A comprehensive approach to anomaly detection in relational databases A Spalka, J Lehnhardt Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working …, 2005 | 61 | 2005 |
Computer implemented method for authenticating a user A Spalka, J Lenhardt US Patent 8,522,011, 2013 | 56 | 2013 |
Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs A Spalka, AB Cremers, H Langweg Trusted Information: The New Decade Challenge 16, 403-419, 2001 | 48 | 2001 |
Computer implemented method for performing cloud computing on data being stored pseudonymously in a database A Spalka, J Lehnhardt, F Gotthardt US Patent 8,661,247, 2014 | 46 | 2014 |
Database system, computer system, and computer-readable storage medium for decrypting a data record A Spalka, J Lehnhardt US Patent 8,887,254, 2014 | 43 | 2014 |
The fairy tale of’what you see is what you sign’-trojan horse attacks on software for digital signatures A Spalka, AB Cremers, H Langweg Proceedings of the IFIP WG 9 (11.7), 75-86, 2001 | 39 | 2001 |
Computer implemented method for generating a pseudonym, computer readable storage medium and computer system A Spalka, J Lenhardt US Patent 8,719,587, 2014 | 25 | 2014 |
Trojan horse attacks on software for electronic signatures A Spalka, AB Cremers, H Langweg INFORMATICA-LJUBLJANA- 26 (2), 191-204, 2002 | 25 | 2002 |
Method for providing cryptographical key pairs A Spalka, J Lenhardt US Patent 8,605,899, 2013 | 24 | 2013 |
Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method A Spalka, J Lehnhardt, T Rho US Patent App. 14/080,126, 2014 | 21 | 2014 |
Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database A Spalka, J Lehnhardt US Patent 8,695,106, 2014 | 21 | 2014 |
Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device A Spalka, J Lenhardt US Patent 8,699,705, 2014 | 20 | 2014 |
Computer readable storage medium for generating an access key, computer implemented method and computing device A Spalka, J Lehnhardt US Patent 8,516,267, 2013 | 20 | 2013 |
Method for generating an asymmetric cryptographic key pair and its application A Spalka, J Lehnhardt US Patent 8,266,435, 2012 | 19 | 2012 |
Computer readable storage medium for generating a pseudonym, computer implemented method and computing device A Spalka, J Lehnhardt US Patent 8,024,581, 2011 | 19 | 2011 |
Computer implemented method for performing cloud computing on data being stored pseudonymously in a database A Spalka, J Lehnhardt, F Gotthardt US Patent App. 14/156,919, 2014 | 18 | 2014 |
Client computer for querying a database stored on a server via a network A Spalka, J Lehnhardt US Patent 9,495,555, 2016 | 15 | 2016 |
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method A Spalka, J Lehnhardt US Patent App. 14/080,110, 2014 | 15 | 2014 |
Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system A Spalka, J Lehnhardt US Patent 8,677,146, 2014 | 15 | 2014 |
Client computer for querying a database stored on a server via a network A Spalka, J Lehnhardt US Patent 9,672,236, 2017 | 13 | 2017 |