Ver­öf­fent­li­chun­gen

One Bad Apple: Back­wards Com­pa­ti­bi­li­ty At­tacks on Sta­te-of-the-Art Cryp­to­gra­phy

2013 - Tibor Jager, Ken­neth G. Pa­ter­son, Juraj So­mo­rovs­ky

In Pro­cee­dings of the Net­work and Di­stri­bu­ted Sys­tem Se­cu­ri­ty Sym­po­si­um (NDSS), 2013 [Cryp­to­Ch­al­len­ge] [paper]

Stron­gly Se­cu­re One-round Group Au­then­ti­ca­ted Key Ex­chan­ge in the Stan­dard Model

2013 - Yong Li, Zheng Yang

In Pro­cee­dings of the 12th In­ter­na­tio­nal Con­fe­rence, CANS 2013 [Paper]

mXSS At­tacks: At­ta­cking well-se­cu­red Web-Ap­p­li­ca­ti­ons by using in­nerHT­ML Mu­ta­ti­ons

2013 - Mario Hei­de­rich, Jörg Schwenk, Til­man Frosch, Jonas Ma­ga­zi­ni­us, Ed­ward Z. Yang

20th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Ber­lin, Ger­ma­ny, No­vem­ber 2013 [PDF]

On the se­cu­ri­ty of TLS re­ne­go­tia­ti­on

2013 - Flo­ri­an Berg­s­ma, Flo­ri­an Kohlar, Doug­las Ste­bi­la

ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty

Op­ti­ons for In­te­gra­ting eID and SAML

2013 - Hühn­lein, Det­lef, Jörg Schwenk, To­bi­as Wich, Vla­dis­lav Mla­de­nov, Flo­ri­an Feld­mann, An­dre­as Mayer, Schm­ölz, Jo­han­nes, Brueg­ger, Bud P., Horsch, Mo­ritz

CCS 2013 Post-Con­fe­rence Work­shop, Di­gi­tal Iden­ti­ty Ma­nage­ment (DIM)

Si­che­rer Schlüs­sel- und In­for­ma­ti­ons­aus­tausch mit SAML

2013 - Den­nis Felsch, Thors­ten Schrei­ber, Chris­to­pher Meyer, Flo­ri­an Feld­mann, Jörg Schwenk

In Pro­cee­dings of the DACH Se­cu­ri­ty 2013, Nürn­berg, Ger­ma­ny [Paper]

How to au­then­ti­ca­te mo­bi­le de­vices in a web en­vi­ron­ment - The SIM-ID ap­proach

2013 - Flo­ri­an Feld­mann, Jörg Schwenk

Open Iden­ti­ty Sum­mit 2013 Sep­tem­ber 9th - 11th 2013, Klos­ter Banz, Ger­ma­ny http://​openidentity.​eu [Paper] [Pre­sen­ta­ti­on]

On the In­se­cu­ri­ty of XML Se­cu­ri­ty

2013 - Juraj So­mo­rovs­ky

PhD The­sis Su­per­vi­sors: Jörg Schwenk, Ken­neth G. Pa­ter­son [pdf]

A Foot­print of Third-Par­ty Tra­cking on Mo­bi­le Web

2013 - Ashar Javed

[POS­TER] In 20th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (ACM CCS), No­vem­ber 4-8, 2013 Ber­lin, Ger­ma­ny [pos­ter]

SoK: Les­sons Le­ar­ned From SSL/TLS At­tacks

2013 - Chris­to­pher Meyer, Jörg Schwenk

In Pro­cee­dings of "The 14th In­ter­na­tio­nal Work­shop on In­for­ma­ti­on Se­cu­ri­ty Ap­p­li­ca­ti­ons (WI­SA2013)" [Paper] [Sli­des]
Seite: