Günter Karjoth - Academia.edu (original) (raw)
Papers by Günter Karjoth
Formal Techniques for (Networked and) Distributed Systems, Nov 5, 1990
Lecture Notes in Computer Science, 2009
Journal of Computer Security, Jul 11, 2014
Computer and Communications Security, Oct 30, 2006
Springer eBooks, 2002
Computational Probabilistic Non-interference.- Bit-Slice Auction Circuit.- Confidentiality Polici... more Computational Probabilistic Non-interference.- Bit-Slice Auction Circuit.- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.- Cardinality-Based Inference Control in Sum-Only Data Cubes.- Outbound Authentication for Programmable Secure Coprocessors.- Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations.- Authentication for Distributed Web Caches.- Analysing a Stream Authentication Protocol Using Model Checking.- Equal To The Task?.- TINMAN: A Resource Bound Security Checking System for Mobile Code.- Confidentiality-Preserving Refinement is Compositional - Sometimes.- Formal Security Analysis with Interacting State Machines.- Decidability of Safety in Graph-Based Models for Access Control.- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.- Learning Fingerprints for a Database Intrusion Detection System.
Computer and Communications Security, 2006
International Journal of Distributed Sensor Networks, 2008