Veröffentlichungen
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
2010 - Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
PKC 2010Mobile Machine Operation in Underground Networks and the Security Question
2010 - Andreas Noack, Christoph Müller
escar'10 - 8th conference on Embedded Security in Cars, Bremen, Germany [Conference Link]Generic Compilers for Authenticated Key Exchange
2010 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
In Proceedings of ASIACRYPT 2010, Singapore [Full Version]Mutual Preimage Authentication for fast Handover in Enterprise Networks
2010 - Andreas Noack, Mark Borrmann
The 5th International Symposium on Information Security (IS'10), Greece, 2010Security Analysis of OpenID
2010 - Pavol Sovis, Florian Kohlar, Jörg Schwenk
In "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference", 2010. [Camery Ready]Group Key Agreement Performance in Wireless Mesh Networks
2010 - Andreas Noack, Jörg Schwenk
35th Annual IEEE Conference on Local Computer Networks and Workshops, LCN 2010 [Konferenz]Deanonymisierung von Profilen sozialer Netzwerke unter Nutzung von Metadaten aus Bildern
2010 - Ulrich Greveler, Dennis Löhr
[Paper]A New RSA-Based Signature Scheme
2010 - Sven Schäge, Jörg Schwenk
AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. [Springer Link]Streaming-Based Verification of XML Signatures in SOAP Messages
2010 - Juraj Somorovsky, Meiko Jensen, Jörg Schwenk
In Proceedings of the IEEE International Workshop on Web Service and Business Process Security (WSBPS), Miami, Florida, U.S.A., 2010.Ethernet communication for detection of emergency locations and dynamic evacuation in underground infrastructures
2010 - Dipl.-Ing. Christoph Müller, Prof. Dr. Iuliu Szekely, Andreas Noack
OPTIM 2010 - 12th International Conference on Optimization of Electrical and Electronic Equipment [Conference Link]