Veröffentlichungen
Property-Based Taming of Lying Mobile Nodes.
2006 - Ahmad-Reza Sadeghi, Mark Manulis,
in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE International Workshop on Trusted and Autonomic Computing Systems (TACS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]Reversed Responsibilities: Browser Authentication instead of Server Authentication.
2006 - Jörg Schwenk, Sebastian Gajek,
Workshop on Transparency and Usability of Web Authentication, New York (USA), 2006.SSL-VA-Authentifizierung als Schutz vor Phishing und Pharming.
2006 - Jörg Schwenk, Sebastian Gajek, Christoph Wegener,
accepted for Sicherheit - Schutz und Zuverlässigkeit, February 20, 2006, Magdeburg, Germany. [PDF]Tree-based Group Key Agreement Framework for Mobile Ad-Hoc Networks.
2006 - Lijun Liao, Mark Manulis,
in Proceedings of 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), 2nd International Workshop on Security in Networks and Distributed Systems (SNDS 2006), 18-20 April, Vienna, Austria. [IEEE CS Link] [PDF] [Bibtex]Security Engineering for Zero-knowledge Watermark Detection
2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,
Special Session on Media Security, WIAMIS 2005, 13-15 April 2005, Montreux, Switzerland.A Broadcast Encryption Scheme with Free-Riders but Unconditional Security
2005 - Ulrich Greveler, Andre Adelsbach,
First International Conference on Digital Rights Management, Sydney 2005 to appear: Springer LNCS. [PDF]Anonymous Data Broadcasting by Misuse of Satellite ISPs
2005 - Ulrich Greveler, Andre Adelsbach, Sven Löschner
Proceedings of 22C3 Chaos Computer Club (CCC) Congress, Berlin, 2005, to appear. [PDF]Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it
2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,
to appear in ACM Multimedia Systems Journal.Complementing Zero-Knowledge Watermark Detection: Proving Properties of Embedded Information Without Revealing it.
2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,
ACM Multimedia Systems Journal. [Springer Link]Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups
2005 - Mark Manulis,
in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), International Workshop on Wireless and Sensor Networks Security (WSNS 2005), 07-10 November 2005, Washington, USA. [IEEE CS Link] [Bibtex] [PDF]