Veröffentlichungen

Trusted User-Aware Web Authentication

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy,

Presented at the Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07), Stanford, USA, June 22, 2007. [PDF]

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

In Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, April 10-13, 2007, pages 120-127. IEEE Computer Society, 2007. [pdf]

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

2007 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante

11th International Conference on Financial Cryptography and Data Security (FC 2007), Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, volume 4886 of Lecture Notes on Computer Sience (LNCS), pages 29-44. Springer Verlag, 2007. [pdf]

Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages

2007 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

In Transactions on Data Hiding and Multimedia Security II, volume 4499 of Lecture Notes on Computer Sience (LNCS), pages 1-34. Springer Verlag, 2007. [?]

Phishing Phishers - Observing and Tracing Organized Cybercrime

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), Silicon Valley, California, July 1-5, 2007, page 3. IEEE Computer Society, 2007. [IEEE Link]

Aktuelle Gefahren im Onlinebanking-Technische und Juristische Hintergründe.

2007 - Jörg Schwenk, Georg Borges, Sebastian Gajek, Christoph Wegener, Isabelle Biallaß, Julia Meyer, Dennis Werner

In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.

Breaking and Fixing the Inline Approach.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'07), Alexandria (USA), 2007 .

Browser Models for Usable Authentication Protocols

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

Presented at the Workshop on Web 2.0 Security and Privacy (W2SP 2007) held in conjunction with the IEEE Symposium on Security and Privacy, Oakland, California, May 24, 2007. [pdf]

Browser Models for Usable Authentication Protocols.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.

Browser-based Authentication Protocols for Naive Users.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Compartmented Security for Browsers

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, September 9-10, 2007, Vienna, Austria.

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, July 4-6, 2007, Bochum, Germany. [Springer Link]

Ein Framework zur Identifikation von Identitätsbetrügern, Geldwäschern und Phishing-Simulanten.

2007 - Sebastian Gajek, Felix Gröbert, Macimillian Dornseif, Dominik Birk

In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.

End-to-End Header Protection in S/MIME and PGP Mail.

2007 - Jörg Schwenk, Lijun Liao,

Postersession in the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007. [PDF]

End-to-End Header Protection in Signed S/MIME.

2007 - Jörg Schwenk, Lijun Liao,

In Proceedings of the 2nd International Symposium on Information Security (IS'07), Nov 26-27, 2007 in Vilamoura, Algarve, Portugal.

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

2007 - Mark Manulis, Emmanuel Bresson

In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), 11-13 July, Hong Kong, China. [PDF] [Bibtex]

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

2007 - Mark Manulis, Emmanuel Bresson

In Proceedings of the International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), Wroclaw (Poland), 2007.

On Security Models and Compilers for Group Key Exchange Protocols.

2007 - Jörg Schwenk, Mark Manulis, Emmanuel Bresson

In Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Nara (Japan), 2007. [PDF] [Bibtex]

Phishing Phishers -- Observing and Tracing Organized Cybercrime.

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the 2nd IEEE International Conference on Internet Monitoring and Protection (ICIMP'07), Silicon Valley (USA), 2007.

Provably Secure Framework for Information Aggregation in Sensor Networks.

2007 - Jörg Schwenk, Mark Manulis,

In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur (Malaysia), 2007 . [PDF] [Bibtex]

Secure Emails in XML Format Using Web Services.

2007 - Jörg Schwenk, Lijun Liao,

In Proceedings of the 5th IEEE European Conference on Web Services (ECOWS 07), November 26-28, 2007 in Halle (Saale), Germany.

Secure Internet Voting With Code Sheets.

2007 - Jörg Schwenk, Jörg Helbach

In Proceedings of the FIDIS First Conference on E-Voting and Identity. Bochum (Germany), 4-5 October 2007.

Securing Email Communication with XML Technology.

2007 - Jörg Schwenk, Lijun Liao,

The 2007 International Conference on Internet Computing (ICOMP 2007), 25-28 June 2007, Las Vegas, USA.

Security of Mircrosoft's Identity Metasystem and CardSpace .

2007 - Sebastian Gajek, Ralf Hauser, Rolf Oppliger

In Proceedings of Kommunikation in Verteilten Systemen (KiVS '07), Industry Track, Bern (Switzerland), 2007 .

Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Datenschutz und Datensicherheit, Ausgabe 2007/11

SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services .

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the IEEE ECOWS Workshop on Emerging Web Services Technology (WEWST'07), Halle (Germany), 2007 .

Towards a Formal Semantic of XML Signature.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

W3C Workshop Next Steps for XML Signature and XML Encryption, Mountain View (USA), 2007.

Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks

2007 - Lijun Liao, Mark Manulis,

in Future Generation Computer Systems (FGCS), 23(6):787-803, 2007, Elsevier. [Elsevier]

Trustworthy Signing with Smart Card System in Untrustworthy Environments.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

e-Smart conference and demos 2007, 19-21 September 2007, Sophia Antipolis, French Riviera.

Using Two-Steps Hash Function to Support Trustworthy Signing.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.
Seite: