Ab­ge­schlos­se­ne Ab­schluss­ar­bei­ten

Si­cher­heits­ana­ly­se von OAuth 2.0

Vla­dis­lav Mla­de­nov -

M. Sc. An­dre­as Mayer

On the Se­cu­ri­ty of Web Sin­gle Sign-On

- 11.​2013

[pdf.-Da­tei]

In­tel­li­gent and Ful­ly-Au­to­ma­tic De­tec­tion of De­ni­al-of-Ser­vices We­ak­nes­ses in Web Ser­vices

Chris­ti­an Main­ka -

[ws-at­ta­cker]

Ti­ming Si­de-Chan­nel At­tacks in the Cloud

Juraj So­mo­rovs­ky -

New At­tacks on XML Si­gna­tu­res in WS-At­ta­cker

Chris­ti­an Main­ka, Juraj So­mo­rovs­ky -

[At­tacks] [WS-At­ta­cker]

Ana­ly­sis of Cryp­to­cur­ren­cy Mi­ning Pool Pro­to­cols

Juraj So­mo­rovs­ky -

„Mea­ningful“ Com­pu­ta­tio­nal Pro­blems in Cryp­to­cur­ren­cies

Juraj So­mo­rovs­ky -

Dipl.-Ing. Yong Li

De­sign and Ana­ly­sis of cryp­to­gra­phic pro­to­cols

Jörg Schwenk - 06.​2015

[pdf.-Da­tei]

Se­cu­ri­ty Ana­ly­sis of Pri­va­te Cloud In­ter­faces

Den­nis Felsch -

Fin­ger­prin­ting Web Ap­p­li­ca­ti­ons like PIWIK

Mar­cus Nie­mietz -

Seite: