Ver­öf­fent­li­chun­gen

Your Soft­ware at my Ser­vice

2014 - Vla­dis­lav Mla­de­nov, Chris­ti­an Main­ka, Flo­ri­an Feld­mann, Ju­li­an Kraut­wald, Jörg Schwenk

ACM CCSW 2014 in con­junc­tion with the ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS) No­vem­ber 7, 2014, The Scotts­da­le Plaza Re­sort, Scotts­da­le, Ari­zo­na, USA. [paper]

Mul­ti-Ciph­er­sui­te Se­cu­ri­ty of the Se­cu­re Shell (SSH) Pro­to­col

2014 - Flo­ri­an Berg­s­ma, Ben­ja­min Dow­ling, Flo­ri­an Kohlar, Jörg Schwenk, Doug­las Ste­bi­la

ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty - Best Stu­dent Paper Award - [Web­sei­te]

How Se­cu­re is Text­Se­cu­re?

2014 - Til­man Frosch, Chris­ti­an Main­ka, Chris­toph Bader, Flo­ri­an Berg­s­ma, Jörg Schwenk, Thors­ten Holz

Cryp­to­lo­gy ePrint Ar­chi­ve, Re­port 2014/904, 31 Oct 2014 [pdf]

On the Se­cu­ri­ty of Hol­der-of-Key Sin­gle Sign-On

2014 - An­dre­as Mayer, Vla­dis­lav Mla­de­nov, Jörg Schwenk

Si­cher­heit 2014: Si­cher­heit, Schutz und Zu­ver­läs­sig­keit, Bei­trä­ge der 7. Jah­res­ta­gung des Fach­be­reichs Si­cher­heit der Ge­sell­schaft für In­for­ma­tik e.V. (GI), 19.-21. März 2014, Wien, Ös­ter­reich [pdf]

Streng­the­ning Web Au­then­ti­ca­ti­on through TLS - Bey­ond TLS Cli­ent Cer­ti­fi­ca­tes

2014 - Vla­dis­lav Mla­de­nov, Flo­ri­an Feld­mann, Chris­to­pher Meyer, An­dre­as Mayer, Jörg Schwenk

Open Iden­ti­ty Sum­mit 2014 Sep­tem­ber 4th - 6th 2014, Frau­en­ho­fer IZS, Stutt­gart, Ger­ma­ny, http://?open­iden­ti­ty.?eu

Guar­di­ans of the Clouds: When Iden­ti­ty Pro­vi­ders Fail

2014 - An­dre­as Mayer, Mar­cus Nie­mietz, Vla­dis­lav Mla­de­nov, Jörg Schwenk

ACM CCSW 2014 in con­junc­tion with the ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS) No­vem­ber 7, 2014, The Scotts­da­le Plaza Re­sort, Scotts­da­le, Ari­zo­na, USA. [paper]

Ef­fi­ci­ent Si­gna­tu­res with Tight Real World Se­cu­ri­ty in the Ran­dom-Ora­cle Model

2014 - Chris­toph Bader

In Pro­cee­dings of the 13th In­ter­na­tio­nal Con­fe­rence, CANS 2014 [paper]

Re­vi­sit­ing SSL/TLS Im­ple­men­ta­ti­ons: New Blei­chen­ba­cher Side Chan­nels and At­tacks

2014 - Chris­to­pher Meyer, Juraj So­mo­rovs­ky, Jörg Schwenk, Eugen Weiss, Se­bas­ti­an Schin­zel, Erik Tews

USE­NIX Se­cu­ri­ty 2014 [Sli­des] [pdf]

Script­less Ti­ming At­tacks on Web Brow­ser Pri­va­cy

2014 - Bin Liang, Wei You, Li­ang­kun Liu, Wen­chang Shi, Mario Hei­de­rich

2014 44th An­nual IEEE/IFIP In­ter­na­tio­nal Con­fe­rence on De­pen­da­ble Sys­tems and Net­works [PDF]

New Mo­du­lar Com­pi­lers for Au­then­ti­ca­ted Key Ex­chan­ge

2014 - Yong Li, Sven Schä­ge, Zheng Yang, Chris­toph Bader, Jörg Schwenk

In Pro­cee­dings the 12th In­ter­na­tio­nal Con­fe­rence, ACNS 2014 [Paper]
Seite: