Veröffentlichungen

On the Fragility and Limitations of Current Browser-provided Clickjacking Protection Schemes

2012 - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz, Martin Johns

6th USENIX Workshop on Offensive Technologies (WOOT), Bellevue, WA, August 2012 [PDF]

Forensic Content Detection through Power Consumption

2012 - Ulrich Greveler, Dennis Löhr, Benjamin Justus

[Paper]

Mining Network and the Security Question

2011 - Christoph Müller, Andreas Noack

35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011 (to be published)

Mobile Machine Operation in Underground Networks and the Security Question

2010 - Andreas Noack, Christoph Müller

escar'10 - 8th conference on Embedded Security in Cars, Bremen, Germany [Conference Link]

Trusted Virtual Domains: Color Your Network

2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Third International Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications, Las Palmas de Gran Canaria, Spain; 25 November 2009

End-to-End Header Protection in S/MIME and PGP Mail.

2007 - Jörg Schwenk, Lijun Liao,

Postersession in the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007. [PDF]

A Case Study on Online-Banking Security.

2006 - Jörg Schwenk, Sebastian Gajek, Henrik te Heesen

International Conference on Emerging Trends in Information and Communication Security (ETRICS'06) Workshop on Security and Privacy in Future Business Services, Freiburg (Germany), 2006 .

Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.

2006 - Mark Manulis,

in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), 21-24 March, Taipei, Taiwan. [ACM Link] [PDF ] [Bibtex]

Tree-based Group Key Agreement Framework for Mobile Ad-Hoc Networks.

2006 - Lijun Liao, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), 2nd International Workshop on Security in Networks and Distributed Systems (SNDS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security

2005 - Ulrich Greveler, Andre Adelsbach,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Key-Assignment Strategies for CPPM.

2004 - Jörg Schwenk, Andre Adelsbach,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]

Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

2004 - Jörg Schwenk, Mark Manulis,

In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005. [Springer Link] [PDF] [Bibtex]

Tree based Key Agreement for Multicast.

2001 - Jörg Schwenk, T. Martin, R. Schaffelhofer

Proc. Communications and Multimedia Security 2001, Mai 2001, Darmstadt.

How to securely broadcast a secret.

1999 - Jörg Schwenk,

In: B. Preneel (Ed.): Proceedings Communications an Multimedia Security '99, Kluwer Academic Publishers, 1999.
Seite: