default search action
Thomas Groß 0001
Person information
- affiliation: University of Newcastle upon Tyne, Centre for Cybercrime and Computer Security, UK
- affiliation: IBM Research, Zurich Research Laboratory, Switzerland
- affiliation (PhD 2009): Ruhr-University Bochum, Germany
- affiliation: IBM Research Division, Rüschlikon, Switzerland
- not to be confused with: Thomas R. Gross
Other persons with the same name
- Thomas Groß — disambiguation page
- Thomas Groß 0002 — Technical University of Braunschweig, Germany
- Thomas Groß 0004 (aka: Thomas Gross 0004, Thomas Michael Groß) — Aichi University, Department of Language Communication, Japan
- Thomas Gross 0003 — University of Applied Sciences, Bergisch Gladbach, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i19]Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Groß:
A Relational Credential System from q-SDH-based Graph Signatures. IACR Cryptol. ePrint Arch. 2023: 1181 (2023) - 2022
- [j6]Thomas Groß, Luca Viganò:
Special issue on socio-technical aspects in security - editorial. J. Comput. Secur. 30(3): 325-326 (2022) - [i18]Thomas Groß:
Hashing to Prime in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2022: 853 (2022) - 2021
- [j5]Thomas Groß:
Validity and Reliability of the Scale Internet Users' Information Privacy Concerns (IUIPC). Proc. Priv. Enhancing Technol. 2021(2): 235-258 (2021) - [c48]Thomas Groß:
Hashing to Prime in Zero-Knowledge. SECRYPT 2021: 62-74 - [e6]Thomas Groß, Theo Tryfonas:
Socio-Technical Aspects in Security and Trust - 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11739, Springer 2021, ISBN 978-3-030-55957-1 [contents] - [e5]Thomas Groß, Luca Viganò:
Socio-Technical Aspects in Security and Trust - 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12812, Springer 2021, ISBN 978-3-030-79317-3 [contents] - [i17]Artur Sokolovsky, Luca Arnaboldi, Jaume Bacardit, Thomas Gross:
Interpretable ML-driven Strategy for Automated Trading Pattern Extraction. CoRR abs/2103.12419 (2021) - [i16]Thomas Gross:
Why Most Results of Socio-Technical Security User Studies Are False. CoRR abs/2109.10839 (2021) - 2020
- [c47]Syh-Yuan Tan, Thomas Groß:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. ASIACRYPT (3) 2020: 498-526 - [c46]Thomas Groß:
Statistical Reliability of 10 Years of Cyber Security User Studies. STAST 2020: 171-190 - [i15]Artur Sokolovsky, Thomas Gross, Jaume Bacardit:
Detection of FLOSS version release events from Stack Overflow message data. CoRR abs/2003.14257 (2020) - [i14]Thomas Groß:
Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies. CoRR abs/2004.06672 (2020) - [i13]Ioannis Sfyrakis, Thomas Gross:
GSL: A Cryptographic Library for the strong RSA Graph Signature Scheme. CoRR abs/2005.12447 (2020) - [i12]Ioannis Sfyrakis, Thomas Gross:
A Survey on Hardware Approaches for Remote Attestation in Network Infrastructures. CoRR abs/2005.12453 (2020) - [i11]Uchechi Phyllis Nwadike, Thomas Groß:
Investigation of the Effect of Incidental Fear Privacy Behavioral Intention (Technical Report). CoRR abs/2007.08604 (2020) - [i10]Tom Fordyce, Sam Green, Thomas Groß:
Investigation of the Effect of Fear and Stress on Password Choice (Extended Version). CoRR abs/2009.12150 (2020) - [i9]Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel:
Investigation of 3-D Secure's Model for Fraud Detection. CoRR abs/2009.12390 (2020) - [i8]Syh-Yuan Tan, Thomas Gross:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. IACR Cryptol. ePrint Arch. 2020: 587 (2020) - [i7]Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross:
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols. IACR Cryptol. ePrint Arch. 2020: 1403 (2020)
2010 – 2019
- 2019
- [c45]Thomas Groß:
Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies. STAST 2019: 3-26 - [c44]Uchechi Phyllis Nwadike, Thomas Groß:
Investigating the Effect of Incidental Affect States on Privacy Behavioral Intention. STAST 2019: 187-210 - 2018
- [c43]Ioannis Sfyrakis, Thomas Gross:
UniGuard: Protecting Unikernels Using Intel SGX. IC2E 2018: 99-105 - [c42]Peter Carmichael, Thomas Groß, Charles Morisset:
Interventions over smart card swiping behaviour. STAST 2018: 2:1-2:11 - [c41]Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel:
Investigation of 3-D secure's model for fraud detection. STAST 2018: 3:1-3:11 - [c40]Peter Carmichael, Charles Morisset, Thomas Groß:
SHRUBS: simulating influencing human behaviour in security. STAST 2018: 6:1-6:11 - 2017
- [j4]Kovila P. L. Coopamootoo, Thomas Groß:
Why Privacy Is All But Forgotten. Proc. Priv. Enhancing Technol. 2017(4): 97-118 (2017) - [c39]Ioannis Sfyrakis, Thomas Gross:
VirtusCap: Capability-Based Access Control for Unikernels. IC2E 2017: 226-237 - [c38]Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini:
Secure and Privacy-Friendly Storage and Data Processing in the Cloud. Privacy and Identity Management 2017: 153-169 - [c37]Kovila P. L. Coopamootoo, Thomas Groß:
Cyber Security and Privacy Experiments: A Design and Reporting Toolkit. Privacy and Identity Management 2017: 243-262 - [c36]Tom Fordyce, Sam Green, Thomas Groß:
Investigation of the effect of fear and stress on password choice. STAST 2017: 3-15 - 2016
- [c35]Kovila P. L. Coopamootoo, Thomas Groß:
Evidence-Based Methods for Privacy and Identity Management. Privacy and Identity Management 2016: 105-121 - [c34]Sean Simpson, Thomas Groß:
A Survey of Security Analysis in Federated Identity Management. Privacy and Identity Management 2016: 231-247 - [c33]Uchechi Phyllis Nwadike, Thomas Groß, Kovila P. L. Coopamootoo:
Evaluating Users' Affect States: Towards a Study on Privacy Concerns. Privacy and Identity Management 2016: 248-262 - [c32]Thomas Groß, Kovila P. L. Coopamootoo, Amina Al-Jabri:
Effect of Cognitive Effort on Password Choice. WAY@SOUPS 2016 - [c31]Peter Carmichael, Charles Morisset, Thomas Groß:
Influence tokens: analysing adversarial behaviour change in coloured petri nets. STAST 2016: 29-40 - 2015
- [j3]Budi Arief, Mohd Azeem Bin Adzmi, Thomas Gross:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers. IEEE Secur. Priv. 13(1): 71-76 (2015) - [c30]Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim:
Proactive Security Analysis of Changes in Virtualized Infrastructures. ACSAC 2015: 51-60 - [c29]Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu Des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig:
Towards a New Paradigm for Privacy and Security in Cloud Services. CSP Forum 2015: 14-25 - [c28]Thomas Groß:
Signatures and Efficient Proofs on Committed Graphs and NP-Statements. Financial Cryptography 2015: 293-314 - [c27]Alaa Sarah Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig:
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements. Privacy and Identity Management 2015: 79-96 - [i6]Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu Des Noes, Henrich Christopher Pöhls, Boris Rozenberg, Daniel Slamanig:
Towards a New Paradigm for Privacy and Security in Cloud Services. CoRR abs/1506.05980 (2015) - 2014
- [c26]Sören Bleikertz, Carsten Vogel, Thomas Groß:
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. ACSAC 2014: 26-35 - [c25]Kovila P. L. Coopamootoo, Thomas Groß:
Mental Models of Online Privacy: Structural Properties with Cognitive Maps. BCS HCI 2014 - [c24]Thomas Groß:
Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs. CCSW 2014: 69-80 - [c23]Iryna Yevseyeva, Charles Morisset, Thomas Groß, Aad P. A. van Moorsel:
A Decision Making Model of Influencing Behavior in Information Security. EPEW 2014: 194-208 - [c22]Charles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. HCI (24) 2014: 340-351 - [c21]Kovila P. L. Coopamootoo, Thomas Groß:
Mental Models for Usable Privacy: A Position Paper. HCI (24) 2014: 410-421 - [c20]Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. STM 2014: 113-128 - [i5]Thomas Groß:
Certification and Efficient Proofs of Committed Topology Graphs. IACR Cryptol. ePrint Arch. 2014: 255 (2014) - 2013
- [c19]Thomas Groß, Marit Hansen:
Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads. CCS 2013: 1493-1494 - [c18]Francisco Rocha, Thomas Gross, Aad P. A. van Moorsel:
Defense-in-Depth Against Malicious Insiders in the Cloud. IC2E 2013: 88-97 - [c17]Sebastian Mödersheim, Thomas Groß, Luca Viganò:
Defining Privacy Is Supposed to Be Easy. LPAR 2013: 619-635 - [e4]Thomas Groß, Marit Hansen:
DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013. ACM 2013, ISBN 978-1-4503-2493-9 [contents] - 2012
- [j2]Jan Camenisch, Thomas Groß:
Efficient Attributes for Anonymous Credentials. ACM Trans. Inf. Syst. Secur. 15(1): 4:1-4:30 (2012) - 2011
- [c16]Sören Bleikertz, Thomas Groß, Sebastian Mödersheim:
Automated verification of virtualized infrastructures. CCSW 2011: 47-58 - [c15]Thomas Groß, Sebastian Mödersheim:
Vertical Protocol Composition. CSF 2011: 235-250 - [c14]Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson:
Automated Information Flow Analysis of Virtualized Infrastructures. ESORICS 2011: 392-415 - [c13]Sören Bleikertz, Thomas Groß:
A Virtualization Assurance Language for Isolation and Deployment. POLICY 2011: 33-40 - [e3]Abhilasha Bhargav-Spantzel, Thomas Groß:
DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011. ACM 2011, ISBN 978-1-4503-1006-2 [contents] - 2010
- [c12]Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup:
Credential Authenticated Identification and Key Exchange. CRYPTO 2010: 255-276 - [c11]Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl:
Privacy-Friendly Incentives and Their Application to Wikipedia. IDMAN 2010: 113-129 - [e2]Thomas Groß, Kenji Takahashi:
Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0090-2 [contents] - [i4]Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup:
Credential Authenticated Identification and Key Exchange. IACR Cryptol. ePrint Arch. 2010: 55 (2010) - [i3]Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl:
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version). IACR Cryptol. ePrint Arch. 2010: 401 (2010) - [i2]Jan Camenisch, Thomas Groß:
Efficient Attributes for Anonymous Credentials (Extended Version). IACR Cryptol. ePrint Arch. 2010: 496 (2010)
2000 – 2009
- 2009
- [b1]Thomas Groß:
Browser-based identity federation. Ruhr University Bochum, 2009 - [c10]Patrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup:
Anonymous credentials on a standard java card. CCS 2009: 600-610 - [e1]Elisa Bertino, Thomas Groß, Kenji Takahashi:
Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-786-8 [contents] - 2008
- [c9]Jan Camenisch, Thomas Groß:
Efficient attributes for anonymous credentials. CCS 2008: 345-356 - [c8]Jan Camenisch, Thomas Groß, Thomas S. Heydt-Benjamin:
Rethinking accountable privacy supporting services: extended abstract. Digital Identity Management 2008: 1-8 - 2007
- [j1]Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross, Dieter Sommer:
User centricity: A taxonomy and open issues. J. Comput. Secur. 15(5): 493-527 (2007) - 2006
- [c7]Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross, Dieter Sommer:
User centricity: a taxonomy and open issues. Digital Identity Management 2006: 1-10 - [c6]Jan Camenisch, Thomas Gross, Dieter Sommer:
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. WPES 2006: 67-72 - 2005
- [c5]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508 - [c4]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64 - [c3]Michael Backes, Thomas Groß:
Tailoring the Dolev-Yao abstraction to web services realities. SWS 2005: 65-74 - [i1]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. IACR Cryptol. ePrint Arch. 2005: 127 (2005) - 2004
- [c2]Thomas Groß, Birgit Pfitzmann:
Proving a WS-Federation passive requestor profile. SWS 2004: 77-86 - 2003
- [c1]Thomas Groß:
Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. ACSAC 2003: 298-307
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint