Veröffentlichungen

Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics

2011 - Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz

18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011 [PDF]

The Bug that made me President: A Browser- and Web-Security Case Study on Helios Voting

2011 - Mario Heiderich, Tilman Frosch, Marcus Niemietz, Jörg Schwenk

International Conference on E-voting and Identity (VoteID), 2011, Tallinn, Estonia, September 2011 [Website]

Direct Anonymous Attestation: Enhancing Cloud Service User Privacy

2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus

[Paper]

IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM

2011 - Mario Heiderich, Tilman Frosch, Thorsten Holz

14th International Symposium on Recent Advances in Intrusion Detection (RAID), Menlo Park, CA, September 2011 [PDF]

On the E ffectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks

2011 - Meiko Jensen, Christopher Meyer, Juraj Somorovsky, Jörg Schwenk

In IWSSC 2011: First International Workshop on Securing Services on the Cloud, Sept. 2011 [Paper] [Slides]

Short Signatures from Weaker Assumptions

2011 - Dennis Hofheinz, Tibor Jager, Eike Kiltz

Asiacrypt 2011 [Full Version]

All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces

2011 - Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono

In Proceedings of the ACM Cloud Computing Security Workshop (CCSW), 2011. [pdf]

How To Break XML Encryption

2011 - Tibor Jager, Juraj Somorovsky

In Proceedings of the 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), 2011. [pdf]

The Power of Recognition: Secure Single Sign-On using TLS Channel Bindings

2011 - Jörg Schwenk, Florian Kohlar, Marcus Amon

In Proceedings of the Seventh ACM Workshop on Digital Identity Management (DIM) (October 21, 2011, Chicago, IL, USA. Collocated with ACM CCS 2011) Copyright 2011 ACM 978-1-4503-1006-2/11/10…$10.00. [Paper]

Cloud-Sicherheit ohne vertrauenswürdige Administration

2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus

[Paper]

Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage

2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld

In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]

A Privacy Preserving System for Cloud Computing

2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus

[Paper]

Mutual Remote Attestation: Enabling System Cloning for TPM based Platforms

2011 - Ulrich Greveler, Dennis Löhr, Benjamin Justus

[Paper]

Expressiveness Considerations of XML Signatures

2011 - Meiko Jensen, Christopher Meyer

In Proceedings of the 3rd IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE), Munich, Germany. [Paper] [Slides]

MARV - Data Level Confidentiality Protection in BPEL-based Web Service Compositions

2011 - Majernik, Filip, Meiko Jensen, Jörg Schwenk

In Proceedings of the 6th International Conference on Network Architectures and Information Systems Security (SAR-SSI), La Rochelle, France.

Security Prospects through Cloud Computing by Adopting Multiple Clouds

2011 - Bohli, Jens-Matthias, Meiko Jensen, Gruschka, Nils, Lo Iacono, Luigi, Jörg Schwenk

In Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD), Washington, D.C., USA.

Towards Privacy-Preserving XML Transformation

2011 - Meiko Jensen, Kerschbaum, Florian

In Proceedings of the 9th IEEE International Conference on Web Services (ICWS), Washington, D.C., USA.

Sicheres Single Sign-On mit dem SAML Holder-of-Key Web Browser SSO Profile und SimpleSAMLphp

2011 - Andreas Mayer, Jörg Schwenk

In 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, Seiten 33--46, SecuMedia Verlag

Evaluating the Impact of Transmission Power on QoS in Wireless Mesh Networks

2011 - Andreas Noack, Patrick-Benjamin Bök, Sebastian Krück

IEEE ICCCN 2011 Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services - ContextQoS 2011, Hawaii, Juli-August 2011 (to be published)

Mining Network and the Security Question

2011 - Christoph Müller, Andreas Noack

35th APCOM Symposium - Application of Computers and Operations Research in the Mineral Industry, Australia, September 2011 (to be published)

Safety Support Functions for Underground Network Communications

2011 - Christoph Müller, Andreas Noack

35th APCOM Sym­po­si­um - Ap­p­li­ca­ti­on of Com­pu­ters and Ope­ra­ti­ons Re­se­arch in the Mi­ne­ral In­dus­try, Aus­tra­lia, Sep­tem­ber 2011 (to be pu­blis­hed)

Trust Agreement in Wireless Mesh Networks

2011 - Andreas Noack

WISTP'11 - Workshop in Information Security Theory and Practice, Greece, June 2011 (to be published)

On Interoperability Failures in WS-Security: The XML Signature Wrapping Attack

2011 - Nils Gruschka, Meiko Jensen, Florian Kohlar, Lijun Liao

In E. Kajan: Electronic Business Interoperability: Concepts, Opportunities and Challenges, Business Science Reference, Hershey, NY, USA. ISBN 978-1-60960-485-1. 2011

Tight Proofs for Signature Schemes without Random Oracles

2011 - Sven Schäge

Accepted for EUROCRYPT 2011, Tallinn, Estonia, May 15th-19th, 2011. [Full Version]
Seite: