Loading...
Images of Marcel Winandy
(0 from 0 )Unique persons
Network Profiles
LinkedIn: Marcel Winandy | LinkedIn
largest business network, helping professionals like Marcel Winandy discover ...
Twitter Profile: Marcel Winandy (mwinandy)
Location: Germany / Postdoc Researcher at Ruhr-University Bochum and Senior System Architect at Sirrix AG, Germany. I design and analyze security architectures and trusted systems.
Blogger: Nutzerprofil: Marcel Winandy
www.blogger.com
Blogger ist ein kostenloses Veröffentlichungs-Tool von Google, mit dem du ganz einfach deine Gedanken der Welt mitteilen kannst. Mit Blogger kannst du...
Business Profiles
Researchgate: Marcel Winandy
Bochum, NRW, Germany
Private Homepages
Homepage - Marcel Winandy
www.marcel-winandy.de
Marcel Winandy's private homepage on computer security research and technology.
Marcel Winandy's Research Blog
winandy.blogspot.com
The figure above shows the architecture of the approach. A key feature of the security kernel framework is that it allows executing isolated application …
Marcel Winandy's Research Blog: Securing the E-Health Cloud
winandy.blogspot.com
Sadeghi. Today, I have presented it at IHI in Arlington, ...
Education
TIPPI: Marcel Winandy
crypto.stanford.edu
Winandy, Horst Gortz Institute for IT Security. Title: Trusted User-Aware Web ...
Projects
CppUnit - C++ port of JUnit / List cppunit-devel Archives
sourceforge.net
-- Marcel Winandy Re: [Cppunit-devel] Fixing warnings in cppunit From: CppUnit development mailing list <cppunit-devel@li :16:19.
Books & Literature
Electronic Healthcare: Third International Conference, eHealth
books.google.co.uk
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference, eHealth 2010, held in Casablanca, Morocco, in...
ISSE 2015: Highlights of the Information Security Solutions Europe Google Books Result
books.google.co.uk
Base, http://www.emscb.de Michael Gröne, Marcel Winandy, “Applying a ...
Android Security Cookbook - Keith Makan, Scott Alexander-Bown -...
books.google.co.za
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of...
ISSE Securing Electronic Business Processes: Highlights of the...
books.google.co.za
This book presents the most interesting talks given at ISSE the forum for the interdisciplinary discussion of how to adequately secure electronic...
Related Documents
Marcel Winandy, Senior expert cyber security architect at Innogy se
www.slideshare.net
View all of Marcel Winandy's Presentations.
Compartmented Security for Browsers
www.slideshare.net
Presentation of a paper at ARES conference. Security architecture to prevent phishing attacks.
Property-Based TPM Virtualization
www.slideshare.net
Presentation of a paper at ISC Modification of a virtual TPM design to support more flexible key management and migration support for virtual machines.
Requirements for Integrating End-to-End Security into Large-Scale EHR...
papers.ssrn.com
We summarize the requirements for integrating end-to-end confidentiality ... Marcel, Requirements for Integrating End-to-End Security into ... Marcel Winandy .
Scientific Publications
People – System Security Lab – Technische Universität Darmstadt
www.informatik.tu-darmstadt.de
Intel. Dr.-Ing. Christian Wachsmann Intel. Dr.-Ing. Marcel Winandy Huawei ...
Publications
Security advisories - ONOS - Wiki
wiki.onosproject.org
Security advisories. Skip to end of metadata (Fraunhofer AISEC) in cooperation with Marcel Winandy (Huawei) [Important] [CVE ] Denial-of-Service ...
Reports & Statements
Harmony Security: A little return oriented exploitation on Windows...
blog.harmonysecurity.com
Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy in
Miscellaneous
Marcel Winandy | LinkedIn
www.linkedin.com
View Marcel Winandy’s professional profile on LinkedIn. LinkedIn is the world's largest business network, helping professionals like Marcel Winandy discover inside ...
Marcel Winandy - Google Scholar Citations
scholar.google.com
Dates and citation counts are estimated and are determined automatically by a computer program.
Schedule - CODASPY 2016
sites.google.com
CODASPY Program. Click here for CODASPY '16 Proceedings Johannes Hoffmann, Teemu Rytilahti, Marcel Winandy, Thorsten …
Marcel Winandy | USENIX
www.usenix.org
Home » Marcel Winandy, Ruhr-University Bochum, Germany. connect with us ... Google+; YouTube; twitter . Tweets by @LISAConference. usenix conference policies …
Marcel Winandy | Flickr
www.flickr.com
Marcel Winandy hasn't made any photos public yet. About · Jobs · Blog · Mobile · Developers · Guidelines · Feedback · Report abuse · Help forum · English.
Fédération des enrôlés de force - Marcel Winandy
www.ons-jongen-a-meedercher.lu
Résidence pendant la guerre. Contribuer. Médias liés. documents · Nvision -
Web ...
(PDF) Towards Context-Sensitive Intelligence | Marcel Winandy und A....
www.academia.edu
Markus Won1 , Holger M¨ Armin B. Cremers1 , Pascal Costanza2 , and Roman ...
Uni-directional Trusted Path: Transaction Marcel Winandy -...
moam.info
achieve trusted transaction confirmation on just one device. Online service interface where users can add items th...
(PDF) TCG inside? | Marcel Winandy - Academia.edu
www.academia.edu
TCG Inside? - A Note on TPM Specification Compliance∗ Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St ...
(PDF) Trusted virtual domains on OpenSolaris | Marcel Winandy -...
www.academia.edu
Trusted virtual domains on OpenSolaris
Marcel Winandy - ISC08 - Information Security Conference 2008
isc08.twisc.org
Information Security Conference in Taipei-Taiwan.
How to marry malware to software downloads in an undetectable way...
www.theregister.com
How to marry malware to software downloads in an undetectable way (Hint: Please use HTTPS) ... Ahmad-Reza Sadeghi and Marcel Winandy ...
Return-Oriented Programming without Returns
checkoway.net
Sadeghi, Hovav Shacham, and Marcel Winandy. In Proceedings of CCS
Applications Disclosing Required Authority - Schneier on Security
www.schneier.com
Marcel Winandy • May 22, :14 AM. On Android, apps have to specify their needed permissions, which will be shown at installation time.
SDNFVSec | Tempe, Arizona, USA - Clemson University
www.cs.clemson.edu
Temple Universityn, USA. Marcel Winandy, Innogy, DE. Zhaoyan Xu, Palo Alto ...
Hovav Shacham: Return-Oriented Programming without Returns
hovav.net
Sadeghi, Hovav Shacham, and Marcel Winandy. In Proceedings of CCS 2010,
pages ...
Related search requests for Marcel Winandy
Thomas Schneider |
People Forename "Marcel" (15928) Name "Winandy" (37) |
sorted by relevance / date