Children
Sign in to add traineeAndreas Zeller | grad student | 1997 | Technical University Braunschweig |
Christian Lindig | grad student | 1999 | Technical University Braunschweig |
Bernd Fischer | grad student | 2001 | University of Passau |
Jens Krinke | grad student | 2003 | University of Passau |
Torsten Robschink | grad student | 2005 | University of Passau |
Mirko Streckenbach | grad student | 2005 | University of Passau |
Maximilian Störzer | grad student | 2007 | University of Passau |
Christian Hammer | grad student | 2009 | KIT, Karlsruhe, Germany |
Daniel Wasserrab | grad student | 2010 | KIT, Karlsruhe, Germany |
Dennis Giffhorn | grad student | 2012 | KIT, Karlsruhe, Germany |
Andreas Lochbihler | grad student | 2012 | KIT, Karlsruhe, Germany |
Joachim Breitner | grad student | 2016 | KIT, Karlsruhe, Germany |
Jürgen Graf | grad student | 2016 | KIT, Karlsruhe, Germany |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bischof S, Breitner J, Graf J, et al. (2018) Low-deterministic security for low-nondeterministic programs Journal of Computer Security. 26: 335-366 |
Snelting G. (2015) Understanding probabilistic software leaks Science of Computer Programming. 97: 122-126 |
Giffhorn D, Snelting G. (2015) A new algorithm for low-deterministic security International Journal of Information Security. 14: 263-287 |
Snelting G, Giffhorn D, Graf J, et al. (2014) Checking probabilistic noninterference using JOANA Information Technology. 56: 280-287 |
Beckert B, Hofheinz D, Müller-Quade J, et al. (2011) Software Security in Virtualized Infrastructures: The Smart Meter Example Information Technology. 53: 142-151 |
Wasserrab D, Lohner D, Snelting G. (2009) On PDG-based noninterference and its modular proof (abstract only) Sigplan Notices. 44: 4-5 |
Hammer C, Snelting G. (2009) Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs International Journal of Information Security. 8: 399-422 |
Snelting G, Robschink T, Krinke J. (2006) Efficient path conditions in dependence graphs for software safety analysis Acm Transactions On Software Engineering and Methodology. 15: 410-457 |
Snelting G, Tip F. (2000) Understanding class hierarchies using concept analysis Acm Transactions On Programming Languages and Systems. 22: 540-582 |
Krinke J, Robschink T, Snelting G. (1999) Software-Sicherheitsprüfung mit VALSOFT Informatik - Forschung Und Entwicklung. 14: 62-73 |