Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Professor Thomas Gross.

Newcastle AuthorsTitleYearFull text
Professor Thomas Gross
Hashing to Prime in Zero-Knowledge2021
Artur Sokolovsky
Professor Thomas Gross
Dr Jaume Bacardit
Is it feasible to detect FLOSS version release events from textual messages? A case study on Stack Overflow2021
Professor Thomas Gross
Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC)2021
Dr Syh Yuan Tan
Dr Ioannis Sfyrakis
Professor Thomas Gross
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols2020
Dr Syh Yuan Tan
Professor Thomas Gross
MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System2020
Dr Syh Yuan Tan
Professor Thomas Gross
MoniPoly---An Expressive q-SDH-Based Anonymous Attribute-Based Credential System [Extended Version]2020
Professor Thomas Gross
Pre-Registration: Power, PPV and Publication Bias of Cyber Security User Studies2020
Phyllis Nwadike
Professor Thomas Gross
Pre-Registration: Random-Controlled Trial on the Effect of Induced Incidental Affect States [Fear/Happiness] on Privacy Behavioural Intentions2020
Professor Thomas Gross
Pre-Registration: Statistical Reporting in Cyber Security User Studies2020
Professor Thomas Gross
Registration: Revisiting the Factor Structure of IUIPC-102020
Professor Thomas Gross
Statistical Reliability of 10 Years of Cyber Security User Studies2020
Professor Thomas Gross
Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version)2020
Professor Thomas Gross
Validity and Reliability of the Scale Internet Users' Information Privacy Concern (IUIPC) [Extended Version]2020
Dr Syh Yuan Tan
Professor Thomas Gross
A Pairing-Based Anonymous Credential System with Efficient Attribute Encoding2019
Dr Syh Yuan Tan
Professor Thomas Gross
A Pairing-Based Anonymous Credential System with Efficient Attribute Encoding2019
Professor Thomas Gross
A Systematic Evaluation of Evidence-Based Methods in Cyber Security User Studies2019
Dr Kovila Coopamootoo
Professor Thomas Gross
Cyber security and privacy experiments: A design and reporting toolkit2018
Professor Thomas Gross
Aamir Ali
Experiment Pre-Registration Predicting 3-D-Secure Fraud Detection Outcomes2018
Professor Thomas Gross
Dr Ioannis Sfyrakis
Specification of the Graph Signature Cryptographic Library and the PRISMACLOUD Topology Certification Version 0.9.22018
Dr Ioannis Sfyrakis
Professor Thomas Gross
UniGuard: Protecting Unikernels using Intel SGX2018
Dr Kovila Coopamootoo
Professor Thomas Gross
A Codebook for Evidence-Based Research: The Nifty Nine Completeness Indicators v1.12017
Dr Kovila Coopamootoo
Professor Thomas Gross
A Codebook for Extracting Privacy & Sharing Attitude2017
Dr Kovila Coopamootoo
Professor Thomas Gross
An Empirical Investigation of Security Fatigue - The Case of Password Choice after Solving a CAPTCHA2017
Professor Thomas Gross
Correlation Matrices for "Evaluating Users' Affect States: Towards a Study on Privacy Concerns”2017
Dr Kovila Coopamootoo
Professor Thomas Gross
Cyber Security and Privacy Experiments: A Design & Reporting Toolkit2017
Professor Thomas Gross
Pretest Registration: Investigation on the Effect of Fear and Stress on Password Choice2017
Dr Ioannis Sfyrakis
Professor Thomas Gross
VirtusCap: Capability-based Access Control for Unikernels2017
Professor Thomas Gross
Dr Kovila Coopamootoo
Why Johnny Cannot Remember His Password -- An Empirical Investigation2017
Dr Kovila Coopamootoo
Professor Thomas Gross
Why Privacy is All But Forgotten - An Empirical Study of Privacy and Sharing Attitude2017
Professor Thomas Gross
Dr Kovila Coopamootoo
Effect of Cognitive Depletion on Password Choice2016
Professor Thomas Gross
Dr Kovila Coopamootoo
Effect of Cognitive Depletion on Password Choice2016
Phyllis Nwadike
Professor Thomas Gross
Dr Kovila Coopamootoo
Evaluating users’ affect states: Towards a study on privacy concerns2016
Dr Kovila Coopamootoo
Professor Thomas Gross
Evidence-based methods for privacy and identity management2016
Dr Iryna Yevseyeva
James Turland
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Addressing consumerization of IT risks with nudging2015
Professor Thomas Gross
Proactive Security Analysis of Changes in Virtualized Infrastructure.2015
Professor Thomas Gross
Signatures and Efficient Proofs on Committed Graphs and NP-Statements2015
Professor Thomas Gross
Towards a New Paradigm for Privacy and Security in Cloud Services2015
Dr Leonardus Arief
Professor Thomas Gross
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers2015
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security2014
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A formal model for soft enforcement: Influencing the decision-maker2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Cognitive effort in privacy decision-making vs. 3x4: evaluation of a pilot experiment design2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Christopher Laing
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging2014
Professor Thomas Gross
Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
Formalization of Influencing in Information Security2014
Professor Thomas Gross
Issuing CL-Signatures on Speed: Signing with a Constant Number of Exponentiations2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Mental Models for Usable Privacy: A Position Paper2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Mental models for usable privacy: A position paper2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Mental models of online privacy: Structural properties with cognitive maps2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Mental models of privacy: structural properties with cognitive maps2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Mental models: an approach to identify privacy concern and behaviour2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for quantitative access control systems2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for Quantitative Access Control Systems2014
Dr Kovila Coopamootoo
Professor Thomas Gross
Poster: Preliminary Investigation of Cognitive Effort in PrivacyDecision-Making: Sharing Personal Information vs. 3X42014
Professor Thomas Gross
Signatures and Efficient Proofs on Committed Graphs and NP-Statements2014
Professor Thomas Gross
Efficient attributes for anonymous credentials2012
Professor Thomas Gross
A Virtualization Assurance Language for Isolation and Deployment2011
Professor Thomas Gross
Access control in data processing systems2011
Professor Thomas Gross
Anonymous Credentials on Java Card2011
Professor Thomas Gross
Automated Information Flow Analysis of Virtualized Infrastructures2011
Professor Thomas Gross
Automated Verification of Virtualized Infrastructures2011
Professor Thomas Gross
Efficient Tight Interval Proofs with Camenisch-Gross Encoding2011
Professor Thomas Gross
Proceedings of the 7th ACM Workshop on Digital Identity Management2011
Professor Thomas Gross
Vertical Protocol Composition2011
Professor Thomas Gross
Vertical Protocol Composition (Extended Version)2011
Professor Thomas Gross
Attributes in cryptographic credentials2010
Professor Thomas Gross
Browser-based Identity Federation2010
Professor Thomas Gross
Confidential Presentations in Virtual World Infrastructure2010
Professor Thomas Gross
Credential Authenticated Identification and Key Exchange2010
Professor Thomas Gross
Credential-Authenticated Identification and Key Exchange (Extended Version)2010
Professor Thomas Gross
Cryptographic encoding and decoding of secret data2010
Professor Thomas Gross
Efficient attributes for anonymous credentials (Extended Version)2010
Professor Thomas Gross
Forming Credentials2010
Professor Thomas Gross
Preliminary Thoughts on Privacy Supporting Binding of Biometrics to Credentials2010
Professor Thomas Gross
Privacy-friendly Incentives and their Application to Wikipedia2010
Professor Thomas Gross
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)2010
Professor Thomas Gross
Proceedings of the 6th ACM Workshop on Digital Identity Management2010
Professor Thomas Gross
Providing an ad-hoc 3d GUI within a virtual world to a non-virtual world application2010
Professor Thomas Gross
[Transactional Analysis Thesis] Self-Competence by Mindfulness2009
Professor Thomas Gross
Accountable privacy supporting services2009
Professor Thomas Gross
Anonymous credentials on a standard java card2009
Professor Thomas Gross
Anonymous Separation of Duties with Credentials2009
Professor Thomas Gross
Assertion Message Signatures2009
Professor Thomas Gross
Cryptographic Protocols of the Identity Mixer Library, v. 1.02009
Professor Thomas Gross
Method, system, and computer program product for virtual world access control management2009
Professor Thomas Gross
Proceedings of the 5th ACM Workshop on Digital Identity Management2009
Professor Thomas Gross
System and method for verifying an electronic document2009
Professor Thomas Gross
Test Cases for a WS-Federation Passive Requestor Profile2009
Professor Thomas Gross
Efficient attributes for anonymous credentials2008
Professor Thomas Gross
Efficient attributes for anonymous credentials2008
Professor Thomas Gross
Rethinking accountable privacy supporting services2008
Professor Thomas Gross
User centricity: A taxonomy and open issues2007
Professor Thomas Gross
Enhancing privacy in identity federation: Anonymous credentials ensure unlinkability in WS-Security2006
Professor Thomas Gross
Enhancing privacy of federated identity management protocols2006
Professor Thomas Gross
SAML artifact information flow revisited2006
Professor Thomas Gross
Secure Identity Management2006
Professor Thomas Gross
Tag identification system2006
Professor Thomas Gross
User centricity: a taxonomy and open issues2006
Professor Thomas Gross
Verification method and system2006
Professor Thomas Gross
Browser model for security analysis of browser-based protocols2005
Professor Thomas Gross
Conditionalized access control based on dynamic content analysis2005
Professor Thomas Gross
Dynamic access decision information module2005
Professor Thomas Gross
Proving a WS-Federation Passive Requestor Profile with a browser model2005
Professor Thomas Gross
Tailoring the Dolev-Yao abstraction to web services realities2005
Professor Thomas Gross
Proving a WS-Federation Passive Requestor Profile2004
Professor Thomas Gross
[Master Thesis] Context-based access control2003
Professor Thomas Gross
Security analysis of the SAML single sign-on browser/artifact profile2003