Veröffentlichungen

Browser Models for Usable Authentication Protocols.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.

Browser-based Authentication Protocols for Naive Users.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Compartmented Security for Browsers

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, September 9-10, 2007, Vienna, Austria.

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, July 4-6, 2007, Bochum, Germany. [Springer Link]

Ein Framework zur Identifikation von Identitätsbetrügern, Geldwäschern und Phishing-Simulanten.

2007 - Sebastian Gajek, Felix Gröbert, Macimillian Dornseif, Dominik Birk

In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.

End-to-End Header Protection in S/MIME and PGP Mail.

2007 - Jörg Schwenk, Lijun Liao,

Postersession in the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007. [PDF]

End-to-End Header Protection in Signed S/MIME.

2007 - Jörg Schwenk, Lijun Liao,

In Proceedings of the 2nd International Symposium on Information Security (IS'07), Nov 26-27, 2007 in Vilamoura, Algarve, Portugal.

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

2007 - Mark Manulis, Emmanuel Bresson

In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), 11-13 July, Hong Kong, China. [PDF] [Bibtex]

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

2007 - Mark Manulis, Emmanuel Bresson

In Proceedings of the International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), Wroclaw (Poland), 2007.

On Security Models and Compilers for Group Key Exchange Protocols.

2007 - Jörg Schwenk, Mark Manulis, Emmanuel Bresson

In Proceedings of the 2nd International Workshop on Security (IWSEC 2007), Nara (Japan), 2007. [PDF] [Bibtex]

Phishing Phishers -- Observing and Tracing Organized Cybercrime.

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the 2nd IEEE International Conference on Internet Monitoring and Protection (ICIMP'07), Silicon Valley (USA), 2007.

Provably Secure Framework for Information Aggregation in Sensor Networks.

2007 - Jörg Schwenk, Mark Manulis,

In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2007), Kuala Lumpur (Malaysia), 2007 . [PDF] [Bibtex]

Secure Emails in XML Format Using Web Services.

2007 - Jörg Schwenk, Lijun Liao,

In Proceedings of the 5th IEEE European Conference on Web Services (ECOWS 07), November 26-28, 2007 in Halle (Saale), Germany.

Secure Internet Voting With Code Sheets.

2007 - Jörg Schwenk, Jörg Helbach

In Proceedings of the FIDIS First Conference on E-Voting and Identity. Bochum (Germany), 4-5 October 2007.

Securing Email Communication with XML Technology.

2007 - Jörg Schwenk, Lijun Liao,

The 2007 International Conference on Internet Computing (ICOMP 2007), 25-28 June 2007, Las Vegas, USA.

Security of Mircrosoft's Identity Metasystem and CardSpace .

2007 - Sebastian Gajek, Ralf Hauser, Rolf Oppliger

In Proceedings of Kommunikation in Verteilten Systemen (KiVS '07), Industry Track, Bern (Switzerland), 2007 .

Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Datenschutz und Datensicherheit, Ausgabe 2007/11

SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services .

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the IEEE ECOWS Workshop on Emerging Web Services Technology (WEWST'07), Halle (Germany), 2007 .

Towards a Formal Semantic of XML Signature.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

W3C Workshop Next Steps for XML Signature and XML Encryption, Mountain View (USA), 2007.
Seite: