Veröffentlichungen

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

2013 - Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky

In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 [CryptoChallenge] [paper]

Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model

2013 - Yong Li, Zheng Yang

In Proceedings of the 12th International Conference, CANS 2013 [Paper]

mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations

2013 - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang

20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 [PDF]

On the security of TLS renegotiation

2013 - Florian Bergsma, Florian Kohlar, Douglas Stebila

ACM Conference on Computer and Communications Security

Options for Integrating eID and SAML

2013 - Hühnlein, Detlef, Jörg Schwenk, Wich, Tobias, Vladislav Mladenov, Florian Feldmann, Andreas Mayer, Schmölz, Johannes, Bruegger, Bud P., Horsch, Moritz

CCS 2013 Post-Conference Workshop, Digital Identity Management (DIM)

Sicherer Schlüssel- und Informationsaustausch mit SAML

2013 - Dennis Felsch, Thorsten Schreiber, Christopher Meyer, Florian Feldmann, Jörg Schwenk

In Proceedings of the DACH Security 2013, Nürnberg, Germany [Paper]

How to authenticate mobile devices in a web environment - The SIM-ID approach

2013 - Florian Feldmann, Jörg Schwenk

Open Identity Summit 2013 September 9th - 11th 2013, Kloster Banz, Germany http://openidentity.eu [Paper] [Presentation]

On the Insecurity of XML Security

2013 - Juraj Somorovsky

PhD Thesis Supervisors: Jörg Schwenk, Kenneth G. Paterson [pdf]

A Footprint of Third-Party Tracking on Mobile Web

2013 - Ashar Javed

[POSTER] In 20th ACM Conference on Computer and Communications Security (ACM CCS), November 4-8, 2013 Berlin, Germany [poster]

SoK: Lessons Learned From SSL/TLS Attacks

2013 - Christopher Meyer, Jörg Schwenk

In Proceedings of "The 14th International Workshop on Information Security Applications (WISA2013)" [Paper] [Slides]
Seite: