Marc Rennhard

Orcid: 0000-0001-5105-3258

According to our database1, Marc Rennhard authored at least 14 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Automating the Detection of Access Control Vulnerabilities in Web Applications.
SN Comput. Sci., 2022

2021
Web Content Signing with Service Workers.
CoRR, 2021

Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2019
Security of Data Science and Data Science for Security.
Proceedings of the Applied Data Science - Lessons Learned for the Data-Driven Business, 2019

2012
SecureSafe: a highly secure online data safe industrial use case.
Proceedings of the First Workshop on Measurement, Privacy, and Mobility, 2012

2008
Histogram Matrix: Log File Visualization for Anomaly Detection.
Proceedings of the The Third International Conference on Availability, 2008

2004
MorphMix - a peer to peer based system for anonymous Internet access.
PhD thesis, 2004

Towards Pseudonymous e-Commerce.
Electron. Commer. Res., 2004

Practical Anonymity for the Masses with MorphMix.
Proceedings of the Financial Cryptography, 2004

2003
Practical Anonymity for the Masses with Mix-Networks.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

2002
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Analysis of an Anonymity Network for Web Browsing.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

2001
An Architecture for an Anonymity Network.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography.
Proceedings of the Information Security, 4th International Conference, 2001


  Loading...