Professor Thomas Gross
| Simply tell me how - On Trustworthiness and Technology Acceptance of Attribute-Based Credentials | 2024 |
|
Professor Thomas Gross
| Hashing to Prime in Zero-Knowledge | 2021 |
|
Artur Sokolovsky Professor Thomas Gross Professor Jaume Bacardit
| Is it feasible to detect FLOSS version release events from textual messages? A case study on Stack Overflow | 2021 |
|
Professor Thomas Gross
| Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC) | 2021 |
|
Dr Syh Yuan Tan Dr Ioannis Sfyrakis Professor Thomas Gross
| A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols | 2020 |
|
Dr Syh Yuan Tan Professor Thomas Gross
| MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System | 2020 |
|
Dr Syh Yuan Tan Professor Thomas Gross
| MoniPoly---An Expressive q-SDH-Based Anonymous Attribute-Based Credential System [Extended Version] | 2020 |
|
Professor Thomas Gross
| Pre-Registration: Power, PPV and Publication Bias of Cyber Security User Studies | 2020 |
|
Phyllis Nwadike Professor Thomas Gross
| Pre-Registration: Random-Controlled Trial on the Effect of Induced Incidental Affect States [Fear/Happiness] on Privacy Behavioural Intentions | 2020 |
|
Professor Thomas Gross
| Pre-Registration: Statistical Reporting in Cyber Security User Studies | 2020 |
|
Professor Thomas Gross
| Registration: Revisiting the Factor Structure of IUIPC-10 | 2020 |
|
Professor Thomas Gross
| Statistical Reliability of 10 Years of Cyber Security User Studies | 2020 |
|
Professor Thomas Gross
| Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version) | 2020 |
|
Professor Thomas Gross
| Validity and Reliability of the Scale Internet Users' Information Privacy Concern (IUIPC) [Extended Version] | 2020 |
|
Dr Syh Yuan Tan Professor Thomas Gross
| A Pairing-Based Anonymous Credential System with Efficient Attribute Encoding | 2019 |
|
Dr Syh Yuan Tan Professor Thomas Gross
| A Pairing-Based Anonymous Credential System with Efficient Attribute Encoding | 2019 |
|
Professor Thomas Gross
| A Systematic Evaluation of Evidence-Based Methods in Cyber Security User Studies | 2019 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Cyber security and privacy experiments: A design and reporting toolkit | 2018 |
|
Professor Thomas Gross Aamir Ali
| Experiment Pre-Registration Predicting 3-D-Secure Fraud Detection Outcomes | 2018 |
|
Professor Thomas Gross Dr Ioannis Sfyrakis
| Specification of the Graph Signature Cryptographic Library and the PRISMACLOUD Topology Certification Version 0.9.2 | 2018 |
|
Dr Ioannis Sfyrakis Professor Thomas Gross
| UniGuard: Protecting Unikernels using Intel SGX | 2018 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| A Codebook for Evidence-Based Research: The Nifty Nine Completeness Indicators v1.1 | 2017 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| A Codebook for Extracting Privacy & Sharing Attitude | 2017 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| An Empirical Investigation of Security Fatigue - The Case of Password Choice after Solving a CAPTCHA | 2017 |
|
Professor Thomas Gross
| Correlation Matrices for "Evaluating Users' Affect States: Towards a Study on Privacy Concerns” | 2017 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Cyber Security and Privacy Experiments: A Design & Reporting Toolkit | 2017 |
|
Professor Thomas Gross
| Pretest Registration: Investigation on the Effect of Fear and Stress on Password Choice | 2017 |
|
Dr Ioannis Sfyrakis Professor Thomas Gross
| VirtusCap: Capability-based Access Control for Unikernels | 2017 |
|
Professor Thomas Gross Dr Kovila Coopamootoo
| Why Johnny Cannot Remember His Password -- An Empirical Investigation | 2017 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Why Privacy is All But Forgotten - An Empirical Study of Privacy and Sharing Attitude | 2017 |
|
Professor Thomas Gross Dr Kovila Coopamootoo
| Effect of Cognitive Depletion on Password Choice | 2016 |
|
Professor Thomas Gross Dr Kovila Coopamootoo
| Effect of Cognitive Depletion on Password Choice | 2016 |
|
Phyllis Nwadike Professor Thomas Gross Dr Kovila Coopamootoo
| Evaluating users’ affect states: Towards a study on privacy concerns | 2016 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Evidence-based methods for privacy and identity management | 2016 |
|
Dr Iryna Yevseyeva James Turland Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel et al. | Addressing consumerization of IT risks with nudging | 2015 |
|
Professor Thomas Gross
| Proactive Security Analysis of Changes in Virtualized Infrastructure. | 2015 |
|
Professor Thomas Gross
| Signatures and Efficient Proofs on Committed Graphs and NP-Statements | 2015 |
|
Professor Thomas Gross
| Towards a New Paradigm for Privacy and Security in Cloud Services | 2015 |
|
Dr Leonardus Arief Professor Thomas Gross
| Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers | 2015 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel
| A Decision Making Model of Influencing Behavior in Information Security | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel
| A Decision Making Model of Influencing Behavior in Information Security | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A formal model for soft enforcement: Influencing the decision-maker | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A Formal Model for Soft Enforcement: Influencing the Decision-Maker | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A Formal Model for Soft Enforcement: Influencing the Decision-Maker | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Cognitive effort in privacy decision-making vs. 3x4: evaluation of a pilot experiment design | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset James Turland Professor Thomas Gross Christopher Laing et al. | Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset James Turland Professor Thomas Gross Professor Aad van Moorsel et al. | Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging | 2014 |
|
Professor Thomas Gross
| Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| Formalization of Influencing in Information Security | 2014 |
|
Professor Thomas Gross
| Issuing CL-Signatures on Speed: Signing with a Constant Number of Exponentiations | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Mental Models for Usable Privacy: A Position Paper | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Mental models for usable privacy: A position paper | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Mental models of online privacy: Structural properties with cognitive maps | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Mental models of privacy: structural properties with cognitive maps | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Mental models: an approach to identify privacy concern and behaviour | 2014 |
|
Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel Dr Iryna Yevseyeva
| Nudging for quantitative access control systems | 2014 |
|
Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel Dr Iryna Yevseyeva
| Nudging for Quantitative Access Control Systems | 2014 |
|
Dr Kovila Coopamootoo Professor Thomas Gross
| Poster: Preliminary Investigation of Cognitive Effort in PrivacyDecision-Making: Sharing Personal Information vs. 3X4 | 2014 |
|
Professor Thomas Gross
| Signatures and Efficient Proofs on Committed Graphs and NP-Statements | 2014 |
|
Professor Thomas Gross
| Efficient attributes for anonymous credentials | 2012 |
|
Professor Thomas Gross
| A Virtualization Assurance Language for Isolation and Deployment | 2011 |
|
Professor Thomas Gross
| Access control in data processing systems | 2011 |
|
Professor Thomas Gross
| Anonymous Credentials on Java Card | 2011 |
|
Professor Thomas Gross
| Automated Information Flow Analysis of Virtualized Infrastructures | 2011 |
|
Professor Thomas Gross
| Automated Verification of Virtualized Infrastructures | 2011 |
|
Professor Thomas Gross
| Efficient Tight Interval Proofs with Camenisch-Gross Encoding | 2011 |
|
Professor Thomas Gross
| Proceedings of the 7th ACM Workshop on Digital Identity Management | 2011 |
|
Professor Thomas Gross
| Vertical Protocol Composition | 2011 |
|
Professor Thomas Gross
| Vertical Protocol Composition (Extended Version) | 2011 |
|
Professor Thomas Gross
| Attributes in cryptographic credentials | 2010 |
|
Professor Thomas Gross
| Browser-based Identity Federation | 2010 |
|
Professor Thomas Gross
| Confidential Presentations in Virtual World Infrastructure | 2010 |
|
Professor Thomas Gross
| Credential Authenticated Identification and Key Exchange | 2010 |
|
Professor Thomas Gross
| Credential-Authenticated Identification and Key Exchange (Extended Version) | 2010 |
|
Professor Thomas Gross
| Cryptographic encoding and decoding of secret data | 2010 |
|
Professor Thomas Gross
| Efficient attributes for anonymous credentials (Extended Version) | 2010 |
|
Professor Thomas Gross
| Forming Credentials | 2010 |
|
Professor Thomas Gross
| Preliminary Thoughts on Privacy Supporting Binding of Biometrics to Credentials | 2010 |
|
Professor Thomas Gross
| Privacy-friendly Incentives and their Application to Wikipedia | 2010 |
|
Professor Thomas Gross
| Privacy-friendly Incentives and their Application to Wikipedia (Extended Version) | 2010 |
|
Professor Thomas Gross
| Proceedings of the 6th ACM Workshop on Digital Identity Management | 2010 |
|
Professor Thomas Gross
| Providing an ad-hoc 3d GUI within a virtual world to a non-virtual world application | 2010 |
|
Professor Thomas Gross
| [Transactional Analysis Thesis] Self-Competence by Mindfulness | 2009 |
|
Professor Thomas Gross
| Accountable privacy supporting services | 2009 |
|
Professor Thomas Gross
| Anonymous credentials on a standard java card | 2009 |
|
Professor Thomas Gross
| Anonymous Separation of Duties with Credentials | 2009 |
|
Professor Thomas Gross
| Assertion Message Signatures | 2009 |
|
Professor Thomas Gross
| Cryptographic Protocols of the Identity Mixer Library, v. 1.0 | 2009 |
|
Professor Thomas Gross
| Method, system, and computer program product for virtual world access control management | 2009 |
|
Professor Thomas Gross
| Proceedings of the 5th ACM Workshop on Digital Identity Management | 2009 |
|
Professor Thomas Gross
| System and method for verifying an electronic document | 2009 |
|
Professor Thomas Gross
| Test Cases for a WS-Federation Passive Requestor Profile | 2009 |
|
Professor Thomas Gross
| Efficient attributes for anonymous credentials | 2008 |
|
Professor Thomas Gross
| Efficient attributes for anonymous credentials | 2008 |
|
Professor Thomas Gross
| Rethinking accountable privacy supporting services | 2008 |
|
Professor Thomas Gross
| User centricity: A taxonomy and open issues | 2007 |
|
Professor Thomas Gross
| Enhancing privacy in identity federation: Anonymous credentials ensure unlinkability in WS-Security | 2006 |
|
Professor Thomas Gross
| Enhancing privacy of federated identity management protocols | 2006 |
|
Professor Thomas Gross
| SAML artifact information flow revisited | 2006 |
|
Professor Thomas Gross
| Secure Identity Management | 2006 |
|
Professor Thomas Gross
| Tag identification system | 2006 |
|
Professor Thomas Gross
| User centricity: a taxonomy and open issues | 2006 |
|
Professor Thomas Gross
| Verification method and system | 2006 |
|
Professor Thomas Gross
| Browser model for security analysis of browser-based protocols | 2005 |
|
Professor Thomas Gross
| Conditionalized access control based on dynamic content analysis | 2005 |
|
Professor Thomas Gross
| Dynamic access decision information module | 2005 |
|
Professor Thomas Gross
| Proving a WS-Federation Passive Requestor Profile with a browser model | 2005 |
|
Professor Thomas Gross
| Tailoring the Dolev-Yao abstraction to web services realities | 2005 |
|
Professor Thomas Gross
| Proving a WS-Federation Passive Requestor Profile | 2004 |
|
Professor Thomas Gross
| [Master Thesis] Context-based access control | 2003 |
|
Professor Thomas Gross
| Security analysis of the SAML single sign-on browser/artifact profile | 2003 |
|