Ver­öf­fent­li­chun­gen

Ak­tu­el­le Ge­fah­ren im On­line­ban­king-Tech­ni­sche und Ju­ris­ti­sche Hin­ter­grün­de.

2007 - Jörg Schwenk, Georg Bor­ges, Se­bas­ti­an Gajek, Chris­toph We­ge­ner, Isa­bel­le Bi­al­laß, Julia Meyer, Den­nis Wer­ner

In Pro­cee­dings of the 10th Ger­man IT Se­cu­ri­ty Con­gress, Fe­deral Of­fice for In­for­ma­ti­on Se­cu­ri­ty, Bonn (Ger­ma­ny), 2007.

Brea­king and Fi­xing the In­li­ne Ap­proach.

2007 - Jörg Schwenk, Se­bas­ti­an Gajek, Lijun Liao,

In Pro­cee­dings of the ACM CCS Work­shop for Se­cu­re Web Ser­vices (ACM SWS'07), Alex­an­dria (USA), 2007 .

Brow­ser Mo­dels for Usa­ble Au­then­ti­ca­ti­on Pro­to­cols

2007 - Jörg Schwenk, Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Mark Ma­nu­lis,

Pre­sen­ted at the Work­shop on Web 2.0 Se­cu­ri­ty and Pri­va­cy (W2SP 2007) held in con­junc­tion with the IEEE Sym­po­si­um on Se­cu­ri­ty and Pri­va­cy, Oak­land, Ca­li­for­nia, May 24, 2007. [pdf]

Brow­ser Mo­dels for Usa­ble Au­then­ti­ca­ti­on Pro­to­cols.

2007 - Jörg Schwenk, Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Mark Ma­nu­lis,

In Pro­cee­dings of the IEEE Se­cu­ri­ty and Pri­va­cy Work­shop on Web 2.0 Se­cu­ri­ty and Pri­va­cy (W2SP'07), Oak­land (USA), 2007.

Brow­ser-ba­sed Au­then­ti­ca­ti­on Pro­to­cols for Naive Users.

2007 - Jörg Schwenk, Ah­mad-Re­za Sa­de­ghi, Se­bas­ti­an Gajek, Mark Ma­nu­lis,

ac­cep­ted for pre­sen­ta­ti­on at the Wes­tern Eu­ropean Work­shop on Re­se­arch in Cryp­to­lo­gy (WE­WoRC 2007), Bo­chum (Ger­ma­ny), 2007.

Com­part­men­ted Se­cu­ri­ty for Brow­sers

2007 - Se­bas­ti­an Gajek, Ah­mad-Re­za Sa­de­ghi, Chris­ti­an Stüb­le, Mar­cel Wi­n­an­dy

Tech­ni­cal Re­port HGI-TR-2007-001, Horst Görtz In­sti­tu­te for IT Se­cu­ri­ty, Ruhr-Uni­ver­si­ty Bo­chum, 2007. [pdf]

Ef­fi­ci­ent Hash Col­li­si­on Se­arch Stra­te­gies on Spe­cial-Pur­po­se Hard­ware

2007 - Sven Schä­ge, Tim Gü­ney­su, Chris­tof Paar

Spe­cial-pur­po­se Hard­ware for At­ta­cking Cryp­to­gra­phic Sys­tems, SHARCS Work­shop 2007, Sep­tem­ber 9-10, 2007, Vi­en­na, Aus­tria.

Ef­fi­ci­ent Hash Col­li­si­on Se­arch Stra­te­gies on Spe­cial-Pur­po­se Hard­ware

2007 - Sven Schä­ge, Tim Gü­ney­su, Chris­tof Paar

Wes­tern Eu­ropean Work­shop on Re­se­arch in Cryp­to­lo­gy, We­WORC Work­shop 2007, July 4-6, 2007, Bo­chum, Ger­ma­ny. [Sprin­ger Link]

Ein Frame­work zur Iden­ti­fi­ka­ti­on von Iden­ti­täts­be­trü­gern, Geld­wä­schern und Phis­hing-Si­mu­lan­ten.

2007 - Se­bas­ti­an Gajek, Felix Grö­bert, Ma­ci­mil­li­an Dorn­seif, Do­mi­nik Birk

In Pro­cee­dings of the 10th Ger­man IT Se­cu­ri­ty Con­gress, Fe­deral Of­fice for In­for­ma­ti­on Se­cu­ri­ty, Bonn (Ger­ma­ny), 2007.

End-to-End Hea­der Pro­tec­tion in S/MIME and PGP Mail.

2007 - Jörg Schwenk, Lijun Liao,

Pos­ter­ses­si­on in the 10th Ger­man IT Se­cu­ri­ty Con­gress, Fe­deral Of­fice for In­for­ma­ti­on Se­cu­ri­ty, Bonn (Ger­ma­ny), 2007. [PDF]
Seite: