Veröffentlichungen

Sichere Webanwendungen

2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami

GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949

A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk

ESORICS 2008

On Black-Box Ring Extraction and Integer Factorization

2008 - Kristina Altmann, Tibor Jager, Andy Rupp

ICALP 2008

On the equivalence of generic group models

2008 - Tibor Jager, Jörg Schwenk

ProvSec 2008

Property-Based Attestation without a Trusted Third Party

2008 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis,

Information Security Conference (ISC'08), 2008. [pdf]

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

2008 - Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante

Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sydney, Australia. [Springer Link] [pdf]

Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen

2008 - Sebastian Gajek, Sven Schäge, Xuan Chen, Christoph Löhr

Datenschutz und Datensicherheit - DuD. Volume 32, Number 8, Seiten 515-519. Vieweg Verlag, August 2008. [Springer Link]

A Forensic Framework for Tracing Phishers

2008 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

International Federation for Information Processing, to appear in LNCS 6102. [pdf]

A novel solution for end-to-end integrity protection in signed PGP mail

2008 - Jörg Schwenk, Lijun Liao,

ICICS 2008, Birmingham, UK

Code Voting with Linkable Group Signatures

2008 - Jörg Schwenk, Sven Schäge, Jörg Helbach

3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria 2008. In LNI, 2008. [LNI Link]

Finding Hash Collisions

2008 - Sven Schäge,

VDM Verlag Dr. Müller e.K., 2008. ISBN-13: 978-3639066135. [Amazon Link]

Modeling and Transformation of Security Requirements: An Approach for Service-oriented Architectures

2008 - Jörg Schwenk, Meiko Jensen, Ralph Herkenhöner, Sven Feja, Hermann de Meer, Andreas Speck

Proceedings of the First Euro-NF Workshop on Future Internet Architecture: New Trends in Service & Networking Architectures, 21. November 2008, Paris, France

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS

2008 - Tibor Jager, Heiko Jäkel, Jörg Schwenk

Sicherheit 2008.

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

Accepted for ASIACCS'08. [ACM Link]

Securing Email Communication with XML Technology

2008 - Jörg Schwenk, Lijun Liao, Mark Manulis,

"Handbook of Research on Information Security and Assurance", to be published in August 2008 by Information Science Reference. [IGI Global]

Stronger TLS Bindings for SAML Assertions and SAML Artifacts

2008 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'08), Virginia (USA), 2008.

TLS Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management

2008 - Jörg Schwenk,

This paper describes a novel approach that integrates Federated IDM and SSL.

Universally Composable Security Analysis of TLS

2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira

Accepted for the Second Confer­ence on Provable Security (ProvSec), 2008. [pdf]
Seite: