Folgen
Adrian Spalka
Adrian Spalka
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei spalka.com
Titel
Zitiert von
Zitiert von
Jahr
A comprehensive approach to anomaly detection in relational databases
A Spalka, J Lehnhardt
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working …, 2005
562005
Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs
A Spalka, AB Cremers, H Langweg
Trusted Information: The New Decade Challenge 16, 403-419, 2001
472001
Computer implemented method for authenticating a user
A Spalka, J Lenhardt
US Patent 8,522,011, 2013
462013
The fairy tale of’what you see is what you sign’-trojan horse attacks on software for digital signatures
A Spalka, AB Cremers, H Langweg
Proceedings of the IFIP WG 9 (11.7), 75-86, 2001
392001
Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
A Spalka, J Lehnhardt, F Gotthardt
US Patent 8,661,247, 2014
382014
Database system, computer system, and computer-readable storage medium for decrypting a data record
A Spalka, J Lehnhardt
US Patent 8,887,254, 2014
352014
Method for providing cryptographical key pairs
A Spalka, J Lenhardt
US Patent 8,605,899, 2013
232013
Trojan horse attacks on software for electronic signatures
A Spalka, AB Cremers, H Langweg
INFORMATICA-LJUBLJANA- 26 (2), 191-204, 2002
232002
Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
A Spalka, J Lehnhardt
US Patent 8,695,106, 2014
182014
Computer readable storage medium for generating an access key, computer implemented method and computing device
A Spalka, J Lehnhardt
US Patent 8,516,267, 2013
182013
Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method
A Spalka, J Lehnhardt, T Rho
US Patent App. 14/080,126, 2014
172014
Method for generating an asymmetric cryptographic key pair and its application
A Spalka, J Lehnhardt
US Patent 8,266,435, 2012
172012
Computer readable storage medium for generating a pseudonym, computer implemented method and computing device
A Spalka, J Lehnhardt
US Patent 8,024,581, 2011
172011
Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
A Spalka, J Lehnhardt, F Gotthardt
US Patent App. 14/156,919, 2014
162014
Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
A Spalka, J Lenhardt
US Patent 8,699,705, 2014
152014
Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system
A Spalka, J Lehnhardt
US Patent 8,677,146, 2014
142014
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
A Spalka, J Lehnhardt
US Patent App. 14/080,110, 2014
132014
Apparatus for encrypting data
A Spalka, J Lehnhardt
US Patent 8,675,864, 2014
132014
Client computer for querying a database stored on a server via a network
A Spalka, J Lehnhardt
US Patent 9,672,236, 2017
122017
Client computer for querying a database stored on a server via a network
A Spalka, J Lehnhardt
US Patent 9,558,228, 2017
122017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20