan Camenisch
(2)
Konrad Eriksson
(1)
Kovila P. L. Coopamootoo
(2)
Marit Hansen
(1)
Matthias Schunter
(1)
Patrik Bichsel
(1)
Sebastian Mödersheim
(2)
Sören Bleikertz
(4)
Syh-Yuan Tan
(1)
Thomas Groß
(15)
Victor Shoup
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to