Veröffentlichungen

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

2015 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky

ACM CCS 2015 [pdf]

Practical Invalid Curve Attacks on TLS-ECDH

2015 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky

ESORICS 2015 [pdf]

Not so Smart: On Smart TV Apps

2015 - Marcus Niemietz, Juraj Somorovsky, Christian Mainka, Jörg Schwenk

International Workshop on Secure Internet of Things (SIoT 2015, Vienna, Austria) [pdf]

Waiting for CSP — Securing Legacy Web Applications with JSAgents

2015 - Mario Heiderich, Marcus Niemietz, Jörg Schwenk

Waiting for CSP — Securing Legacy Web Applications with JSAgents, ESORICS 2015, 20th European Symposium on Research in Computer Security [ESORICS 2015] [PDF file]

How to Break XML Encryption - Automatically

2015 - Dennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky

In Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT), 2015 [pdf]

Semi-Automated Fuzzy MCDM and Lattice Solutions for WS-Policy Intersection

2015 - Jörg Schwenk

IEEE 5th International Workshop on Security and Privacy Engineering SPE2015, within IEEE SERVICES 2015 June 27 and July 2, 2015, New York, NY, USA

Owning Your Home Network: Router Security Revisited

2015 - Marcus Niemietz, Jörg Schwenk

W2SP 2015: Web 2.0 Security & Privacy 2015 (San Jose, California) [Workshop] [PDF]

Tightly Secure Authenticated Key Exchange

2015 - Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li

TCC 2015 [paper]

On the Selective Opening Security of Practical Public-Key Encryption Schemes

2015 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge

PKC 2015
Seite: