Veröffentlichungen
Code Voting with Linkable Group Signatures
2008 - Jörg Schwenk, Sven Schäge, Jörg Helbach
3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria 2008. In LNI, 2008. [LNI Link]Finding Hash Collisions
2008 - Sven Schäge,
VDM Verlag Dr. Müller e.K., 2008. ISBN-13: 978-3639066135. [Amazon Link]Group Key Agreement for Ad Hoc Networks. Analysis of the Existing Protocols and Design of a New Protocol
2008 - Lijun Liao,
Publisher: Vdm Verlag Dr. Müller (Januar 2008) [Amazon]Modeling and Transformation of Security Requirements: An Approach for Service-oriented Architectures
2008 - Jörg Schwenk, Meiko Jensen, Ralph Herkenhöner, Sven Feja, Hermann de Meer, Andreas Speck
Proceedings of the First Euro-NF Workshop on Future Internet Architecture: New Trends in Service & Networking Architectures, 21. November 2008, Paris, FranceNutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS
2008 - Tibor Jager, Heiko Jäkel, Jörg Schwenk
Sicherheit 2008.Provably Secure Browser-Based User-Aware Mutual Authentication over TLS
2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,
Accepted for ASIACCS'08. [ACM Link]Securing Email Communication with XML Technology
2008 - Jörg Schwenk, Lijun Liao, Mark Manulis,
"Handbook of Research on Information Security and Assurance", to be published in August 2008 by Information Science Reference. [IGI Global]Stronger TLS Bindings for SAML Assertions and SAML Artifacts
2008 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,
In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'08), Virginia (USA), 2008.TLS Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
2008 - Jörg Schwenk,
This paper describes a novel approach that integrates Federated IDM and SSL.Universally Composable Security Analysis of TLS
2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira
Accepted for the Second Conference on Provable Security (ProvSec), 2008. [pdf]