Veröffentlichungen

Dynamic Threshold Cryptosystem without Group Manager

2009 - Andreas Noack, M.Sc. Stefan Spitz

International Journal of Network Protocols and Algorithms (ISSN: 1943-3581) [Journal]

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Third International Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications, Las Palmas de Gran Canaria, Spain; 25 November 2009

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Technical Report. Full paper with security proof. [PDF]

Extending the Similarity-Based XML Multicast Approach with Digital Signatures

2009 - Jörg Schwenk, Meiko Jensen, Antonia Azzini, Stefania Marrara

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Generating WS-SecurityPolicy Documents via Security Model Transformation

2009 - Meiko Jensen,

Proceedings of the Young Researchers Workshop on Modeling and Management of Business Processes (YRW-MBP 2009), held as part of SABRE 2009, Leipzig, Germany

Group Key Agreement for Wireless Mesh Networks

2009 - Jörg Schwenk, Andreas Noack,

The 5th LCN Workshop on Security in Communications Networks (SICK 2009) Zürich, Switzerland; 20-23 October 2009

On Technical Security Issues in Cloud Computing

2009 - Jörg Schwenk, Meiko Jensen, Nils Gruschka, Luigi Lo Iacono

Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II 2009), Bangalore, India

The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

2009 - Jörg Schwenk, Meiko Jensen,

Proceedings of the IEEE International Conference on Availability, Reliability, and Security (ARES)

The Curse of Namespaces in the Domain of XML Signature

2009 - Jörg Schwenk, Lijun Liao, Meiko Jensen,

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Twin Signatures, Revisited

2009 - Sven Schäge,

Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. [Springer Link]

Sichere Webanwendungen

2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami

GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949

A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk

ESORICS 2008

On Black-Box Ring Extraction and Integer Factorization

2008 - Kristina Altmann, Tibor Jager, Andy Rupp

ICALP 2008

On the equivalence of generic group models

2008 - Tibor Jager, Jörg Schwenk

ProvSec 2008

Property-Based Attestation without a Trusted Third Party

2008 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis,

Information Security Conference (ISC'08), 2008. [pdf]

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

2008 - Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante

Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sydney, Australia. [Springer Link] [pdf]

Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen

2008 - Sebastian Gajek, Sven Schäge, Xuan Chen, Christoph Löhr

Datenschutz und Datensicherheit - DuD. Volume 32, Number 8, Seiten 515-519. Vieweg Verlag, August 2008. [Springer Link]

A Forensic Framework for Tracing Phishers

2008 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

International Federation for Information Processing, to appear in LNCS 6102. [pdf]

A novel solution for end-to-end integrity protection in signed PGP mail

2008 - Jörg Schwenk, Lijun Liao,

ICICS 2008, Birmingham, UK

Code Voting with Linkable Group Signatures

2008 - Jörg Schwenk, Sven Schäge, Jörg Helbach

3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria 2008. In LNI, 2008. [LNI Link]

Finding Hash Collisions

2008 - Sven Schäge,

VDM Verlag Dr. Müller e.K., 2008. ISBN-13: 978-3639066135. [Amazon Link]

Modeling and Transformation of Security Requirements: An Approach for Service-oriented Architectures

2008 - Jörg Schwenk, Meiko Jensen, Ralph Herkenhöner, Sven Feja, Hermann de Meer, Andreas Speck

Proceedings of the First Euro-NF Workshop on Future Internet Architecture: New Trends in Service & Networking Architectures, 21. November 2008, Paris, France

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS

2008 - Tibor Jager, Heiko Jäkel, Jörg Schwenk

Sicherheit 2008.

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

Accepted for ASIACCS'08. [ACM Link]

Securing Email Communication with XML Technology

2008 - Jörg Schwenk, Lijun Liao, Mark Manulis,

"Handbook of Research on Information Security and Assurance", to be published in August 2008 by Information Science Reference. [IGI Global]

Stronger TLS Bindings for SAML Assertions and SAML Artifacts

2008 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'08), Virginia (USA), 2008.

TLS Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management

2008 - Jörg Schwenk,

This paper describes a novel approach that integrates Federated IDM and SSL.

Universally Composable Security Analysis of TLS

2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira

Accepted for the Second Confer­ence on Provable Security (ProvSec), 2008. [pdf]

Trusted User-Aware Web Authentication

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy,

Presented at the Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07), Stanford, USA, June 22, 2007. [PDF]

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

In Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, April 10-13, 2007, pages 120-127. IEEE Computer Society, 2007. [pdf]

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

2007 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante

11th International Conference on Financial Cryptography and Data Security (FC 2007), Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, volume 4886 of Lecture Notes on Computer Sience (LNCS), pages 29-44. Springer Verlag, 2007. [pdf]

Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages

2007 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

In Transactions on Data Hiding and Multimedia Security II, volume 4499 of Lecture Notes on Computer Sience (LNCS), pages 1-34. Springer Verlag, 2007. [?]

Phishing Phishers - Observing and Tracing Organized Cybercrime

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), Silicon Valley, California, July 1-5, 2007, page 3. IEEE Computer Society, 2007. [IEEE Link]

Aktuelle Gefahren im Onlinebanking-Technische und Juristische Hintergründe.

2007 - Jörg Schwenk, Georg Borges, Sebastian Gajek, Christoph Wegener, Isabelle Biallaß, Julia Meyer, Dennis Werner

In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.

Breaking and Fixing the Inline Approach.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'07), Alexandria (USA), 2007 .

Browser Models for Usable Authentication Protocols

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

Presented at the Workshop on Web 2.0 Security and Privacy (W2SP 2007) held in conjunction with the IEEE Symposium on Security and Privacy, Oakland, California, May 24, 2007. [pdf]

Browser Models for Usable Authentication Protocols.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.

Browser-based Authentication Protocols for Naive Users.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Compartmented Security for Browsers

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, September 9-10, 2007, Vienna, Austria.

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, July 4-6, 2007, Bochum, Germany. [Springer Link]

Ein Framework zur Identifikation von Identitätsbetrügern, Geldwäschern und Phishing-Simulanten.

2007 - Sebastian Gajek, Felix Gröbert, Macimillian Dornseif, Dominik Birk

In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.

End-to-End Header Protection in S/MIME and PGP Mail.

2007 - Jörg Schwenk, Lijun Liao,

Postersession in the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007. [PDF]

End-to-End Header Protection in Signed S/MIME.

2007 - Jörg Schwenk, Lijun Liao,

In Proceedings of the 2nd International Symposium on Information Security (IS'07), Nov 26-27, 2007 in Vilamoura, Algarve, Portugal.

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

2007 - Mark Manulis, Emmanuel Bresson

In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), 11-13 July, Hong Kong, China. [PDF] [Bibtex]

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

2007 - Mark Manulis, Emmanuel Bresson

In Proceedings of the International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), Wroclaw (Poland), 2007.

On Security Models and Compilers for Group Key Exchange Protocols.

2007 - Jörg Schwenk, Mark Manulis, Emmanuel Bresson

In Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Nara (Japan), 2007. [PDF] [Bibtex]

Phishing Phishers -- Observing and Tracing Organized Cybercrime.

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the 2nd IEEE International Conference on Internet Monitoring and Protection (ICIMP'07), Silicon Valley (USA), 2007.

Provably Secure Framework for Information Aggregation in Sensor Networks.

2007 - Jörg Schwenk, Mark Manulis,

In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur (Malaysia), 2007 . [PDF] [Bibtex]
Seite: