Ver­öf­fent­li­chun­gen

Stron­ger TLS Bin­dings for SAML As­ser­ti­ons and SAML Ar­ti­facts

2008 - Jörg Schwenk, Se­bas­ti­an Gajek, Lijun Liao,

In Pro­cee­dings of the ACM CCS Work­shop for Se­cu­re Web Ser­vices (ACM SWS'08), Vir­gi­nia (USA), 2008.

TLS Fe­de­ra­ti­on - a Se­cu­re and Re­ly­ing-Par­ty-Fri­end­ly Ap­proach for Fe­dera­ted Iden­ti­ty Ma­nage­ment

2008 - Jörg Schwenk,

This paper de­scri­bes a novel ap­proach that in­te­gra­tes Fe­dera­ted IDM and SSL.

Uni­ver­sal­ly Com­po­sa­ble Se­cu­ri­ty Ana­ly­sis of TLS

2008 - Jörg Schwenk, Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Mark Ma­nu­lis, Oli­vier Pe­rei­ra

Ac­cep­ted for the Se­cond Confer­ence on Prova­ble Se­cu­ri­ty (Prov­Sec), 2008. [pdf]

A Cri­tique of the GNU Hurd Mul­ti-Ser­ver Ope­ra­ting Sys­tem

2007 - Neal H. Wal­field, Mar­cus Brink­mann

ACM SI­GOPS Ope­ra­ting Sys­tems Re­view, Vo­lu­me 41 Issue 4, July 2007, pp. 30-39 [DOI]

Trusted User-Awa­re Web Au­then­ti­ca­ti­on

2007 - Jörg Schwenk, Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Mar­cel Wi­n­an­dy,

Pre­sen­ted at the Work­shop on Trust­wor­thy User In­ter­faces for Pass­words and Per­so­nal In­for­ma­ti­on (TIPPI'07), Stan­ford, USA, June 22, 2007. [PDF]

Com­part­men­ted Se­cu­ri­ty for Brow­sers – Or How to Thwart a Phis­her with Trusted Com­pu­ting

2007 - Se­bas­ti­an Gajek, Ah­mad-Re­za Sa­de­ghi, Chris­ti­an Stüb­le, Mar­cel Wi­n­an­dy

In Pro­cee­dings of the The Se­cond In­ter­na­tio­nal Con­fe­rence on Avail­a­bi­li­ty, Re­lia­bi­li­ty and Se­cu­ri­ty (ARES 2007), Vi­en­na, Aus­tria, April 10-13, 2007, pages 120-127. IEEE Com­pu­ter So­cie­ty, 2007. [pdf]

Clas­si­fi­ca­ti­on of Al­most Per­fect Non­line­ar Func­tions up to Di­men­si­on Five

2007 - Mar­cus Brink­mann

Di­plom­ar­beit an der Fa­kul­tät für Ma­the­ma­tik Ruhr-Uni­ver­si­ät Bo­chum. [PDF]

A Pri­va­cy-Pro­tec­ting Mul­ti-Cou­pon Sche­me with Stron­ger Pro­tec­tion against Split­ting

2007 - Ah­mad-Re­za Sa­de­ghi, Hans Löhr, Liqun Chen, Mark Ma­nu­lis, Al­ber­to Esca­lan­te

11th In­ter­na­tio­nal Con­fe­rence on Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty (FC 2007), Sc­ar­bo­rough, Tri­ni­dad and To­ba­go, Fe­bru­ary 12-16, 2007. Re­vi­sed Selec­ted Pa­pers, vo­lu­me 4886 of Lec­tu­re Notes on Com­pu­ter Si­ence (LNCS), pages 29-44. Sprin­ger Ver­lag, 2007. [pdf]

Fin­ger­cas­ting—Joint Fin­ger­prin­ting and De­cryp­ti­on of Broad­cast Mes­sa­ges

2007 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Ul­rich Huber,

In Tran­sac­tions on Data Hiding and Mul­ti­me­dia Se­cu­ri­ty II, vo­lu­me 4499 of Lec­tu­re Notes on Com­pu­ter Si­ence (LNCS), pages 1-34. Sprin­ger Ver­lag, 2007. [?]

Phis­hing Phis­hers - Ob­ser­ving and Tra­cing Or­ga­ni­zed Cy­ber­cri­me

2007 - Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Felix Grö­bert, , Do­mi­nik Birk

In Pro­cee­dings of the Se­cond In­ter­na­tio­nal Con­fe­rence on In­ter­net Mo­ni­to­ring and Pro­tec­tion (ICIMP 2007), Si­li­con Val­ley, Ca­li­for­nia, July 1-5, 2007, page 3. IEEE Com­pu­ter So­cie­ty, 2007. [IEEE Link]
Seite: