Christopher Mann

Learn More
We report on applying techniques for static information flow analysis to identify privacy leaks in Android applications. We have crafted a framework which checks with the help of a security type system whether the Dalvik bytecode implementation of an Android app conforms to a given privacy policy. We have carefully analyzed the Android API for possible(More)
  • Glen L Urban, John R Hauser, David Austin, John R Hauser Is Kirin, Vince Barabba, Iakov Bart +25 others
  • 2004
By " listening in " to ongoing dialogues between customers and Web-based virtual advisers (e.g., Kelley Blue Book's Auto Choice Advisor), the authors identify new product opportunities based on new combinations of customer needs. The data are available at little incremental cost and provide the scale necessary for complex products (e.g., 148 trucks and 129(More)
Infection with high-risk genital human papillomavirus (HPV) types is a major risk factor for the development of cervical intraepithelial neoplasia (CIN) and invasive cervical carcinoma. The design of effective immunotherapies requires a greater understanding of how HPV-specific T-cell responses are involved in disease clearance and/or progression. Here, we(More)
BACKGROUND The lymph node status of a patient is a key determinate in staging, prognosis and adjuvant treatment of endometrial cancer. Despite this, the potential additional morbidity associated with lymphadenectomy makes its role controversial. This study systematically reviews the accuracy literature on sentinel node biopsy; ultra sound scanning, magnetic(More)
We show how to realize two-factor authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3–4):218–239, 2004. doi: 10.1007/s10207-004-0041-0 ) in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both:(More)
We show how to realize two-factor authentication for a Bitcoin wallet employing the two-party ECDSA signature protocol adapted from MacKen-zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification over a separate channel. Since we use a smart phone as the second(More)
  • 1