Veröffentlichungen
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications
2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun
In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]Towards Multilateral Secure Digital Rights Distribution Infrastructures
2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,
accepted for ACM DRM Workshop'05, November 7, 2005, Alexandria, Virginia, USA.Towards Multilateral Secure Digital Rights Distribution Infrastructures
2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,
Accepted for ACM DRM 2005.Trustworthy Visualisation and Verification of Multiple XML-Signatures
2005 - Jörg Schwenk, Sebastian Gajek, Wolfgang Kubbilun
In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 311-320, Springer, 2005. [Springer]Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
2005 - Jörg Schwenk, Sebastian Gajek, Andre Adelsbach,
First Information Security Practice and Experience Conference (ISPEC 2005), LNCS 3439. pp 204-217. Copyrights Springer-Verlag, Heidelberg Berlin. [Bibtex] [Springer] [PDF]Key-Assignment Strategies for CPPM.
2004 - Jörg Schwenk, Andre Adelsbach,
ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]Key-Assignment Strategies for CPPM
2004 - Andre Adelsbach, Jörg Schwenk
ACM Multimedia and Security WorkshopModerne Verfahren der Kryptographie
2004 - Jörg Schwenk, Klaus-Dieter Wolfenstetter, Albrecht, Beutelsbacher
[Amazon]Overcoming the Obstacles of Zero-Knowledge Watermark Detection.
2004 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,
ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
2004 - Jörg Schwenk, Mark Manulis,
In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005. [Springer Link] [PDF] [Bibtex]