default search action
Thomas Walter 0001
Person information
- affiliation: DOCOMO Euro-Labs, Munich, Germany
Other persons with the same name
- Thomas Walter — disambiguation page
- Thomas Walter 0002 — Eberhard Karls University of Tübingen, Germany
- Thomas Walter 0003 — MINES ParisTech / Institut Curie, Centre for Computational Biology (CBIO), France (and 1 more)
- Thomas Walter 0004 — University of Kaiserslautern, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j9]Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter:
CPM: Masking Code Pointers to Prevent Code Injection Attacks. ACM Trans. Inf. Syst. Secur. 16(1): 1 (2013) - 2012
- [j8]Gina Kounga, Chris J. Mitchell, Thomas Walter:
Generating certification authority authenticated public keys in ad hoc networks. Secur. Commun. Networks 5(1): 87-106 (2012) - 2011
- [j7]Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. J. Comput. Virol. 7(3): 173-188 (2011) - [c26]Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter:
Code Pointer Masking: Hardening Applications against Code Injection Attacks. DIMVA 2011: 194-213 - 2010
- [j6]Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter:
Runtime monitoring for next generation Java ME platform. Comput. Secur. 29(1): 74-87 (2010)
2000 – 2009
- 2009
- [j5]Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer:
What the heck is this application doing? - A security-by-contract architecture for pervasive services. Comput. Secur. 28(7): 566-577 (2009) - [j4]Gina Kounga, Thomas Walter, Sven Lachmund:
Proving Reliability of Anonymous Information in VANETs. IEEE Trans. Veh. Technol. 58(6): 2977-2989 (2009) - [c25]Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter:
Formal Analyses of Usage Control Policies. ARES 2009: 98-105 - [c24]Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. CCS 2009: 11-20 - [c23]Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter:
Breaking the memory secrecy assumption. EUROSEC 2009: 1-8 - [c22]Christian Schaefer, Thomas Walter, Matús Harvan, Alexander Pretschner:
Usage Control Policy Enforcement in OpenOffice.org and Information Flow. ISSA 2009: 393-406 - 2008
- [j3]Alexander Pretschner, Manuel Hilty, Florian Schütz, Christian Schaefer, Thomas Walter:
Usage Control Enforcement: Present and Future. IEEE Secur. Priv. 6(4): 44-53 (2008) - [c21]Alexander Pretschner, Thomas Walter:
Negotiation of Usage Control Policies - Simply the Best? ARES 2008: 1135-1136 - [c20]Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter:
Mechanisms for usage control. AsiaCCS 2008: 240-244 - [c19]Thomas Walter, Christian Schaefer, Gina Kounga, Makoto Hamatsu:
Evidence Gathering for Remuneration of Shared Connections. CNSR 2008: 569-576 - [c18]Alexander Pretschner, Florian Schütz, Christian Schaefer, Thomas Walter:
Policy Evolution in Distributed Usage Control. STM@IFIPTM 2008: 109-123 - [i1]Fabio Martinelli, Fabio Massacci, Paolo Mori, Christian Schaefer, Thomas Walter:
Enhancing Java ME Security Support with Resource Usage Monitoring. ERCIM News 2008(75) (2008) - 2007
- [c17]Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter:
A Policy Language for Distributed Usage Control. ESORICS 2007: 531-546 - [c16]Alf Zugenmaier, Thomas Walter:
Security in Pervasive Computing Calling for new Security Principles. ICPS 2007: 96-99 - [c15]Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter:
Monitors for Usage Control. IFIPTM 2007: 411-414 - [c14]Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter:
DUKE - Distributed Usage Control Enforcement. POLICY 2007: 275 - [c13]Nicola Dragoni, Fabio Massacci, Christian Schaefer, Thomas Walter, Eric Vétillard:
A Security-by-Contract Architecture for Pervasive Services. SECPerU 2007: 49-54 - 2006
- [c12]Gina Kounga, Thomas Walter:
Identification in Infrastructureless Networks. ESAS 2006: 58-69 - [c11]Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter:
Usage Control Requirements in Mobile and Ubiquitous Computing Applications. ICSNC 2006: 27 - [c10]Srisakul Thakolsri, Christian Schaefer, Thomas Walter, Wolfgang Kellerer:
Accounting management for session mobility in an ubiquitous environment. IWCMC 2006: 311-316 - [c9]Sven Lachmund, Thomas Walter, Laurent Gomez, Laurent Bussard, Eddy Olk:
Context-Aware Access Control; Making Access Control Decisions Based on Context Information. MobiQuitous 2006: 1-8 - [c8]Frank Eyermann, Péter Rácz, Burkhard Stiller, Christian Schaefer, Thomas Walter:
Diameter-based accounting management for wireless services. WCNC 2006: 2305-2311 - 2005
- [c7]Philip Robinson, Christian Schaefer, Thomas Walter:
POSSET - Policy-Driven Secure Session Transfer. ISPEC 2005: 13-24 - [c6]Frank Eyermann, Péter Rácz, Burkhard Stiller, Christian Schaefer, Thomas Walter:
Service-oriented Accounting Configuration Management based on Diameter. LCN 2005: 621-623 - [c5]Frank Eyermann, Péter Rácz, Burkhard Stiller, Christian Schaefer, Thomas Walter:
Generic accounting configuration management for heterogeneous mobile networks. WMASH 2005: 46-55 - 2004
- [j2]Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson:
Secure mobile business applications - framework, architecture and implementation. Inf. Secur. Tech. Rep. 9(4): 6-21 (2004) - [c4]Chie Noda, Thomas Walter:
Smart Devices for Next Generation Mobile Services. CASSIS 2004: 192-209 - [c3]Thomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier:
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. SAINT Workshops 2004: 696-701 - 2003
- [c2]Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr:
Framework and Architecture for Secure Mobile Business Applications. SEC 2003: 413-416
1990 – 1999
- 1996
- [j1]Finn Kristoffersen, Thomas Walter:
TTCN: Towards a Formal Semantics and Validation of Test Suites. Comput. Networks ISDN Syst. 29(1): 15-47 (1996) - 1992
- [c1]Thomas Walter, Jan Ellsberger, Finn Kristoffersen, Paul van den Merkhof:
A Common Semantics Representation for SDL and TTCN. PSTV 1992: 335-346
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint