Ver­öf­fent­li­chun­gen

Si­che­re Web­an­wen­dun­gen

2008 - Mario Hei­de­rich, Chris­ti­an Matt­hies, Jo­han­nes Dahse, fu­ka­mi

GA­LI­LEO PRESS, Auf­la­ge 1, IS­BN-10: 3836211947, IS­BN-13: 978-3836211949

A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

2008 - Se­bas­ti­an Gajek, Tibor Jager, Mark Ma­nu­lis, Jörg Schwenk

ESO­RICS 2008

On Black-Box Ring Extrac­tion and In­te­ger Fac­to­riza­t­i­on

2008 - Kris­ti­na Alt­mann, Tibor Jager, Andy Rupp

ICALP 2008

On the equi­va­lence of ge­ne­ric group mo­dels

2008 - Tibor Jager, Jörg Schwenk

Prov­Sec 2008

Pro­per­ty-Ba­sed At­te­sta­ti­on wi­thout a Trusted Third Party

2008 - Ah­mad-Re­za Sa­de­ghi, Hans Löhr, Liqun Chen, Mark Ma­nu­lis,

In­for­ma­ti­on Se­cu­ri­ty Con­fe­rence (ISC'08), 2008. [pdf]

Se­cu­re Mul­ti-Cou­pons for Fe­dera­ted En­vi­ron­ments: Pri­va­cy-Pre­ser­ving and Cust­o­m­er-Fri­end­ly

2008 - Ah­mad-Re­za Sa­de­ghi, Fre­de­rik Arm­knecht, Hans Löhr, Mark Ma­nu­lis, Al­ber­to Esca­lan­te

Ac­cep­ted for The 4th In­for­ma­ti­on Se­cu­ri­ty Prac­tice and Ex­pe­ri­ence Con­fe­rence (ISPEC 2008), 21-23 April 2008, Syd­ney, Aus­tra­lia. [Sprin­ger Link] [pdf]

On the clas­si­fi­ca­ti­on of APN func­tions up to di­men­si­on five

2008 - Mar­cus Brink­mann, Gre­gor Le­an­der

Des. Codes Cryp­to­gr. (2008) 49: 273. [DOI] [pdf]

Die Si­cher­heit von MS Card­S­pace und ver­wand­ten Sin­gle-Sign-On-Pro­to­kol­len

2008 - Se­bas­ti­an Gajek, Sven Schä­ge, Xuan Chen, Chris­toph Löhr

Da­ten­schutz und Da­ten­si­cher­heit - DuD. Vo­lu­me 32, Num­ber 8, Sei­ten 515-519. View­eg Ver­lag, Au­gust 2008. [Sprin­ger Link]

A Fo­ren­sic Frame­work for Tra­cing Phis­hers

2008 - Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Felix Grö­bert, , Do­mi­nik Birk

In­ter­na­tio­nal Fe­de­ra­ti­on for In­for­ma­ti­on Pro­ces­sing, to ap­pe­ar in LNCS 6102. [pdf]

A novel so­lu­ti­on for end-to-end in­te­gri­ty pro­tec­tion in si­gned PGP mail

2008 - Jörg Schwenk, Lijun Liao,

ICICS 2008, Bir­ming­ham, UK
Seite: