Ver­öf­fent­li­chun­gen

Se­cu­re XMaiL or How to Get Rid of Le­ga­cy Code in Se­cu­re E-Mail Ap­p­li­ca­ti­ons

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolf­gang Kub­bilun

In CMS 2005: Pro­cee­dings of the 9th IFIP In­ter­na­tio­nal Con­fe­rence on Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty, Lec­tu­re Notes in Com­pu­ter Sci­ence, vo­lu­me 3677, pages 291-300, Sprin­ger, 2005. [Sprin­ger] [PDF] [Bib­tex]

Towards Mul­ti­la­te­ral Se­cu­re Di­gi­tal Rights Di­stri­bu­ti­on In­fra­struc­tu­res

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

ac­cep­ted for ACM DRM Work­shop'05, No­vem­ber 7, 2005, Alex­an­dria, Vir­gi­nia, USA.

Towards Mul­ti­la­te­ral Se­cu­re Di­gi­tal Rights Di­stri­bu­ti­on In­fra­struc­tu­res

2005 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

Ac­cep­ted for ACM DRM 2005.

Trust­wor­thy Vi­sua­li­sa­ti­on and Ve­ri­fi­ca­ti­on of Mul­ti­ple XML-Si­gna­tu­res

2005 - Jörg Schwenk, Se­bas­ti­an Gajek, Wolf­gang Kub­bilun

In CMS 2005: Pro­cee­dings of the 9th IFIP In­ter­na­tio­nal Con­fe­rence on Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty, Lec­tu­re Notes in Com­pu­ter Sci­ence, vo­lu­me 3677, pages 311-320, Sprin­ger, 2005. [Sprin­ger]

Vi­su­al Spoo­fing of SSL Pro­tec­ted Web Sites and Ef­fec­tive Coun­ter­me­a­su­res

2005 - Jörg Schwenk, Se­bas­ti­an Gajek, Andre Adels­bach,

First In­for­ma­ti­on Se­cu­ri­ty Prac­tice and Ex­pe­ri­ence Con­fe­rence (ISPEC 2005), LNCS 3439. pp 204-217. Co­py­rights Sprin­ger-Ver­lag, Hei­del­berg Ber­lin. [Bib­tex] [Sprin­ger] [PDF]

Key-As­si­gnment Stra­te­gies for CPPM.

2004 - Jörg Schwenk, Andre Adels­bach,

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop 2004, Mag­d­e­burg, Ger­ma­ny, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adels­bach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Mo­der­ne Ver­fah­ren der Kryp­to­gra­phie

2004 - Jörg Schwenk, Klaus-Die­t­er Wol­fen­stet­ter, Al­brecht, Beu­tels­ba­cher

[Ama­zon]

Over­co­ming the Obst­a­cles of Ze­ro-Know­ledge Wa­ter­mark De­tec­tion.

2004 - Ah­mad-Re­za Sa­de­ghi, Andre Adels­bach, Mar­kus Rohe,

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop 2004, Mag­d­e­burg, Ger­ma­ny, pp. 46 - 55, © ACM, 2004.

Pseud­onym Ge­ne­ra­ti­on Sche­me for Ad-Hoc Group Com­mu­ni­ca­ti­on Based on IDH.

2004 - Jörg Schwenk, Mark Ma­nu­lis,

In Pro­cee­dings of the 1st Eu­ropean Work­shop on Se­cu­ri­ty in Ad-Hoc and Sen­sor Net­works (ESAS 2004), Lec­tu­re Notes in Com­pu­ter Sci­ence, vo­lu­me 3313, pages 107-124, Sprin­ger-Ver­lag, 2005. [Sprin­ger Link] [PDF] [Bib­tex]
Seite: