Görtz

Results: 55



#Item
31

UI Redressing Attacks on Android Devices Marcus Niemietz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany {marcus.niemietz,joerg.schwenk}@rub.de

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:04:51
    32

    WORKING PAPERS HUMANGEOGRAPHIE CHRISTOPH SCHEUPLEIN, FELIX GÖRTZ, PATRICK HENKE

    Add to Reading List

    Source URL: www.uni-muenster.de

    Language: German - Date: 2014-10-08 05:49:26
      33Gaithersburg /  Maryland / National Institute of Standards and Technology / Görtz

      Tightly-Secure Signatures from Chameleon Hash Functions NIST, Maryland, PKC 2015 Olivier Blazy1 , Saqib A. Kakvi2 , Eike Kiltz2 , Jiaxin Pan2 1 University of Limoges, France

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2015-03-30 09:20:20
      34

      Pressemeddelelse Protreptik, et filosofisk dialogorienteret coach værktøj BOGANMELDELSE af filosof KIM GØRTZ Maibritt Isberg Andersen bidrager med sin bog: ”Den protreptiske samtale – din håndbog” til en nærme

      Add to Reading List

      Source URL: www.ztrong.dk

      Language: Danish - Date: 2014-08-17 13:19:22
        35Data management / Binary trees / Suffix array / Segment tree / Suffix tree / Computing / Computer programming

        Substring Range Reporting Philip Bille Inge Li Gørtz Outline • Problem definition

        Add to Reading List

        Source URL: www.cs.ucr.edu

        Language: English - Date: 2011-09-23 10:28:46
        36Mathematics / Path decomposition / Theoretical computer science / Applied mathematics / Binary trees / Optimal control / Dynamic programming / String / Substring

        Compressed Subsequence Matching and Packed Tree Coloring Philip Bille, Patrick Hagge Cording, and Inge Li Gørtz DTU Compute, Technical University of Denmark, CPM, Moscow

        Add to Reading List

        Source URL: www.cs.ucr.edu

        Language: English - Date: 2014-06-14 17:29:44
        37Trusted path / Compartment / Windows Vista / Graphical user interface / Software architecture / Operating system

        Poster: On the Usability of Secure GUIs Atanas Filyanov1 , Aysegül Nas1 , Melanie Volkamer2 , Marcel Winandy1 1 2 Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2013-06-25 08:17:52
        38Block cipher modes of operation / Encryption software / Mask / Entropy / Cryptography / Advanced Encryption Standard / Stream cipher

        Detecting Hidden Leakages Amir Moradi1 , Sylvain Guilley2,3 , Annelie Heuser2? 1 Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2014-03-28 12:51:32
        39Computer algebra / Numerical linear algebra / Finite fields / Algebraic geometry / Error detection and correction / Gröbner basis / Matrix / Hidden Field Equations / Gaussian elimination / Algebra / Mathematics / Abstract algebra

        Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-12-14 05:32:54
        40Character sets / CDC software / COMPASS/Sample Code / Maths24

        Compact q-Gram Profiling of Compressed Strings Philip Bille, Patrick Hagge Cording, and Inge Li Gørtz DTU Compute, Technical University of Denmark, 24th CPM, Bad Herrenalb

        Add to Reading List

        Source URL: www.cs.ucr.edu

        Language: English - Date: 2013-07-10 05:25:26
        UPDATE