TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 26.

German

Meyer, Christopher and Somorovsky, Juraj and Weiss, Eugen and Schwenk, Jörg and Schinzel, Sebastian and Tews, Erik (2014):
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14, In: Proceedings of the 23rd USENIX conference on Security Symposium, USENIX Association, San Diego, CA, USA, pp. 733-748, ISBN 978 -1- 931971-15 -7,
[Conference or Workshop Item]

Hühnlein, Detlef and Schwenk, Jörg and Wich, Tobias and Mladenov, Vladislav and Feldmann, Florian and Schmölz, Johannes and Brügger, Bud and Horsch, Moritz (2013):
Options for integrating eID and SAML.
In: DIM'13 - Proceedings of the 2013 ACM Workshop on Digital Identity Management, ACM, Berlin, Germany, pp. 85-96, ISBN 978-1-4503-2493-9,
DOI: 10.1145/2517881.2517892,
[Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg (2009):
User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication.
1, In: International Journal of Applied Cryptography, (4), pp. 290-308, [Article]

Manulis, Mark and Schwenk, Jörg (2009):
Security Model and Framework for Information Aggregation in Sensor Networks.
5, In: ACM Transactions on Sensor Networks, (2), pp. Article 13, DOI: http://doi.acm.org/10.1145/1498915.1498919,
[Article]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark and Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), [Conference or Workshop Item]

Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg (2008):
A Browser-Based Kerberos Authentication Scheme.
In: Lecture Notes in Computer Science, 5283, In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS 2008), Springer, pp. 115--129, [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Schwenk, Jörg (2008):
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
In: Lecture Notes in Computer Science, 5107, In: Proceedings of 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Springer, pp. 6-20, [Conference or Workshop Item]

Liao, Lijun and Manulis, Mark and Schwenk, Jörg Gupta, Jatinder N. D. and Sharma, Sushil (eds.) (2008):
Handbook of Research on Information Security and Assurance.
IGI Global, pp. 202--217, [Book Section]

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2008):
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), ACM Press, pp. 300--311, [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Pereira, Olivier and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2008):
Universally Composable Security Analysis of TLS.
In: Lecture Notes in Computer Science, 5324, In: Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008), Springer, pp. 313--327, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2007):
Browser Models for Usable Authentication Protocols.
In: IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland, USA, [Conference or Workshop Item]

Gajek, Sebastian and Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark (2007):
Browser-based Authentication Protocols for Naive Users.
In: Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum, Germany, [Conference or Workshop Item]

Manulis, Mark and Schwenk, Jörg (2007):
Provably Secure Framework for Information Aggregation in Sensor Networks.
In: Lecture Notes in Computer Science, 4705, In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007, Part I, Springer-Verlag, pp. 603--621, ISBN 3-540-74468-9,
[Conference or Workshop Item]

Manulis, Mark Paar, Christof and Sadeghi, Ahmad-Reza and Schwenk, Jörg (eds.) (2007):
Provably Secure Group Key Exchange.
In: IT Security, 5, Europäischer Universitätsverlag, ISBN 978-3-89966-275-7,
[Book]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Winandy, Marcel (2007):
Trusted User-Aware Web Authentication.
In: Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07),, Stanford, USA, [Conference or Workshop Item]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Manulis, Mark (2006):
Linkable Democratic Group Signatures.
In: 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China, [Conference or Workshop Item]

Manulis, Mark and Sadeghi, Ahmad-Reza and Schwenk, Jörg (2006):
Linkable Democratic Group Signatures.
In: Lecture Notes in Computer Science, 3903, In: Proceedings of the 2nd Information Security Practice and Experience Conference (ISPEC 2006), Springer-Verlag, pp. 187--201, ISBN 3-540-33052-6,
[Conference or Workshop Item]

Schwenk, Jörg and Greveler, Ulrich and Adelsbach, Andre (2005):
Fair DRM - Ermöglichen von Privatkopien und Schutz digitaler Waren.
In: 9. Deutscher IT-Sicherheitskongress des BSI, [Conference or Workshop Item]

Schwenk, Jörg and Gajek, Sebastian and Adelsbach, Andre (2005):
Phishing - Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten.
In: 9. Deutscher IT-Sicherheitskongress des BSI, [Conference or Workshop Item]

Schwenk, Jörg and Gajek, Sebastian and Adelsbach, Andre (2005):
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
In: LNCS, 3439, In: First Information Security Practice and Experience Conference (ISPEC 2005), Springer-Verlag, pp. 204-217, [Conference or Workshop Item]

Schwenk, Jörg and Adelsbach, Andre (2004):
Key-Assignment Strategies for CPPM.
In: ACM Multimedia and Security Workshop, ACM Press, Magdeburg, Germany, pp. 107 - 115, [Conference or Workshop Item]

Manulis, Mark and Schwenk, Jörg (2004):
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
In: Lecture Notes in Computer Science, 3313, In: ESAS, Springer, pp. 107--124, [Conference or Workshop Item]

["languages_typename_1" not defined]

Hühnlein, Detlef and Petrautzki, Dirk and Schmölz, Johannes and Wich, Tobias and Horsch, Moritz and Wieland, Thomas and Eichholz, Jan and Wiesmaier, Alexander and Braun, Johannes and Feldmann, Florian and Potzernheim, Simon and Schwenk, Jörg and Kahlo, Christian and Kühne, Andreas and Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit, Darmstadt, [Conference or Workshop Item]

This list was generated on Tue Dec 10 01:43:00 2019 CET.