More, Stefan
141  results:
Search for persons X
?
1

Service Provider Accreditation: Enabling and Enforcing Priv..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
More, Stefan ; Heher, Jakob ; Fasllija, Edona. - p. 1-11 , 2024
 
?
2

An inclusive Lifecycle Approach for IoT Devices Trust and I..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
3

Trust Scheme Interoperability: Connecting Heterogeneous Tru..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
More, Stefan - p. 1-9 , 2023
 
?
4

YOU SHALL NOT COMPUTE on my Data: Access Policies for Priva..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
More, Stefan ; Alber, Lukas - p. 1-8 , 2022
 
?
5

Extending Expressive Access Policies with Privacy Features:

, In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
More, Stefan ; Ramacher, Sebastian ; Alber, Lukas. - p. 574-581 , 2022
 
?
7

KRAKEN : a privacy-preserving data market for authentic ..:

, In: Proceedings of the 1st International Workshop on Data Economy,
Koch, Karl ; Krenn, Stephan ; Marc, Tilen.. - p. 15-20 , 2022
 
?
8

Privacy-Preserving eID Derivation to Self-Sovereign Identit..:

, In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Abraham, Andreas ; Koch, Karl ; More, Stefan.. - p. 506-513 , 2021
 
?
9

Trust Me If You Can: Trusted Transformation Between (JSON) ..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
10

Short-Lived Forward-Secure Delegation for TLS:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop,
 
?
11

Revocable and Offline-Verifiable Self-Sovereign Identities:

, In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
12

TPL: A Trust Policy Language:

, In: IFIP Advances in Information and Communication Technology; Trust Management XIII,
 
?
13

Use-After-FreeMail : Generalizing the Use-After-Free Pro..:

, In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security,
 
?
14

The effectiveness of surgical versus conservative treatment..:

Scheepers, Morné Stephan ; Gomersall, Judith Streak ; Munn, Zachary
JBI Database of Systematic Reviews and Implementation Reports.  13 (2015)  3 - p. 137-173 , 2015
 
1-15