Seguir
Julian Schütte
Julian Schütte
Dirección de correo verificada de google.com - Página principal
Título
Citado por
Citado por
Año
Osiris: Hunting for integer bugs in ethereum smart contracts
CF Torres, J Schütte, R State
Proceedings of the 34th annual computer security applications conference …, 2018
3262018
Blockchain for education: lifelong learning passport
W Gräther, S Kolvenbach, R Ruland, J Schütte, C Torres, F Wendland
Proceedings of 1st ERCIM Blockchain workshop 2018, 2018
2682018
Ids reference architecture model. industrial data space. version 2.0
B Otto, S Lohmann, S Steinbuss, A Teuscher, S Auer, M Boehmer, J Bohn, ...
International Data Spaces Association, 2018
1062018
On the effectiveness of malware protection on android
R Fedler, J Schütte, M Kulicke
Fraunhofer AISEC 45, 53, 2013
862013
Condroid: Targeted dynamic analysis of android applications
J Schütte, R Fedler, D Titze
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
652015
Reference architecture model for the industrial data space
B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, ...
Fraunhofer-Gesellschaft, 2017
532017
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking Into Android Apps
J Schütte, D Titze, JM de Fuentes
492014
reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption
M Schanzenbach, G Bramm, J Schütte
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
462018
blockchain und Smart contracts: technologien, Forschungsfragen und Anwendungen
J Schütte, G Fridgen, W Prinz, T Rose, N Urbach, T Hoeren, ...
462017
LUCON: Data flow control for message-based IoT systems
J Schütte, GS Brost
2018 17th IEEE international conference on trust, security and privacy in …, 2018
442018
Blockchain-based distributed attribute based encryption
G Bramm, M Gall, J Schütte
Proceedings of the 15th International Joint Conference on e-Business and …, 2018
362018
An ecosystem and IoT device architecture for building trust in the industrial data space
GS Brost, M Huber, M Weiß, M Protsenko, J Schütte, S Wessel
Proceedings of the 4th ACM workshop on cyber-physical system security, 39-50, 2018
302018
Test-based cloud service certification of opportunistic providers
P Stephanow, G Srivastava, J Schütte
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 843-848, 2016
302016
Towards semantic resolution of security in ambient environments
A Maña, C Rudolph, M Hoffmann, A Badii, S Engberg, R Nair, D Thiemert, ...
Developing Ambient Intelligence: Proceedings of the International Conference …, 2008
282008
Blockchain and smart contracts
J Schütte, G Fridgen, W Prinz, T Rose, N Urbach, T Hoeren, ...
Fraunhofer-Gesellschaft, 2018
26*2018
An antivirus API for Android malware recognition
R Fedler, M Kulicke, J Schütte
Malicious and Unwanted Software:" The Americas"(MALWARE), 2013 8th …, 2013
252013
Annotary: A concolic execution system for developing secure smart contracts
K Weiss, J Schütte
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
242019
Native Code Execution Control for Attack Mitigation on Android
R Fedler, M Kulicke, J Schütte
ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2013
242013
simTD security architecture: Deployment of a security and privacy architecture in field operational tests
N Bißmeyer, H Stübing, M Mattheß, JP Stotz, J Schütte, M Gerlach, ...
232009
App-Ray: User-driven and Fully Automated Android App Security Assessment
D Titze, P Stephanow, J Schütte
202013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20