Thomas Groß

Orcid: 0000-0002-7766-2454

Affiliations:
  • University of Newcastle upon Tyne, Centre for Cybercrime and Computer Security, UK
  • IBM Research, Zurich Research Laboratory, Switzerland
  • Ruhr-University Bochum, Germany (PhD 2009)
  • IBM Research Division, Rüschlikon, Switzerland


According to our database1, Thomas Groß authored at least 65 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Relational Credential System from q-SDH-based Graph Signatures.
IACR Cryptol. ePrint Arch., 2023

2022
Special issue on socio-technical aspects in security - editorial.
J. Comput. Secur., 2022

Hashing to Prime in Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2022

2021
Validity and Reliability of the Scale Internet Users' Information Privacy Concerns (IUIPC).
Proc. Priv. Enhancing Technol., 2021

Why Most Results of Socio-Technical Security User Studies Are False.
CoRR, 2021

Interpretable ML-driven Strategy for Automated Trading Pattern Extraction.
CoRR, 2021

2020
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols.
IACR Cryptol. ePrint Arch., 2020

MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System.
IACR Cryptol. ePrint Arch., 2020

Investigation of the Effect of Fear and Stress on Password Choice (Extended Version).
CoRR, 2020

Investigation of the Effect of Incidental Fear Privacy Behavioral Intention (Technical Report).
CoRR, 2020

A Survey on Hardware Approaches for Remote Attestation in Network Infrastructures.
CoRR, 2020

GSL: A Cryptographic Library for the strong RSA Graph Signature Scheme.
CoRR, 2020

Detection of FLOSS version release events from Stack Overflow message data.
CoRR, 2020

Statistical Reliability of 10 Years of Cyber Security User Studies.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2020

2019
Investigating the Effect of Incidental Affect States on Privacy Behavioral Intention.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

2018
SHRUBS: simulating influencing human behaviour in security.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Interventions over smart card swiping behaviour.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Investigation of 3-D secure's model for fraud detection.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

UniGuard: Protecting Unikernels Using Intel SGX.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

2017
Why Privacy Is All But Forgotten.
Proc. Priv. Enhancing Technol., 2017

Investigation of the effect of fear and stress on password choice.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

Cyber Security and Privacy Experiments: A Design and Reporting Toolkit.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

VirtusCap: Capability-Based Access Control for Unikernels.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

2016
Influence tokens: analysing adversarial behaviour change in coloured petri nets.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

Effect of Cognitive Effort on Password Choice.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

A Survey of Security Analysis in Federated Identity Management.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Evaluating Users' Affect States: Towards a Study on Privacy Concerns.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Evidence-Based Methods for Privacy and Identity Management.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

2015
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers.
IEEE Secur. Priv., 2015

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Signatures and Efficient Proofs on Committed Graphs and NP-Statements.
Proceedings of the Financial Cryptography and Data Security, 2015

Towards a New Paradigm for Privacy and Security in Cloud Services.
Proceedings of the Cyber Security and Privacy, 2015

Proactive Security Analysis of Changes in Virtualized Infrastructures.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Certification and Efficient Proofs of Committed Topology Graphs.
IACR Cryptol. ePrint Arch., 2014

A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Nudging for Quantitative Access Control Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Mental Models for Usable Privacy: A Position Paper.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

A Decision Making Model of Influencing Behavior in Information Security.
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014

Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Mental Models of Online Privacy: Structural Properties with Cognitive Maps.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014

Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Defining Privacy Is Supposed to Be Easy.
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2013

Defense-in-Depth Against Malicious Insiders in the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Efficient Attributes for Anonymous Credentials.
ACM Trans. Inf. Syst. Secur., 2012

2011
A Virtualization Assurance Language for Isolation and Deployment.
Proceedings of the POLICY 2011, 2011

Automated Information Flow Analysis of Virtualized Infrastructures.
Proceedings of the Computer Security - ESORICS 2011, 2011

Vertical Protocol Composition.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Automated verification of virtualized infrastructures.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version).
IACR Cryptol. ePrint Arch., 2010

Efficient Attributes for Anonymous Credentials (Extended Version).
IACR Cryptol. ePrint Arch., 2010

Credential Authenticated Identification and Key Exchange.
IACR Cryptol. ePrint Arch., 2010

Privacy-Friendly Incentives and Their Application to Wikipedia.
Proceedings of the Policies and Research in Identity Management, 2010

2009
Browser-based identity federation.
PhD thesis, 2009

Anonymous credentials on a standard java card.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Rethinking accountable privacy supporting services: extended abstract.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

2007
User centricity: A taxonomy and open issues.
J. Comput. Secur., 2007

2006
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

2005
Browser Model for Security Analysis of Browser-Based Protocols.
IACR Cryptol. ePrint Arch., 2005

Proving a WS-federation passive requestor profile with a browser model.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Tailoring the Dolev-Yao abstraction to web services realities.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

2004
Proving a WS-Federation passive requestor profile.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

2003
Security Analysis of the SAML Single Sign-on Browser/Artifact Profile.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003


  Loading...