Joachim Posegga

Orcid: 0000-0002-6468-809X

Affiliations:
  • University of Passau, Germany


According to our database1, Joachim Posegga authored at least 71 papers between 1990 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2021
TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

2018
Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution.
Proceedings of the Security and Privacy in Communication Networks, 2018

When Your Browser Becomes the Paper Boy - An Anonymous Browser Network.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

RAPID: Resource and API-Based Detection Against In-Browser Miners.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2016
Addressing Data-Centric Security Requirements for IoT-Based Systems.
Proceedings of the 2016 International Workshop on Secure Internet of Things, 2016

Idea: Enforcing Security Properties by Solving Behavioural Equations.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS.
Proceedings of the Security and Privacy in Communication Networks, 2015

LogSec: adaptive protection for the wild wild web.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Data-Centric Security for the IoT.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

2014
A Trusted UI for the Mobile Web.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Identity Management in Platforms Offering IoT as a Service.
Proceedings of the Internet of Things. User-Centric IoT, 2014

On the Relation between Redactable and Sanitizable Signature Schemes.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

PhishSafe: leveraging modern JavaScript API's for transparent and robust protection.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Security and privacy for digital ecosystems.
Inf. Secur. Tech. Rep., 2013

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

Malleable Signatures for Resource Constrained Platforms.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

A Survey on Control-Flow Integrity Means in Web Application Frameworks.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Control-Flow Integrity in Web Applications.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Scope of Security Properties of Sanitizable Signatures Revisited.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
BIOMICS Project: Biological and Mathematical Basis of Interaction Computing.
Int. J. Unconv. Comput., 2012

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

WebSand: Server-Driven Outbound Web-Application Sandboxing.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
Proceedings of the SECRYPT 2012, 2012

Constroid: data-centric access control for android.
Proceedings of the ACM Symposium on Applied Computing, 2012

Redactable Signatures for Independent Removal of Structure and Content.
Proceedings of the Information Security Practice and Experience, 2012

Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

On Structural Signatures for Tree Data Structures.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Adaptive Security Architectures for Global Sensing Applications.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

Forensic Computing (Dagstuhl Seminar 11401).
Dagstuhl Reports, 2011

Reliable protection against session fixation attacks.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Sanitizable signed privacy preferences for social networks.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Session Fixation - The Forgotten Vulnerability?
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Secure Code Generation for Web Applications.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
The OPL Access Control Policy Language.
Proceedings of the Trust, 2009

2008
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Advances in smart cards.
Comput. Networks, 2007

2006
Smartcard Firewalls Revisited.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2004
Secure mobile business applications - framework, architecture and implementation.
Inf. Secur. Tech. Rep., 2004

2002
Bytecode Model Checking: An Experimental Analysis.
Proceedings of the Model Checking of Software, 2002

Smart Cards in Interaction: Towards Trustworthy Digital Signatures.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2001
Wireless Internet Security - Aktuelles Schlagwort.
Inform. Spektrum, 2001

2000
Mobile agents and telcos' nightmares.
Ann. des Télécommunications, 2000

How to Turn a GSM SIM into a Web Server.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Jini: Infrastruktur für dynamische Dienste in verteilten Systemen - Aktuelles Schlagwort.
Inform. Spektrum, 1999

PCA: Jini-based Personal Card Assistant.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

Java Bytecode Verification by Model Checking.
Proceedings of the Computer Aided Verification, 11th International Conference, 1999

1998
Die Sicherheitsaspekte von Java.
Inform. Spektrum, 1998

Java auf Chipkarten - Das aktuelle Schlagwort.
Inform. Spektrum, 1998

Byte Code Verification for Java Smart Card Based on Model Checking.
Proceedings of the Computer Security, 1998

System Description: <i>card</i> <i>T</i><sup><i>A</i></sup><i>P</i>: The First Theorem Prover on a Smart Card.
Proceedings of the Automated Deduction, 1998

cardT<sup>A</sup>P: Automated Deduction on a Smart Card.
Proceedings of the Advanced Topics in Artificial Intelligence, 1998

1996
Logic Programming as a Basis for Lean Automated Deduction.
J. Log. Program., 1996

1995
Automated Deduction with Shannon Graphs.
J. Log. Comput., 1995

leanTAP: Lean Tableau-based Deduction.
J. Autom. Reason., 1995

LeanEA: A Lean Evolving Algebra Compiler.
Proceedings of the 11. Workshop Logische Programmierung, 1995

1994
Logic Programming as a Bases for Lean Deduction: Achieving Maximal Efficiency from Minimal Means.
Proceedings of the Tenth Logic Programming Workshop, 1994

BDDs and Automated Deduction.
Proceedings of the Methodologies for Intelligent Systems, 8th International Symposium, 1994

leanT<sup>A</sup>P: Lean Tableau-Based Theorem Proving (Extended Abstract).
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994

1993
Deduktion mit Shannongraphen fuer Praedikatenlogik erster Stufe
PhD thesis, 1993

Compiling Proof Search in Semantic Tableaux.
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993

Deduktion mit Shannongraphen für Prädikatenlogik erster Stufe.
PhD thesis, 1993

1992
First-Order Shannon Graphs (Extended Abstract).
Proceedings of the Workshop Theorem Proving with Analytic Tableaux and Related Methods, 1992

Towards First-order Deduction Based on Shannon Graphs.
Proceedings of the GWAI-92: Advances in Artificial Intelligence, 16th German Conference on Artificial Intelligence, Bonn, Germany, August 31, 1992

Aspects of Consistency Driven Planning.
Proceedings of the Third International Workshop on the Deductive Approach to Information Systems and Databases, 1992

1991
Consistency Driven Planning.
Proceedings of the EPIA 91, 1991

1990
Modal logics for AI planning.
Proceedings of the First International Conference on Expert Planning Systems, 1990


  Loading...