Veröffentlichungen
Sichere Webanwendungen
2008 - Mario Heiderich, Christian Matthies, Johannes Dahse, fukami
GALILEO PRESS, Auflage 1, ISBN-10: 3836211947, ISBN-13: 978-3836211949A Browser-Based Kerberos Authentication Scheme
2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
ESORICS 2008On Black-Box Ring Extraction and Integer Factorization
2008 - Kristina Altmann, Tibor Jager, Andy Rupp
ICALP 2008On the equivalence of generic group models
2008 - Tibor Jager, Jörg Schwenk
ProvSec 2008Property-Based Attestation without a Trusted Third Party
2008 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis,
Information Security Conference (ISC'08), 2008. [pdf]Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly
2008 - Ahmad-Reza Sadeghi, Frederik Armknecht, Hans Löhr, Mark Manulis, Alberto Escalante
Accepted for The 4th Information Security Practice and Experience Conference (ISPEC 2008), 21-23 April 2008, Sydney, Australia. [Springer Link] [pdf]On the classification of APN functions up to dimension five
2008 - Marcus Brinkmann, Gregor Leander
Des. Codes Cryptogr. (2008) 49: 273. [DOI] [pdf]Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen
2008 - Sebastian Gajek, Sven Schäge, Xuan Chen, Christoph Löhr
Datenschutz und Datensicherheit - DuD. Volume 32, Number 8, Seiten 515-519. Vieweg Verlag, August 2008. [Springer Link]A Forensic Framework for Tracing Phishers
2008 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk
International Federation for Information Processing, to appear in LNCS 6102. [pdf]A novel solution for end-to-end integrity protection in signed PGP mail
2008 - Jörg Schwenk, Lijun Liao,
ICICS 2008, Birmingham, UK