Veröffentlichungen
Cloud-Sicherheit ohne vertrauenswürdige Administration
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld
In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]A Privacy Preserving System for Cloud Computing
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Mutual Remote Attestation: Enabling System Cloning for TPM based Platforms
2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus
[Paper]Expressiveness Considerations of XML Signatures
2011 - Meiko Jensen, Christopher Meyer
In Proceedings of the 3rd IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE), Munich, Germany. [Paper] [Slides]MARV - Data Level Confidentiality Protection in BPEL-based Web Service Compositions
2011 - Majernik, Filip, Meiko Jensen, Jörg Schwenk
In Proceedings of the 6th International Conference on Network Architectures and Information Systems Security (SAR-SSI), La Rochelle, France.Security Prospects through Cloud Computing by Adopting Multiple Clouds
2011 - Bohli, Jens-Matthias, Meiko Jensen, Gruschka, Nils, Lo Iacono, Luigi, Jörg Schwenk
In Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD), Washington, D.C., USA.Towards Privacy-Preserving XML Transformation
2011 - Meiko Jensen, Kerschbaum, Florian
In Proceedings of the 9th IEEE International Conference on Web Services (ICWS), Washington, D.C., USA.Sicheres Single Sign-On mit dem SAML Holder-of-Key Web Browser SSO Profile und SimpleSAMLphp
2011 - Andreas Mayer, Jörg Schwenk
In 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, Seiten 33--46, SecuMedia VerlagEvaluating the Impact of Transmission Power on QoS in Wireless Mesh Networks
2011 - Andreas Noack, Patrick-Benjamin Bök, Sebastian Krück
IEEE ICCCN 2011 Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services - ContextQoS 2011, Hawaii, Juli-August 2011 (to be published)Mining Network and the Security Question
2011 - Christoph Müller, Andreas Noack
35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011 (to be published)Safety Support Functions for Underground Network Communications
2011 - Christoph Müller, Andreas Noack
35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011 (to be published)Trust Agreement in Wireless Mesh Networks
2011 - Andreas Noack
WISTP'11 - Workshop in Information Security Theory and Practice, Greece, June 2011 (to be published)On Interoperability Failures in WS-Security: The XML Signature Wrapping Attack
2011 - Nils Gruschka, Meiko Jensen, Florian Kohlar, Lijun Liao
In E. Kajan: Electronic Business Interoperability: Concepts, Opportunities and Challenges, Business Science Reference, Hershey, NY, USA. ISBN 978-1-60960-485-1. 2011Tight Proofs for Signature Schemes without Random Oracles
2011 - Sven Schäge
Accepted for EUROCRYPT 2011, Tallinn, Estonia, May 15th-19th, 2011. [Full Version]The semi-generic group model and applications to pairing-based cryptography
2010 - Tibor Jager, Andy Rupp
ASIACRYPT 2010Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
2010 - Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
PKC 2010Mobile Machine Operation in Underground Networks and the Security Question
2010 - Andreas Noack, Christoph Müller
escar'10 - 8th conference on Embedded Security in Cars, Bremen, Germany [Conference Link]Generic Compilers for Authenticated Key Exchange
2010 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
In Proceedings of ASIACRYPT 2010, Singapore [Full Version]Mutual Preimage Authentication for fast Handover in Enterprise Networks
2010 - Andreas Noack, Mark Borrmann
The 5th International Symposium on Information Security (IS'10), Greece, 2010Security Analysis of OpenID
2010 - Pavol Sovis, Florian Kohlar, Jörg Schwenk
In "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference", 2010. [Camery Ready]Group Key Agreement Performance in Wireless Mesh Networks
2010 - Andreas Noack, Jörg Schwenk
35th Annual IEEE Conference on Local Computer Networks and Workshops, LCN 2010 [Konferenz]Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern
2010 - Ulrich Greveler, Dennis Löhr
[Paper]A New RSA-Based Signature Scheme
2010 - Sven Schäge, Jörg Schwenk
AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. [Springer Link]Streaming-Based Verification of XML Signatures in SOAP Messages
2010 - Juraj Somorovsky, Meiko Jensen, Jörg Schwenk
In Proceedings of the IEEE International Workshop on Web Service and Business Process Security (WSBPS), Miami, Florida, U.S.A., 2010.Ethernet communication for detection of emergency locations and dynamic evacuation in underground infrastructures
2010 - Dipl.-Ing. Christoph Müller, Prof. Dr. Iuliu Szekely, Andreas Noack
OPTIM 2010 - 12th International Conference on Optimization of Electrical and Electronic Equipment [Conference Link]Trusted Virtual Domains: Color Your Network
2010 - Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Datenschutz und Datensicherheit (DuD) 5/2010, p. 289-298. [SpringerLink] [PDF]Attack Surfaces: A Taxonomy for Attacks on Cloud Services
2010 - Meiko Jensen, Nils Gruschka
In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA.On Interoperability Failures in WS-Security: The XML Signature Wrapping Attack
2010 - Lijun Liao, Meiko Jensen, Florian Kohlar, Nils Gruschka
In E. Kajan: Electronic Business Interoperability: Concepts, Opportunities and Challenges, Information Science Reference, (to be published in 2011).Streaming-based verification of XML Signatures in SOAP Messages
2010 - Jörg Schwenk, Meiko Jensen,
In Proceedings of the IEEE 2010 International Workshop on Web Service and Business Process Security (WSBPS 2010), Miami, FL, USA.Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing
2010 - Jörg Schwenk, Sven Schäge, Meiko Jensen,
In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA. [IEEE]Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions
2010 - Meiko Jensen, Ralph Herkenhöner, Henrich C. Pöhls, Hermann de Meer
In Proceedings of the IEEE 2010 International Workshop on Web Service and Business Process Security (WSBPS 2010), Miami, FL, USA.A Survey of Attacks in the Web Services World
2010 - Meiko Jensen, Nils Gruschka
In C. Gutierrez, E. Fernandez-Medina, M. Piattini: Web Services Security Development and Architecture, Information Science Reference, ISBN: 978-1-60566-950-2, 2010.A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys
2010 - Jörg Schwenk, Sven Schäge,
Financial Cryptography Fourteenth International Conference, FC 2010, Tenerife, Spain, January 25-28, 2010. [Springer Link]A Design Pattern for Event-Based Processing of Security-enriched SOAP Messages
2010 - Meiko Jensen, Nils Gruschka, Luigi Lo Iacono
Proceedings of the Second International Workshop on Security Aspects in Grid and Cloud Computing (SAGC 2010), Krakow, Poland.Secure Bindings of SAML Assertions to TLS Sessions
2010 - Jörg Schwenk, Sebastian Gajek, Meiko Jensen, Florian Kohlar,
Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Krakow, Poland.On the analysis of cryptographic assumptions in the generic ring model
2009 - Tibor Jager, Jörg Schwenk
ASIACRYPT 2009A Security Modeling Approach for Web-Service-based Business Processes
2009 - Meiko Jensen, Sven Feja
Proceedings of the 7th IEEE Workshop on Model-Based Development for Computer-Based Systems (MBD 2009), held as part of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), San Francisco, USAAnalysis of Signature Wrapping Attacks and Countermeasures
2009 - Jörg Schwenk, Sebastian Gajek, Lijun Liao, Meiko Jensen,
Proceedings of the 7th IEEE International Conference on Web Services (ICWS), Los Angeles, USA, 2009.Dynamic Threshold Cryptosystem without Group Manager
2009 - Andreas Noack, M.Sc. Stefan Spitz
International Journal of Network Protocols and Algorithms (ISSN: 1943-3581) [Journal]Efficient Authenticated Wireless Roaming via Tunnels
2009 - Andreas Noack,
Third International Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications, Las Palmas de Gran Canaria, Spain; 25 November 2009Efficient Authenticated Wireless Roaming via Tunnels
2009 - Andreas Noack,
Technical Report. Full paper with security proof. [PDF]Extending the Similarity-Based XML Multicast Approach with Digital Signatures
2009 - Jörg Schwenk, Meiko Jensen, Antonia Azzini, Stefania Marrara
Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.Generating WS-SecurityPolicy Documents via Security Model Transformation
2009 - Meiko Jensen,
Proceedings of the Young Researchers Workshop on Modeling and Management of Business Processes (YRW-MBP 2009), held as part of SABRE 2009, Leipzig, GermanyGroup Key Agreement for Wireless Mesh Networks
2009 - Jörg Schwenk, Andreas Noack,
The 5th LCN Workshop on Security in Communications Networks (SICK 2009) Zürich, Switzerland; 20-23 October 2009On Technical Security Issues in Cloud Computing
2009 - Jörg Schwenk, Meiko Jensen, Nils Gruschka, Luigi Lo Iacono
Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II 2009), Bangalore, IndiaThe Accountability Problem of Flooding Attacks in Service-Oriented Architectures
2009 - Jörg Schwenk, Meiko Jensen,
Proceedings of the IEEE International Conference on Availability, Reliability, and Security (ARES)The Curse of Namespaces in the Domain of XML Signature
2009 - Jörg Schwenk, Lijun Liao, Meiko Jensen,
Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.Twin Signatures, Revisited
2009 - Sven Schäge,
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. [Springer Link]Sichere Webanwendungen
2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami
GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949