Ver­öf­fent­li­chun­gen

Sim­ple and Ef­fi­ci­ent Pu­blic-Key En­cryp­ti­on from Com­pu­ta­tio­nal Dif­fie-Hell­man in the Stan­dard Model

2010 - Kris­tiyan Ha­r­al­am­biev, Tibor Jager, Eike Kiltz, Vic­tor Shoup

PKC 2010

Mo­bi­le Ma­chi­ne Ope­ra­ti­on in Un­der­ground Net­works and the Se­cu­ri­ty Ques­ti­on

2010 - An­dre­as Noack, Chris­toph Mül­ler

escar'10 - 8th con­fe­rence on Em­bed­ded Se­cu­ri­ty in Cars, Bre­men, Ger­ma­ny [Con­fe­rence Link]

Ge­ne­ric Com­pi­lers for Au­then­ti­ca­ted Key Ex­chan­ge

2010 - Tibor Jager, Flo­ri­an Kohlar, Sven Schä­ge, Jörg Schwenk

In Pro­cee­dings of ASI­A­CRYPT 2010, Sin­ga­po­re [Full Ver­si­on]

Mu­tu­al Preim­age Au­then­ti­ca­ti­on for fast Han­do­ver in En­t­er­pri­se Net­works

2010 - An­dre­as Noack, Mark Borr­mann

The 5th In­ter­na­tio­nal Sym­po­si­um on In­for­ma­ti­on Se­cu­ri­ty (IS'10), Greece, 2010

Se­cu­ri­ty Ana­ly­sis of Open­ID

2010 - Pavol Sovis, Flo­ri­an Kohlar, Jörg Schwenk

In "Se­cu­ring Elec­tro­nic Busi­ness Pro­ces­ses - High­lights of the In­for­ma­ti­on Se­cu­ri­ty So­lu­ti­ons Eu­ro­pe 2010 Con­fe­rence", 2010. [Ca­me­ry Ready]

Group Key Agree­ment Per­for­mance in Wire­less Mesh Net­works

2010 - An­dre­as Noack, Jörg Schwenk

35th An­nual IEEE Con­fe­rence on Local Com­pu­ter Net­works and Work­shops, LCN 2010 [Kon­fe­renz]

A New RSA-Ba­sed Si­gna­tu­re Sche­me

2010 - Sven Schä­ge, Jörg Schwenk

AF­RI­CA­CRYPT 2010, Third In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in Af­ri­ca, Stel­len­bosch, South Af­ri­ca, May 3-6, 2010. [Sprin­ger Link]

Strea­ming-Ba­sed Ve­ri­fi­ca­ti­on of XML Si­gna­tu­res in SOAP Mes­sa­ges

2010 - Juraj So­mo­rovs­ky, Meiko Jen­sen, Jörg Schwenk

In Pro­cee­dings of the IEEE In­ter­na­tio­nal Work­shop on Web Ser­vice and Busi­ness Pro­cess Se­cu­ri­ty (WSBPS), Miami, Flo­ri­da, U.S.A., 2010.
Seite: