TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 26.

Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik (2014):
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14, In: Proceedings of the 23rd USENIX conference on Security Symposium, pp. 733-748,
USENIX Association, San Diego, CA, USA, ISBN 978 -1- 931971-15 -7,
[Conference or Workshop Item]

Hühnlein, Detlef ; Schwenk, Jörg ; Wich, Tobias ; Mladenov, Vladislav ; Feldmann, Florian ; Schmölz, Johannes ; Brügger, Bud ; Horsch, Moritz (2013):
Options for integrating eID and SAML.
In: DIM'13 - Proceedings of the 2013 ACM Workshop on Digital Identity Management, pp. 85-96,
ACM, Berlin, Germany, ISBN 978-1-4503-2493-9,
DOI: 10.1145/2517881.2517892,
[Conference or Workshop Item]

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit,
Darmstadt, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg (2009):
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
In: International Journal of Applied Cryptography, 1 (4), pp. 290-308. [Article]

Manulis, Mark ; Schwenk, Jörg (2009):
Security Model and Framework for Information Aggregation in Sensor Networks.
In: ACM Transactions on Sensor Networks, 5 (2), pp. Article 13. DOI: http://doi.acm.org/10.1145/1498915.1498919,
[Article]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec),
[Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08),
[Conference or Workshop Item]

Gajek, Sebastian ; Jager, Tibor ; Manulis, Mark ; Schwenk, Jörg (2008):
A Browser-Based Kerberos Authentication Scheme.
In: Lecture Notes in Computer Science, 5283, In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS 2008), pp. 115--129,
Springer, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Schwenk, Jörg (2008):
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Lecture Notes in Computer Science, 5107, In: Proceedings of 13th Australasian Conference on Information Security and Privacy (ACISP 2008), pp. 6-20,
Springer, [Conference or Workshop Item]

Liao, Lijun ; Manulis, Mark ; Schwenk, Jörg
Gupta, Jatinder N. D. ; Sharma, Sushil (eds.) (2008):
Handbook of Research on Information Security and Assurance.
pp. 202--217, IGI Global, [Book Section]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), pp. 300--311,
ACM Press, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Pereira, Olivier ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2008):
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science, 5324, In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), pp. 313--327,
Springer, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07),
Oakland, USA, [Conference or Workshop Item]

Gajek, Sebastian ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007),
Bochum, Germany, [Conference or Workshop Item]

Manulis, Mark ; Schwenk, Jörg (2007):
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Lecture Notes in Computer Science, 4705, In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007, Part I, pp. 603--621,
Springer-Verlag, ISBN 3-540-74468-9,
[Conference or Workshop Item]

Manulis, Mark
Paar, Christof ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (eds.) (2007):
Provably Secure Group Key Exchange.
In: IT Security, 5, Europäischer Universitätsverlag, ISBN 978-3-89966-275-7,
[Book]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Gajek, Sebastian ; Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),,
Stanford, USA, [Conference or Workshop Item]

Schwenk, Jörg ; Sadeghi, Ahmad-Reza ; Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006),
Hangzhou, China, [Conference or Workshop Item]

Manulis, Mark ; Sadeghi, Ahmad-Reza ; Schwenk, Jörg (2006):
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science, 3903, In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), pp. 187--201,
Springer-Verlag, ISBN 3-540-33052-6,
[Conference or Workshop Item]

Schwenk, Jörg ; Greveler, Ulrich ; Adelsbach, Andre (2005):
Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren.
In: 9. Deutscher IT-Sicherheitskongress des BSI,
[Conference or Workshop Item]

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre (2005):
Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
In: 9. Deutscher IT-Sicherheitskongress des BSI,
[Conference or Workshop Item]

Schwenk, Jörg ; Gajek, Sebastian ; Adelsbach, Andre (2005):
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: LNCS, 3439, In: First Information Security Practice and Experience Conference (ISPEC 2005), pp. 204-217,
Springer-Verlag, [Conference or Workshop Item]

Schwenk, Jörg ; Adelsbach, Andre (2004):
Key-Assignment Strategies for CPPM.
In: ACM Multimedia and Security Workshop, pp. 107 - 115,
ACM Press, Magdeburg, Germany, [Conference or Workshop Item]

Manulis, Mark ; Schwenk, Jörg (2004):
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: Lecture Notes in Computer Science, 3313, In: ESAS, pp. 107--124,
Springer, [Conference or Workshop Item]

This list was generated on Sat Oct 23 03:58:24 2021 CEST.