Publications

A Security Modeling Approach for Web-Service-based Business Processes

2009 - Meiko Jensen, Sven Feja

Proceedings of the 7th IEEE Workshop on Model-Based Development for Computer-Based Systems (MBD 2009), held as part of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), San Francisco, USA

Analysis of Signature Wrapping Attacks and Countermeasures

2009 - Jörg Schwenk, Sebastian Gajek, Lijun Liao, Meiko Jensen,

Proceedings of the 7th IEEE International Conference on Web Services (ICWS), Los Angeles, USA, 2009.

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Third International Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications, Las Palmas de Gran Canaria, Spain; 25 November 2009

Extending the Similarity-Based XML Multicast Approach with Digital Signatures

2009 - Jörg Schwenk, Meiko Jensen, Antonia Azzini, Stefania Marrara

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Generating WS-SecurityPolicy Documents via Security Model Transformation

2009 - Meiko Jensen,

Proceedings of the Young Researchers Workshop on Modeling and Management of Business Processes (YRW-MBP 2009), held as part of SABRE 2009, Leipzig, Germany

Group Key Agreement for Wireless Mesh Networks

2009 - Jörg Schwenk, Andreas Noack,

The 5th LCN Workshop on Security in Communications Networks (SICK 2009) Zürich, Switzerland; 20-23 October 2009

On Technical Security Issues in Cloud Computing

2009 - Jörg Schwenk, Meiko Jensen, Nils Gruschka, Luigi Lo Iacono

Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II 2009), Bangalore, India

The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

2009 - Jörg Schwenk, Meiko Jensen,

Proceedings of the IEEE International Conference on Availability, Reliability, and Security (ARES)

The Curse of Namespaces in the Domain of XML Signature

2009 - Jörg Schwenk, Lijun Liao, Meiko Jensen,

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Twin Signatures, Revisited

2009 - Sven Schäge,

Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. [Springer Link]

A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk

ESORICS 2008

On Black-Box Ring Extraction and Integer Factorization

2008 - Kristina Altmann, Tibor Jager, Andy Rupp

ICALP 2008

On the equivalence of generic group models

2008 - Tibor Jager, Jörg Schwenk

ProvSec 2008

Property-Based Attestation without a Trusted Third Party

2008 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis,

Information Security Conference (ISC'08), 2008. [pdf]

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

2008 - Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante

Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sydney, Australia. [Springer Link] [pdf]

A Forensic Framework for Tracing Phishers

2008 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

International Federation for Information Processing, to appear in LNCS 6102. [pdf]

A novel solution for end-to-end integrity protection in signed PGP mail

2008 - Jörg Schwenk, Lijun Liao,

ICICS 2008, Birmingham, UK

Code Voting with Linkable Group Signatures

2008 - Jörg Schwenk, Sven Schäge, Jörg Helbach

3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria 2008. In LNI, 2008. [LNI Link]

Modeling and Transformation of Security Requirements: An Approach for Service-oriented Architectures

2008 - Jörg Schwenk, Meiko Jensen, Ralph Herkenhöner, Sven Feja, Hermann de Meer, Andreas Speck

Proceedings of the First Euro-NF Workshop on Future Internet Architecture: New Trends in Service & Networking Architectures, 21. November 2008, Paris, France

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS

2008 - Tibor Jager, Heiko Jäkel, Jörg Schwenk

Sicherheit 2008.
Page: