Veröffentlichungen

On Security Models and Compilers for Group Key Exchange Protocols.

2007 - Jörg Schwenk, Mark Manulis, Emmanuel Bresson

In Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Nara (Japan), 2007. [PDF] [Bibtex]

Phishing Phishers -- Observing and Tracing Organized Cybercrime.

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the 2nd IEEE International Conference on Internet Monitoring and Protection (ICIMP'07), Silicon Valley (USA), 2007.

Provably Secure Framework for Information Aggregation in Sensor Networks.

2007 - Jörg Schwenk, Mark Manulis,

In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur (Malaysia), 2007 . [PDF] [Bibtex]

Secure Emails in XML Format Using Web Services.

2007 - Jörg Schwenk, Lijun Liao,

In Proceedings of the 5th IEEE European Conference on Web Services (ECOWS 07), November 26-28, 2007 in Halle (Saale), Germany.

Secure Internet Voting With Code Sheets.

2007 - Jörg Schwenk, Jörg Helbach

In Proceedings of the FIDIS First Conference on E-Voting and Identity. Bochum (Germany), 4-5 October 2007.

Securing Email Communication with XML Technology.

2007 - Jörg Schwenk, Lijun Liao,

The 2007 International Conference on Internet Computing (ICOMP 2007), 25-28 June 2007, Las Vegas, USA.

Security of Mircrosoft's Identity Metasystem and CardSpace .

2007 - Sebastian Gajek, Ralf Hauser, Rolf Oppliger

In Proceedings of Kommunikation in Verteilten Systemen (KiVS '07), Industry Track, Bern (Switzerland), 2007 .

Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Datenschutz und Datensicherheit, Ausgabe 2007/11

SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services .

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the IEEE ECOWS Workshop on Emerging Web Services Technology (WEWST'07), Halle (Germany), 2007 .

Towards a Formal Semantic of XML Signature.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

W3C Workshop Next Steps for XML Signature and XML Encryption, Mountain View (USA), 2007.

Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks

2007 - Lijun Liao, Mark Manulis,

in Future Generation Computer Systems (FGCS), 23(6):787-803, 2007, Elsevier. [Elsevier]

Trustworthy Signing with Smart Card System in Untrustworthy Environments.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

e-Smart conference and demos 2007, 19-21 September 2007, Sophia Antipolis, French Riviera.

Using Two-Steps Hash Function to Support Trustworthy Signing.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks.

2006 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Workshop on Information and System Security (WISSEC'06), Antwerpen (Belgium), 2006 .

A Case Study on Online-Banking Security.

2006 - Jörg Schwenk, Sebastian Gajek, Henrik te Heesen

International Conference on Emerging Trends in Information and Communication Security (ETRICS'06) Workshop on Security and Privacy in Future Business Services, Freiburg (Germany), 2006 .

A Computational Model for Watermark Robustness

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Stefan Katzebeisser

Accepted for Information Hiding Workshop, 2006. [Springer Link]

Client Authentication in Federations Using a Security Mode

2006 - Ahmad-Reza Sadeghi, Sebastian Gajek,

Accepted to be presented at Toward a More Secure Web - W3C Workshop on Usability and Transparency of Web Authentication. [pdf]

Democratic Group Signatures - On an Example of Joint Ventures - Fast Abstract.

2006 - Mark Manulis,

in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), 21-24 March, Taipei, Taiwan. [ACM Link] [PDF ] [Bibtex]

DRM für Multimedia-Broadcasts - wie sieht das PayTV der Zukunft aus?.

2006 - Ulrich Greveler,

in Patrick Horster (Hrsg.), D.A.CH Security 2006, Düsseldorf, März 2006, to appear. [PDF]

Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

To appear in LNCS Transactions on Data Hiding and Multimedia Security. [Springer Link]

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ACISP 2006 paper below. A preliminary version is available from the authors:

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Accepted for 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Melbourne, Australia, July 3-5, 2006. Published in Springer's LNCS 4058. [Springlink]

Key Agreement for Heterogeneous Ad-Hoc Groups

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

to appear in International Journal of Wireless and Mobile Computing (IJWMC), Inderscience.

Key Agreement for Heterogenous Mobile Ad-hoc Groups

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

To appear in Special Issue on Ubiquitous Computing and Moblie Networking of IJWMC (International Journal of Wireless and Mobile Computing) Journal. [ACM Link]

Linkable Democratic Group Signatures

2006 - Jörg Schwenk, Ahmad-Reza Sadeghi, Mark Manulis,

Accepted for 2nd Information Security Practice and Experience Conference (ISPEC 2006), 11.-14. April, Hangzhou, China. [pdf]

Patentierung kryptographischer Verfahren, die an Hochschulen entwickelt wurden.

2006 - Ulrich Greveler,

GI Fachtagung "Sicherheit 2006", Magdeburg, Feb. 2006, LNI Proceedings P-77, pp. 329-332. [PDF]

Property-based Taming Lying Mobile Nodes

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

Accepted for International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) at 20th IEEE International ­Conference on Advanced Information Networking and Applications (AINA 2006), 18.-20. April, Vienna, Austria. [IEEE CS Link]

Property-Based Taming of Lying Mobile Nodes.

2006 - Ahmad-Reza Sadeghi, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

Reversed Responsibilities: Browser Authentication instead of Server Authentication.

2006 - Jörg Schwenk, Sebastian Gajek,

Workshop on Transparency and Usability of Web Authentication, New York (USA), 2006.

SSL-VA-Authentifizierung als Schutz vor Phishing und Pharming.

2006 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

accepted for Sicherheit - Schutz und Zuverlässigkeit, February 20, 2006, Magdeburg, Germany. [PDF]

Tree-based Group Key Agreement Framework for Mobile Ad-Hoc Networks.

2006 - Lijun Liao, Mark Manulis,

in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), 2nd International Workshop on Security in Networks and Distributed Systems (SNDS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]

Security Engineering for Zero-knowledge Watermark Detection

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

Special Session on Media Security, WIAMIS 2005, 13-15 April 2005, Montreux, Switzerland.

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security

2005 - Ulrich Greveler, Andre Adelsbach,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Anonymous Data Broadcasting by Misuse of Satellite ISPs

2005 - Ulrich Greveler, Andre Adelsbach, Sven Löschner

Proceedings of 22C3 Chaos Computer Club (CCC) Congress, Berlin, 2005, to appear. [PDF]

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

to appear in ACM Multimedia Systems Journal.

Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia Systems Journal. [Springer Link]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), 07-10 November 2005, Washington, USA. [IEEE CS Link] [Bibtex] [PDF]

Datenschutzverletzungen bei Internetzugängen via Satellit

2005 - Ulrich Greveler, Andre Adelsbach,

Datenschutznachrichten, 01/2005, pp. 4-7. [PDF]

Effective Protection Against Phishing and Web Spoofing

2005 - Sebastian Gajek, Rolf Oppliger

9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS2005), LNCS 3677. pp 32-42. Copyrights Springer-Verlag, Heidelberg Berlin. [Springer] [Bibtex] [PDF]

Embedding Trust into Cars—Secure Software Delivery and Installation

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Third Workshop on Embedded Security in Cars (escar 2005), Cologne, Germany, November 29-30, 2005. Conference presentation [pdf]

Enforcing Regional DRM for Multimedia Broadcasts with and without Trusted Computing

2005 - Ulrich Greveler,

First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]

Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren

2005 - Jörg Schwenk, Ulrich Greveler, Andre Adelsbach,

accepted for 9. Deutscher IT-Sicherheitskongress des BSI, Mai 2005.

First Summary Report on Asymmetric Watermarking

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa

ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005. [pdf]

How Pay-TV becomes E-Commerce

2005 - Ulrich Greveler,

7th International IEEE Conference on E-Commerce Technology, Munich 2005, IEEE Press P2277, ISBN 0-7695-2277-7. [PDF]

Identitätsmissbrauch im Onlinebanking

2005 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,

Datenschutz und Datensicherheit, Ausgabe 11, 2005.

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

2005 - Mark Manulis,

in Proceedings of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Volume 2, International Workshop on Security in Networks and Distributed Systems (SNDS 2005), pp. 290-294. IEEE Computer Society, 2005. [IEEE CS Link] [PDF] [Bibtex]

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

accepted for 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 19-21 September 2005, Salzburg, Austria; to appear in LNCS.

Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe

Accepted for 9th IFIP Conference on Communications and Multimedia Security (CMS) 2005, "Best Paper Award".

Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten

2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,

9. Deutscher IT-Sicherheitskongress des BSI, 2005.

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors
Seite: