Veröffentlichungen

Group Key Agreement for Wireless Mesh Networks

2009 - Jörg Schwenk, Andreas Noack,

The 5th LCN Workshop on Security in Communications Networks (SICK 2009) Zürich, Switzerland; 20-23 October 2009

On Technical Security Issues in Cloud Computing

2009 - Jörg Schwenk, Meiko Jensen, Nils Gruschka, Luigi Lo Iacono

Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II 2009), Bangalore, India

The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

2009 - Jörg Schwenk, Meiko Jensen,

Proceedings of the IEEE International Conference on Availability, Reliability, and Security (ARES)

The Curse of Namespaces in the Domain of XML Signature

2009 - Jörg Schwenk, Lijun Liao, Meiko Jensen,

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Twin Signatures, Revisited

2009 - Sven Schäge,

Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. [Springer Link]

Sichere Webanwendungen

2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami

GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949

A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk

ESORICS 2008

On Black-Box Ring Extraction and Integer Factorization

2008 - Kristina Altmann, Tibor Jager, Andy Rupp

ICALP 2008

On the equivalence of generic group models

2008 - Tibor Jager, Jörg Schwenk

ProvSec 2008

Property-Based Attestation without a Trusted Third Party

2008 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis,

Information Security Conference (ISC'08), 2008. [pdf]
Seite: