Ver­öf­fent­li­chun­gen

New Mo­du­lar Com­pi­lers for Au­then­ti­ca­ted Key Ex­chan­ge

2014 - Yong Li, Sven Schä­ge, Zheng Yang, Chris­toph Bader, Jörg Schwenk

In Pro­cee­dings the 12th In­ter­na­tio­nal Con­fe­rence, ACNS 2014 [Paper]

Script­less at­tacks: Ste­aling more pie wi­thout tou­ch­ing the sill

2014 - Mario Hei­de­rich, Mar­cus Nie­mietz, Felix Schus­ter, Thors­ten Holz, Jörg Schwenk

Jour­nal of Com­pu­ter Se­cu­ri­ty, Vo­lu­me 22, Num­ber 4 / 2014, Web Ap­p­li­ca­ti­on Se­cu­ri­ty – Web @ 25 [URL]

On the Se­cu­ri­ty of the Pre-Shared Key Ciph­er­sui­tes of TLS

2014 - Yong Li, Sven Schä­ge, Zheng Yang, Flo­ri­an Kohlar, Jörg Schwenk

In Pro­cee­dings of the 17th In­ter­na­tio­nal Con­fe­rence on Prac­tice and Theo­ry in Pu­blic-Key Cryp­to­gra­phy (PKC), 2014 [Paper]

SAML Pri­va­cy-En­han­cing Pro­fi­le

2014 - Mo­ritz Horsch, Max Tu­en­ger­thal, To­bi­as Wich

Open Iden­ti­ty Sum­mit 2014 [PDF]

Se­cu­re Fall­back Au­then­ti­ca­ti­on and the Trusted Fri­end At­tack

2014 - Ashar Javed, David Blet­gen, Flo­ri­an Kohlar, Mar­kus Dür­muth, Jörg Schwenk

Pro­cee­dings In­ter­na­tio­nal Con­fe­rence on Di­stri­bu­ted Com­pu­ting Sys­tems Work­shops (ICDCS Work­shops), 2014.

One Bad Apple: Back­wards Com­pa­ti­bi­li­ty At­tacks on Sta­te-of-the-Art Cryp­to­gra­phy

2013 - Tibor Jager, Ken­neth G. Pa­ter­son, Juraj So­mo­rovs­ky

In Pro­cee­dings of the Net­work and Di­stri­bu­ted Sys­tem Se­cu­ri­ty Sym­po­si­um (NDSS), 2013 [Cryp­to­Ch­al­len­ge] [paper]

Stron­gly Se­cu­re One-round Group Au­then­ti­ca­ted Key Ex­chan­ge in the Stan­dard Model

2013 - Yong Li, Zheng Yang

In Pro­cee­dings of the 12th In­ter­na­tio­nal Con­fe­rence, CANS 2013 [Paper]

mXSS At­tacks: At­ta­cking well-se­cu­red Web-Ap­p­li­ca­ti­ons by using in­nerHT­ML Mu­ta­ti­ons

2013 - Mario Hei­de­rich, Jörg Schwenk, Til­man Frosch, Jonas Ma­ga­zi­ni­us, Ed­ward Z. Yang

20th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Ber­lin, Ger­ma­ny, No­vem­ber 2013 [PDF]

On the se­cu­ri­ty of TLS re­ne­go­tia­ti­on

2013 - Flo­ri­an Berg­s­ma, Flo­ri­an Kohlar, Doug­las Ste­bi­la

ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty

Op­ti­ons for In­te­gra­ting eID and SAML

2013 - Hühn­lein, Det­lef, Jörg Schwenk, To­bi­as Wich, Vla­dis­lav Mla­de­nov, Flo­ri­an Feld­mann, An­dre­as Mayer, Schm­ölz, Jo­han­nes, Brueg­ger, Bud P., Horsch, Mo­ritz

CCS 2013 Post-Con­fe­rence Work­shop, Di­gi­tal Iden­ti­ty Ma­nage­ment (DIM)
Seite: