Tilman Frosch
Tilman Frosch
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum
Verified email at
Cited by
Cited by
How secure is TextSecure?
T Frosch, C Mainka, C Bader, F Bergsma, J Schwenk, T Holz
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 457-472, 2016
Iceshield: Detection and mitigation of malicious websites with a frozen dom
M Heiderich, T Frosch, T Holz
Recent Advances in Intrusion Detection, 281-300, 2011
mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations
M Heiderich, T Frosch, J Schwenk, J Magazinius, EZ Yang
Proceedings of the 20th ACM conference on Computer and Communications Security, 2013
Crouching tiger-hidden payload: security risks of scalable vectors graphics
M Heiderich, T Frosch, M Jensen, T Holz
Proceedings of the 18th ACM conference on Computer and communications …, 2011
The Bug That Made Me President a Browser-and Web-Security Case Study on Helios Voting
M Heiderich, T Frosch, M Niemietz, J Schwenk
E-Voting and Identity, 89-103, 2012
Predentifier: Detecting Botnet C&C Domains from Passive DNS Data
T Frosch, M Kührer, T Holz
Advances in IT Early Warning, 2013
Futuretrust-future trust services for trustworthy global transactions
D Hühnlein, T Frosch, J Schwenk, CM Piswanger, M Sel, T Hühnlein, ...
Gesellschaft für Informatik eV, 2016
Mining DNS-related Data for Suspicious Features
T Frosch
Ruhr-Universität Bochum, 2011
Charakteristik von wireless mesh-netzwerken
T Frosch
Bachelorthesis, Ruhr-Universität Bochum, 2009
Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System
KH Krempels, C Terwelp, S Wüller, T Frosch, S Gökay
SMARTGREENS 2014 - 3rd International Conference on Smart Grids and Green IT …, 2014
Improving Location Privacy for the Electric Vehicle Masses
T Frosch, S Schäge, M Goll, T Holz
HGI Technical Reports, 2013
On Locational Privacy in the Absence of Anonymous Payments
T Frosch, S Schäge, M Goll, T Holz
Data Protection on the Move - Current Developments in ICT and Privacy/Data …, 2015
Sicherheit medizintechnischer Protokolle im Krankenhaus
C Saatjohann, F Ising, M Gierlings, D Noss, S Schimmler, A Klemm, ...
Datenschutz und Datensicherheit-DuD 46 (5), 276-283, 2022
The system can't perform the operation now. Try again later.
Articles 1–13