Veröffentlichungen
Browser Models for Usable Authentication Protocols.
2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,
In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.Browser-based Authentication Protocols for Naive Users.
2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,
accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.Compartmented Security for Browsers
2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]Efficient Hash Collision Search Strategies on Special-Purpose Hardware
2007 - Sven Schäge, Tim Güneysu, Christof Paar
Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, September 9-10, 2007, Vienna, Austria.Efficient Hash Collision Search Strategies on Special-Purpose Hardware
2007 - Sven Schäge, Tim Güneysu, Christof Paar
Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, July 4-6, 2007, Bochum, Germany. [Springer Link]Ein Framework zur Identifikation von Identitätsbetrügern, Geldwäschern und Phishing-Simulanten.
2007 - Sebastian Gajek, Felix Gröbert, Macimillian Dornseif, Dominik Birk
In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.End-to-End Header Protection in S/MIME and PGP Mail.
2007 - Jörg Schwenk, Lijun Liao,
Postersession in the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007. [PDF]End-to-End Header Protection in Signed S/MIME.
2007 - Jörg Schwenk, Lijun Liao,
In Proceedings of the 2nd International Symposium on Information Security (IS'07), Nov 26-27, 2007 in Vilamoura, Algarve, Portugal.Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
2007 - Mark Manulis, Emmanuel Bresson
In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), 11-13 July, Hong Kong, China. [PDF] [Bibtex]Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
2007 - Mark Manulis, Emmanuel Bresson
In Proceedings of the International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), Wroclaw (Poland), 2007.