default search action
Jan Werner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Jan Werner:
Speculative trade under ambiguity. J. Econ. Theory 199: 105200 (2022) - 2021
- [j4]Ramon Marimon, Jan Werner:
The envelope theorem, Euler and Bellman equations, without differentiability. J. Econ. Theory 196: 105309 (2021) - [c10]Mac Malone, Yicheng Wang, Kedrian James, Murray Anderegg, Jan Werner, Fabian Monrose:
To Gamify or Not?: On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention. SIGCSE 2021: 1135-1141 - 2020
- [c9]Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs. ACSAC 2020: 345-359
2010 – 2019
- 2019
- [c8]Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. AsiaCCS 2019: 73-85 - [c7]Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. IEEE Symposium on Security and Privacy 2019: 20-38 - 2018
- [c6]Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. EuroS&P 2018: 167-182 - [c5]Fabian Monrose, Jan Werner:
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises. SecDev 2018: 132-133 - 2016
- [c4]Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis:
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software. AsiaCCS 2016: 35-46 - [c3]Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo, Fabian Monrose, Michalis Polychronakis:
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. IEEE Symposium on Security and Privacy 2016: 954-968 - 2011
- [j3]Tomasz Strzalecki, Jan Werner:
Efficient allocations under ambiguity. J. Econ. Theory 146(3): 1173-1194 (2011)
2000 – 2009
- 2007
- [j2]Matthew Eby, Jan Werner, Gabor Karsai, Ákos Lédeczi:
Embedded systems security co-design. SIGBED Rev. 4(2): 1-4 (2007) - [j1]Janos L. Mathe, Sean Duncavage, Jan Werner, Bradley A. Malin, Ákos Lédeczi, Janos Sztipanovits:
Towards the security and privacy analysis of patient portals. SIGBED Rev. 4(2): 5-9 (2007) - [c2]Sean Duncavage, Janos L. Mathe, Jan Werner, Bradley A. Malin, Ákos Lédeczi, Janos Sztipanovits:
A Modeling Environment for Patient Portals. AMIA 2007 - [c1]Matthew Eby, Jan Werner, Gabor Karsai, Ákos Lédeczi:
Integrating Security Modeling into Embedded System Design. ECBS 2007: 221-228
1980 – 1989
- 1986
- [b1]Jan Werner:
Arbitrage and equilibrium in economies with incomplete markets. University of Bonn, Germany, 1986, pp. 1-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint