TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Jump to: 2014 | 2013 | 2012 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004
Number of items: 26.

2014

Meyer, Christopher and Somorovsky, Juraj and Weiss, Eugen and Schwenk, Jörg and Schinzel, Sebastian and Tews, Erik :
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14 . USENIX Association
[Conference or Workshop Item] , (2014)

2013

Hühnlein, Detlef and Schwenk, Jörg and Wich, Tobias and Mladenov, Vladislav and Feldmann, Florian and Schmölz, Johannes and Brügger, Bud and Horsch, Moritz :
Options for integrating eID and SAML.
DIM'13 - Proceedings of the 2013 ACM Workshop on Digital Identity Management ACM
[Conference or Workshop Item] , (2013)

2012

Hühnlein, Detlef and Petrautzki, Dirk and Schmölz, Johannes and Wich, Tobias and Horsch, Moritz and Wieland, Thomas and Eichholz, Jan and Wiesmaier, Alexander and Braun, Johannes and Feldmann, Florian and Potzernheim, Simon and Schwenk, Jörg and Kahlo, Christian and Kühne, Andreas and Veit, Heiko :
On the design and implementation of the Open eCard App.
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[Conference or Workshop Item] , (2012)

2009

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg :
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, 1 (4) pp. 290-308.
[Article] , (2009)

Manulis, Mark and Schwenk, Jörg :
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, 5 (2) Article 13.
[Article] , (2009)

2008

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark and Pereira, Olivier :
Universally Composable Security Analysis of TLS.
Second Conference on Provable Security (ProvSec)
[Conference or Workshop Item] , (2008)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08).
[Conference or Workshop Item] , (2008)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)
[Conference or Workshop Item] , (2008)

Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg :
A Browser-Based Kerberos Authentication Scheme.
In: Lecture Notes in Computer Science , 5283 . Springer
[Conference or Workshop Item] , (2008)

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg :
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Lecture Notes in Computer Science , 5107 . Springer
[Conference or Workshop Item] , (2008)

Liao, Lijun and Manulis, Mark and Schwenk, Jörg
Gupta, Jatinder N. D. and Sharma, Sushil (eds.) :

Handbook of Research on Information Security and Assurance.
In: UNSPECIFIED IGI Global , 202--217.
[Book Section] , (2008)

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) ACM Press
[Conference or Workshop Item] , (2008)

Gajek, Sebastian and Manulis, Mark and Pereira, Olivier and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science , 5324 . Springer
[Conference or Workshop Item] , (2008)

2007

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Browser Models for Usable Authentication Protocols.
IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07)
[Conference or Workshop Item] , (2007)

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007).
[Conference or Workshop Item] , (2007)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark :
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007)
[Conference or Workshop Item] , (2007)

Manulis, Mark and Schwenk, Jörg :
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Lecture Notes in Computer Science , 4705 . Springer-Verlag
[Conference or Workshop Item] , (2007)

Manulis, Mark:
Provably Secure Group Key Exchange.
IT Security, 5. Europäischer Universitätsverlag ISBN 978-3-89966-275-7
[Book] , (2007)

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Winandy, Marcel :
Trusted User-Aware Web Authentication.
Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),
[Conference or Workshop Item] , (2007)

2006

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Manulis, Mark :
Linkable Democratic Group Signatures.
2nd Information Security Practice and Experience Conference (ISPEC 2006)
[Conference or Workshop Item] , (2006)

Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg :
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science , 3903 . Springer-Verlag
[Conference or Workshop Item] , (2006)

2005

Schwenk, Jörg and Greveler, Ulrich and Adelsbach, Andre :
Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren.
9. Deutscher IT-Sicherheitskongress des BSI
[Conference or Workshop Item] , (2005)

Schwenk, Jörg and Gajek, Sebastian and Adelsbach, Andre :
Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
9. Deutscher IT-Sicherheitskongress des BSI
[Conference or Workshop Item] , (2005)

Schwenk, Jörg and Gajek, Sebastian and Adelsbach, Andre :
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: LNCS , 3439 . Springer-Verlag
[Conference or Workshop Item] , (2005)

2004

Schwenk, Jörg and Adelsbach, Andre :
Key-Assignment Strategies for CPPM.
ACM Multimedia and Security Workshop ACM Press
[Conference or Workshop Item] , (2004)

Manulis, Mark and Schwenk, Jörg :
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: Lecture Notes in Computer Science , 3313 . Springer
[Conference or Workshop Item] , (2004)

This list was generated on Sat May 25 01:32:48 2019 CEST.