Name
Affiliation
Papers
JOACHIM POSEGGA
UNIV EDINBURGH,DEPT ARTIFICIAL INTELLIGENCE,EDINBURGH EH8 9YL,MIDLOTHIAN,SCOTLAND
67
Collaborators
Citations 
PageRank 
82
460
49.12
Referers 
Referees 
References 
811
806
553
Search Limit
100811
Title
Citations
PageRank
Year
TLS Beyond the Broker - Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT.00.342021
Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution.00.342018
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?10.402018
When Your Browser Becomes the Paper Boy - An Anonymous Browser Network.00.342018
Idea: Enforcing Security Properties by Solving Behavioural Equations.00.342016
Data-Centric Security for the IoT.00.342015
Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS.00.342015
LogSec: adaptive protection for the wild wild web00.342015
On the Relation between Redactable and Sanitizable Signature Schemes.90.732014
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection20.372014
Identity Management in Platforms Offering IoT as a Service.00.342014
Malleable Signatures for Resource Constrained Platforms.50.402013
Forensic Computing (Dagstuhl Seminar 11401).00.342013
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security.10.372013
Control-Flow integrity in web applications50.462013
A Survey on Control-Flow Integrity Means in Web Application Frameworks.00.342013
Security and privacy for digital ecosystems.00.342013
Scope of Security Properties of Sanitizable Signatures Revisited70.422013
Biomics Project: Biological And Mathematical Basis Of Interaction Computing00.342012
Kynoid: real-time enforcement of fine-grained, user-defined, and data-centric security policies for android210.802012
WebSand: Server-Driven Outbound Web-Application Sandboxing.00.342012
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.20.352012
A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities.00.342012
On structural signatures for tree data structures50.432012
Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions50.392012
Redactable signatures for independent removal of structure and content200.682012
Constroid: data-centric access control for android40.402012
Adaptive Security Architectures for Global Sensing Applications00.342011
Sanitizable signatures in XML signature: performance, mixing properties, and revisiting the property of transparency200.712011
Reliable protection against session fixation attacks150.832011
Sanitizable signed privacy preferences for social networks.00.342011
Session Fixation - The Forgotten Vulnerability?40.662010
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings291.562010
Secure code generation for web applications130.942010
The OPL Access Control Policy Language10.362009
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks291.162008
Advances in smart cards30.402007
Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings242.932006
Smartcard Firewalls Revisited30.482006
Bytecode Model Checking: An Experimental Analysis50.532002
Smart cards in interaction: towards trustworthy digital signatures00.342002
Wireless Internet Security - Aktuelles Schlagwort30.622001
Mobile agents and telcos’ nightmares80.642000
How to turn a GSM SIM into a web server161.652000
Jini: Infrastruktur für dynamische Dienste in verteilten Systemen - Aktuelles Schlagwort10.431999
Java Bytecode Verification by Model Checking100.711999
PCA: Jini-based Personal Card Assistant20.661999
Die Sicherheitsaspekte von Java.40.811998
Byte Code Verification for Java Smart Card Based on Model Checking241.661998
Services and Visualization: Towards User-Friendly Design, ACoS'98, VISUAL'98, AIN'97, Selected Papers223.441998
  • 1
  • 2