BibTeX records: Jörg Schwenk

download as .bib file

@inproceedings{DBLP:conf/uss/BaumerBS24,
  author       = {Fabian B{\"{a}}umer and
                  Marcus Brinkmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number
                  Manipulation},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/b\%C3\%A4umer},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BaumerBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DunscheMEMBSS24,
  author       = {Martin Dunsche and
                  Marcel Maehren and
                  Nurullah Erinola and
                  Robert Merget and
                  Nicolai Bissantz and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {With Great Power Come Great Side Channels: Statistical Timing Side-Channel
                  Analyses with Bounded Type-1 Errors},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/dunsche},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DunscheMEMBSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NossKMNS23,
  author       = {Dominik Trevor No{\ss} and
                  Lukas Knittel and
                  Christian Mainka and
                  Marcus Niemietz and
                  J{\"{o}}rg Schwenk},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Finding All Cross-Site Needles in the {DOM} Stack: {A} Comprehensive
                  Methodology for the Automatic XS-Leak Detection in Web Browsers},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2456--2470},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616598},
  doi          = {10.1145/3576915.3616598},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NossKMNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ErinolaMMSS23,
  author       = {Nurullah Erinola and
                  Marcel Maehren and
                  Robert Merget and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Exploring the Unknown {DTLS} Universe: Analysis of the {DTLS} Server
                  Ecosystem on the Internet},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4859--4876},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/erinola},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ErinolaMMSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HebrokNMEMSS23,
  author       = {Sven Hebrok and
                  Simon Nachtigall and
                  Marcel Maehren and
                  Nurullah Erinola and
                  Robert Merget and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {We Really Need to Talk About Session Tickets: {A} Large-Scale Analysis
                  of Cryptographic Dangers with {TLS} Session Tickets},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4877--4894},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/hebrok},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HebrokNMEMSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GierlingsBS23,
  author       = {Matthias Gierlings and
                  Marcus Brinkmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Isolated and Exhausted: Attacking Operating Systems via Site Isolation
                  in the Browser},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7037--7054},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gierlings},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GierlingsBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RohlmannMMHS23,
  author       = {Simon Rohlmann and
                  Vladislav Mladenov and
                  Christian Mainka and
                  Daniel Hirschberger and
                  J{\"{o}}rg Schwenk},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Every Signature is Broken: On the Insecurity of Microsoft Office's
                  {OOXML} Signatures},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7411--7428},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/rohlmann},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RohlmannMMHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-12422,
  author       = {Fabian B{\"{a}}umer and
                  Marcus Brinkmann and
                  J{\"{o}}rg Schwenk},
  title        = {Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number
                  Manipulation},
  journal      = {CoRR},
  volume       = {abs/2312.12422},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.12422},
  doi          = {10.48550/ARXIV.2312.12422},
  eprinttype    = {arXiv},
  eprint       = {2312.12422},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-12422.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Schwenk22,
  author       = {J{\"{o}}rg Schwenk},
  title        = {Guide to Internet Cryptography - Security Protocols and Real-World
                  Attack Implications},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19439-9},
  doi          = {10.1007/978-3-031-19439-9},
  isbn         = {978-3-031-19438-2},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Schwenk22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SchwenkS22,
  author       = {J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {A reduction-based proof for authentication and session key security
                  in three-party Kerberos},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {61--84},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJACT.2022.10052385},
  doi          = {10.1504/IJACT.2022.10052385},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SchwenkS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JannettMMS22,
  author       = {Louis Jannett and
                  Vladislav Mladenov and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{DISTINCT:} Identity Theft using In-Browser Communications in Dual-Window
                  Single Sign-On},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1553--1567},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560692},
  doi          = {10.1145/3548606.3560692},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JannettMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MaehrenNHMSS22,
  author       = {Marcel Maehren and
                  Philipp Nieting and
                  Sven Hebrok and
                  Robert Merget and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {TLS-Anvil: Adapting Combinatorial Testing for {TLS} Libraries},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {215--232},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/maehren},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MaehrenNHMSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RohlmannMMS22,
  author       = {Simon Rohlmann and
                  Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Oops... Code Execution and Content Spoofing: The First Comprehensive
                  Analysis of OpenDocument Signatures},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3075--3092},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/rohlmann},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RohlmannMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KnittelMNNS21,
  author       = {Lukas Knittel and
                  Christian Mainka and
                  Marcus Niemietz and
                  Dominik Trevor No{\ss} and
                  J{\"{o}}rg Schwenk},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site
                  Leaks in Web Browsers},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1771--1788},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484739},
  doi          = {10.1145/3460120.3484739},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KnittelMNNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PoetteringRSS21,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  editor       = {Kenneth G. Paterson},
  title        = {SoK: Game-Based Security Models for Group Key Exchange},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {148--176},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_7},
  doi          = {10.1007/978-3-030-75539-3\_7},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0007NMMS21,
  author       = {Jens M{\"{u}}ller and
                  Dominik Noss and
                  Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  title        = {Processing Dangerous Paths - On Security and Privacy of the Portable
                  Document Format},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/processing-dangerous-paths-on-security-and-privacy-of-the-portable-document-format/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/0007NMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RohlmannMMS21,
  author       = {Simon Rohlmann and
                  Vladislav Mladenov and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  title        = {Breaking the Specification: {PDF} Certification},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1485--1501},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00110},
  doi          = {10.1109/SP40001.2021.00110},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RohlmannMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MergetBASMS21,
  author       = {Robert Merget and
                  Marcus Brinkmann and
                  Nimrod Aviram and
                  Juraj Somorovsky and
                  Johannes Mittmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles
                  in {TLS-DH(E)}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {213--230},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/merget},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MergetBASMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrinkmannDMP0SS21,
  author       = {Marcus Brinkmann and
                  Christian Dresen and
                  Robert Merget and
                  Damian Poddebniak and
                  Jens M{\"{u}}ller and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk and
                  Sebastian Schinzel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ALPACA:} Application Layer Protocol Confusion - Analyzing and Mitigating
                  Cracks in {TLS} Authentication},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4293--4310},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BrinkmannDMP0SS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringRSS21,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {SoK: Game-based Security Models for Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/305},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LauerGMHS20,
  author       = {Sebastian Lauer and
                  Kai Gellert and
                  Robert Merget and
                  Tobias Handirk and
                  J{\"{o}}rg Schwenk},
  title        = {{T0RTT:} Non-Interactive Immediate Forward-Secret Single-Pass Circuit
                  Construction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {2},
  pages        = {336--357},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0030},
  doi          = {10.2478/POPETS-2020-0030},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/LauerGMHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/00040SB20,
  author       = {Stefan Hoffmann and
                  Jens M{\"{u}}ller and
                  J{\"{o}}rg Schwenk and
                  Gerd Bumiller},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Powerless Security},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_11},
  doi          = {10.1007/978-3-030-57878-7\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/00040SB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchwenkBP0SS20,
  author       = {J{\"{o}}rg Schwenk and
                  Marcus Brinkmann and
                  Damian Poddebniak and
                  Jens M{\"{u}}ller and
                  Juraj Somorovsky and
                  Sebastian Schinzel},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Mitigation of Attacks on Email End-to-End Encryption},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1647--1664},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417878},
  doi          = {10.1145/3372297.3417878},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchwenkBP0SS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0007BPSS20,
  author       = {Jens M{\"{u}}ller and
                  Marcus Brinkmann and
                  Damian Poddebniak and
                  Sebastian Schinzel and
                  J{\"{o}}rg Schwenk},
  title        = {Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End
                  Encryption},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162218},
  doi          = {10.1109/CNS48642.2020.9162218},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/0007BPSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DowlingRS20,
  author       = {Benjamin Dowling and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Flexible Authenticated and Confidential Channel Establishment (fACCE):
                  Analyzing the Noise Protocol Framework},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {341--373},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_12},
  doi          = {10.1007/978-3-030-45374-9\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DowlingRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchageSL20,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk and
                  Sebastian Lauer},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {567--596},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_20},
  doi          = {10.1007/978-3-030-45388-6\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchageSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/0007IMMSS20,
  author       = {Jens M{\"{u}}ller and
                  Fabian Ising and
                  Christian Mainka and
                  Vladislav Mladenov and
                  Sebastian Schinzel and
                  J{\"{o}}rg Schwenk},
  editor       = {Yuval Yarom and
                  Sarah Zennou},
  title        = {Office Document Security and Privacy},
  booktitle    = {14th {USENIX} Workshop on Offensive Technologies, {WOOT} 2020, August
                  11, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/woot20/presentation/muller},
  timestamp    = {Mon, 01 Feb 2021 08:41:50 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/0007IMMSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MergetBASMS20,
  author       = {Robert Merget and
                  Marcus Brinkmann and
                  Nimrod Aviram and
                  Juraj Somorovsky and
                  Johannes Mittmann and
                  J{\"{o}}rg Schwenk},
  title        = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles
                  in {TLS-DH(E)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1151},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1151},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MergetBASMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchageSL20,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk and
                  Sebastian Lauer},
  title        = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1519},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1519},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SchageSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchwenkWH19,
  author       = {J{\"{o}}rg Schwenk and
                  Tobias Wich and
                  Detlef H{\"{u}}hnlein},
  title        = {Moderne Vertrauensdienste f{\"{u}}r vertrauensw{\"{u}}rdige
                  Transaktionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {4},
  pages        = {214--219},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1095-5},
  doi          = {10.1007/S11623-019-1095-5},
  timestamp    = {Thu, 09 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchwenkWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/0007BPSS19,
  author       = {Jens M{\"{u}}ller and
                  Marcus Brinkmann and
                  Damian Poddebniak and
                  Sebastian Schinzel and
                  J{\"{o}}rg Schwenk},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {24--42},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_2},
  doi          = {10.1007/978-3-030-21568-2\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/0007BPSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MladenovMSGS19,
  author       = {Vladislav Mladenov and
                  Christian Mainka and
                  Karsten Meyer zu Selhausen and
                  Martin Grothe and
                  J{\"{o}}rg Schwenk},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {1 Trillion Dollar Refund: How To Spoof {PDF} Signatures},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339812},
  doi          = {10.1145/3319535.3339812},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MladenovMSGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0007IMMSS19,
  author       = {Jens M{\"{u}}ller and
                  Fabian Ising and
                  Vladislav Mladenov and
                  Christian Mainka and
                  Sebastian Schinzel and
                  J{\"{o}}rg Schwenk},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Practical Decryption exFiltration: Breaking {PDF} Encryption},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {15--29},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354214},
  doi          = {10.1145/3319535.3354214},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0007IMMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/EngelbertzMSHES19,
  author       = {Nils Engelbertz and
                  Vladislav Mladenov and
                  Juraj Somorovsky and
                  David Herring and
                  Nurullah Erinola and
                  J{\"{o}}rg Schwenk},
  editor       = {Heiko Ro{\ss}nagel and
                  Sven Wagner and
                  Detlef H{\"{u}}hnlein},
  title        = {Security Analysis of XAdES Validation in the {CEF} Digital Signature
                  Services {(DSS)}},
  booktitle    = {Open Identity Summit 2019, {OID} 2019, Garmisch-Partenkirchen, Germany,
                  March 28-29, 2019},
  series       = {{LNI}},
  volume       = {{P-293}},
  pages        = {95--106},
  publisher    = {{GI}},
  year         = {2019},
  url          = {https://dl.gi.de/handle/20.500.12116/20997},
  timestamp    = {Tue, 04 Jul 2023 17:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/EngelbertzMSHES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0007BPBSSS19,
  author       = {Jens M{\"{u}}ller and
                  Marcus Brinkmann and
                  Damian Poddebniak and
                  Hanno B{\"{o}}ck and
                  Sebastian Schinzel and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {"Johnny, you are fired!" - Spoofing OpenPGP and {S/MIME}
                  Signatures in Emails},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1011--1028},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/muller},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0007BPBSSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MergetSAYFSS19,
  author       = {Robert Merget and
                  Juraj Somorovsky and
                  Nimrod Aviram and
                  Craig Young and
                  Janis Fliegenschmidt and
                  J{\"{o}}rg Schwenk and
                  Yuval Shavitt},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Scalable Scanning and Automatic Classification of {TLS} Padding Oracle
                  Vulnerabilities},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1029--1046},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/merget},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MergetSAYFSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-07550,
  author       = {Jens M{\"{u}}ller and
                  Marcus Brinkmann and
                  Damian Poddebniak and
                  Sebastian Schinzel and
                  J{\"{o}}rg Schwenk},
  title        = {Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End
                  Encryption},
  journal      = {CoRR},
  volume       = {abs/1904.07550},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.07550},
  eprinttype    = {arXiv},
  eprint       = {1904.07550},
  timestamp    = {Fri, 26 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-07550.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingRS19,
  author       = {Benjamin Dowling and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk},
  title        = {Flexible Authenticated and Confidential Channel Establishment (fACCE):
                  Analyzing the Noise Protocol Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwenkS19,
  author       = {J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {A Reduction-Based Proof for Authentication and Session Key Security
                  in 3-Party Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwenkS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauerGMHS19,
  author       = {Sebastian Lauer and
                  Kai Gellert and
                  Robert Merget and
                  Tobias Handirk and
                  J{\"{o}}rg Schwenk},
  title        = {{T0RTT:} Non-Interactive Immediate Forward-Secret Single-Pass Circuit
                  Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1433},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauerGMHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RoslerMS18,
  author       = {Paul R{\"{o}}sler and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  title        = {More is Less: On the End-to-End Security of Group Chats in Signal,
                  WhatsApp, and Threema},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {415--429},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00036},
  doi          = {10.1109/EUROSP.2018.00036},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/RoslerMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0007MFS18,
  author       = {Jens M{\"{u}}ller and
                  Vladislav Mladenov and
                  Dennis Felsch and
                  J{\"{o}}rg Schwenk},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {PostScript Undead: Pwning the Web with a 35 Years Old Language},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {603--622},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_28},
  doi          = {10.1007/978-3-030-00470-5\_28},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/0007MFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PoddebniakD0ISF18,
  author       = {Damian Poddebniak and
                  Christian Dresen and
                  Jens M{\"{u}}ller and
                  Fabian Ising and
                  Sebastian Schinzel and
                  Simon Friedberger and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Efail: Breaking {S/MIME} and OpenPGP Email Encryption using Exfiltration
                  Channels},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {549--566},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/poddebniak},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PoddebniakD0ISF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FelschGSCS18,
  author       = {Dennis Felsch and
                  Martin Grothe and
                  J{\"{o}}rg Schwenk and
                  Adam Czubak and
                  Marcin Szymanek},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {The Dangers of Key Reuse: Practical Attacks on IPsec {IKE}},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {567--583},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/felsch},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FelschGSCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/EngelbertzEHSMS18,
  author       = {Nils Engelbertz and
                  Nurullah Erinola and
                  David Herring and
                  Juraj Somorovsky and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Christian Rossow and
                  Yves Younan},
  title        = {Security Analysis of eIDAS - The Cross-Country Authentication Scheme
                  in Europe},
  booktitle    = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
                  MD, USA, August 13-14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/woot18/presentation/engelbertz},
  timestamp    = {Mon, 01 Feb 2021 08:41:54 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/EngelbertzEHSMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JagerKSS17,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Authenticated Confidential Channel Establishment and the Security
                  of {TLS-DHE}},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {1276--1324},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9248-2},
  doi          = {10.1007/S00145-016-9248-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JagerKSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HaleJLS17,
  author       = {Britta Hale and
                  Tibor Jager and
                  Sebastian Lauer and
                  J{\"{o}}rg Schwenk},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Simple Security Definitions for and Constructions of 0-RTT Key Exchange},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {20--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_2},
  doi          = {10.1007/978-3-319-61204-1\_2},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HaleJLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NiemietzS17,
  author       = {Marcus Niemietz and
                  J{\"{o}}rg Schwenk},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {Out of the Dark: {UI} Redressing and Trustworthy Events},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {229--249},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_11},
  doi          = {10.1007/978-3-030-02641-7\_11},
  timestamp    = {Wed, 25 Sep 2019 18:04:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NiemietzS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FelschMMS17,
  author       = {Dennis Felsch and
                  Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {{SECRET:} On the Feasibility of a Secure, Efficient, and Collaborative
                  Real-Time Web Editor},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {835--848},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052982},
  doi          = {10.1145/3052973.3052982},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FelschMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeiderichSS17,
  author       = {Mario Heiderich and
                  Christopher Sp{\"{a}}th and
                  J{\"{o}}rg Schwenk},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {DOMPurify: Client-Side Protection Against {XSS} and Markup Injection},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {116--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_7},
  doi          = {10.1007/978-3-319-66399-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeiderichSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MainkaMSW17,
  author       = {Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk and
                  Tobias Wich},
  title        = {SoK: Single Sign-On Security - An Evaluation of OpenID Connect},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {251--266},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.32},
  doi          = {10.1109/EUROSP.2017.32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MainkaMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MullerMSS17,
  author       = {Jens M{\"{u}}ller and
                  Vladislav Mladenov and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  title        = {SoK: Exploiting Network Printers},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {213--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.47},
  doi          = {10.1109/SP.2017.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MullerMSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchwenkNM17,
  author       = {J{\"{o}}rg Schwenk and
                  Marcus Niemietz and
                  Christian Mainka},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Same-Origin Policy: Evaluation in Modern Browsers},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {713--727},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schwenk},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchwenkNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/GrotheNSS17,
  author       = {Martin Grothe and
                  Tobias Niemann and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Breaking and Fixing Gridcoin},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/grothe},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/GrotheNSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoslerMS17,
  author       = {Paul R{\"{o}}sler and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  title        = {More is Less: How Group Chats Weaken the Security of Instant Messengers
                  Signal, WhatsApp, and Threema},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/713},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoslerMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GrotheMRJKS16,
  author       = {Martin Grothe and
                  Christian Mainka and
                  Paul R{\"{o}}sler and
                  Johanna Jupke and
                  Jan Kaiser and
                  J{\"{o}}rg Schwenk},
  title        = {Your Cloud in My Company: Modern Rights Management Services Revisited},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {217--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.69},
  doi          = {10.1109/ARES.2016.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GrotheMRJKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HorstGJS16,
  author       = {Matthias Horst and
                  Martin Grothe and
                  Tibor Jager and
                  J{\"{o}}rg Schwenk},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Breaking {PPTP} VPNs via {RADIUS} Encryption},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {159--175},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_10},
  doi          = {10.1007/978-3-319-48965-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/HorstGJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MainkaMS16,
  author       = {Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  title        = {Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking
                  Single Sign-on},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {321--336},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.33},
  doi          = {10.1109/EUROSP.2016.33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MainkaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/FroschMBBSH16,
  author       = {Tilman Frosch and
                  Christian Mainka and
                  Christoph Bader and
                  Florian Bergsma and
                  J{\"{o}}rg Schwenk and
                  Thorsten Holz},
  title        = {How Secure is TextSecure?},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {457--472},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.41},
  doi          = {10.1109/EUROSP.2016.41},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/FroschMBBSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/HuhnleinFSPSHWN16,
  author       = {Detlef H{\"{u}}hnlein and
                  Tilman Frosch and
                  J{\"{o}}rg Schwenk and
                  Carl{-}Markus Piswanger and
                  Marc Sel and
                  Tina H{\"{u}}hnlein and
                  Tobias Wich and
                  Daniel Nemmert and
                  Ren{\'{e}} Lottes and
                  Juraj Somorovsky and
                  Vladislav Mladenov and
                  Cristina Condovici and
                  Herbert Leitold and
                  Sophie Stalla{-}Bourdillon and
                  Niko Tsakalakis and
                  Jan Eichholz and
                  Frank{-}Michael Kamm and
                  Andreas K{\"{u}}hne and
                  Damian Wabisch and
                  Roger Dean and
                  Jon Shamah and
                  Mikheil Kapanadze and
                  Nuno Ponte and
                  Jose Martins and
                  Renato Portela and
                  Cagatay Karabat and
                  Snezana Stojicic and
                  Slobodan Nedeljkovic and
                  Vincent Bouckaert and
                  Alexandre Defays and
                  Bruce Anderson and
                  Michael Jonas and
                  Christina Hermanns and
                  Thomas Schubert and
                  Dirk Wegener and
                  Alexander Sazonov},
  editor       = {Detlef H{\"{u}}hnlein and
                  Heiko Ro{\ss}nagel and
                  Christian H. Schunck and
                  Maurizio Talamo},
  title        = {FutureTrust - Future Trust Services for Trustworthy Global Transactions},
  booktitle    = {Open Identity Summit 2016, 13-14 October 2016, Rome, Italy},
  series       = {{LNI}},
  volume       = {{P-264}},
  pages        = {27--41},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/602},
  timestamp    = {Tue, 30 Jul 2024 10:43:12 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/HuhnleinFSPSHWN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/ElsafieS16,
  author       = {Abeer Elsafie and
                  J{\"{o}}rg Schwenk},
  editor       = {Christophe Debruyne and
                  Herv{\'{e}} Panetto and
                  Robert Meersman and
                  Tharam S. Dillon and
                  Eva K{\"{u}}hn and
                  Declan O'Sullivan and
                  Claudio Agostino Ardagna},
  title        = {Evaluating Two Methods for WS-(Security) Policy Negotiation and Decision
                  Making},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2016 Conferences
                  - Confederated International Conferences: CoopIS, C{\&}TC, and
                  {ODBASE} 2016, Rhodes, Greece, October 24-28, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10033},
  pages        = {890--909},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48472-3\_56},
  doi          = {10.1007/978-3-319-48472-3\_56},
  timestamp    = {Tue, 15 Nov 2022 15:22:36 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/ElsafieS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/GrotheMRS16,
  author       = {Martin Grothe and
                  Christian Mainka and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk},
  editor       = {Natalie Silvanovich and
                  Patrick Traynor},
  title        = {How to Break Microsoft Rights Management Services},
  booktitle    = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin,
                  TX, USA, August 8-9, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/woot16/workshop-program/presentation/grothe},
  timestamp    = {Mon, 01 Feb 2021 08:41:54 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/GrotheMRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/SpathMMS16,
  author       = {Christopher Sp{\"{a}}th and
                  Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Natalie Silvanovich and
                  Patrick Traynor},
  title        = {SoK: {XML} Parser Vulnerabilities},
  booktitle    = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin,
                  TX, USA, August 8-9, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/woot16/workshop-program/presentation/spath},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/SpathMMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schwenk16,
  author       = {J{\"{o}}rg Schwenk},
  title        = {Nonce-based Kerberos is a Secure Delegated {AKE} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schwenk16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FelschHSS15,
  author       = {Dennis Felsch and
                  Mario Heiderich and
                  Frederic Schulz and
                  J{\"{o}}rg Schwenk},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Florian Kerschbaum and
                  Cristina Nita{-}Rotaru},
  title        = {How Private is Your Private Cloud?: Security Analysis of Cloud Control
                  Interfaces},
  booktitle    = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
                  Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {5--16},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808425.2808432},
  doi          = {10.1145/2808425.2808432},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FelschHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JagerSS15,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk and
                  Juraj Somorovsky},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {On the Security of {TLS} 1.3 and {QUIC} Against Weaknesses in PKCS{\#}1
                  v1.5 Encryption},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1185--1196},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813657},
  doi          = {10.1145/2810103.2813657},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JagerSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeiderichNS15,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  J{\"{o}}rg Schwenk},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Waiting for {CSP} - Securing Legacy Web Applications with JSAgents},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_2},
  doi          = {10.1007/978-3-319-24174-6\_2},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HeiderichNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AltmeierMSS15,
  author       = {Christian Altmeier and
                  Christian Mainka and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
                  Weaknesses in Web Services},
  booktitle    = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9481},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29883-2\_5},
  doi          = {10.1007/978-3-319-29883-2\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AltmeierMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JagerSS15,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk and
                  Juraj Somorovsky},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Practical Invalid Curve Attacks on {TLS-ECDH}},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {407--425},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_21},
  doi          = {10.1007/978-3-319-24174-6\_21},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/JagerSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/MainkaMGS15,
  author       = {Christian Mainka and
                  Vladislav Mladenov and
                  Tim Guenther and
                  J{\"{o}}rg Schwenk},
  editor       = {Detlef H{\"{u}}hnlein and
                  Heiko Ro{\ss}nagel and
                  Raik Kuhlisch and
                  Jan Ziesing},
  title        = {Automatic recognition, processing and attacking of single sign-on
                  protocols with burp suite},
  booktitle    = {Open Identity Summit 2015, 10-11 November 2015, Berlin, Germany},
  series       = {{LNI}},
  volume       = {{P-251}},
  pages        = {119--131},
  publisher    = {{GI}},
  year         = {2015},
  url          = {https://dl.gi.de/handle/20.500.12116/1977},
  timestamp    = {Tue, 30 Jul 2024 10:43:25 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/MainkaMGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BergsmaJS15,
  author       = {Florian Bergsma and
                  Tibor Jager and
                  J{\"{o}}rg Schwenk},
  editor       = {Jonathan Katz},
  title        = {One-Round Key Exchange with Strong Security: An Efficient and Generic
                  Construction in the Standard Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {477--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_21},
  doi          = {10.1007/978-3-662-46447-2\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BergsmaJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/ElsafieS15,
  author       = {Abeer Elsafie and
                  J{\"{o}}rg Schwenk},
  editor       = {Liang{-}Jie Zhang and
                  Rami Bahsoon},
  title        = {Semi-automated Fuzzy {MCDM} and Lattice Solutions for WS-Policy Intersection},
  booktitle    = {2015 {IEEE} World Congress on Services, {SERVICES} 2015, New York
                  City, NY, USA, June 27 - July 2, 2015},
  pages        = {167--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SERVICES.2015.33},
  doi          = {10.1109/SERVICES.2015.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/ElsafieS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siot/NiemietzSMS15,
  author       = {Marcus Niemietz and
                  Juraj Somorovsky and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  editor       = {Gabriel Ghinita and
                  Pedro Peris{-}Lopez},
  title        = {Not so Smart: On Smart {TV} Apps},
  booktitle    = {2015 International Workshop on Secure Internet of Things, SIoT 2015,
                  Vienna, Austria, September 21-25, 2015},
  pages        = {72--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SIOT.2015.13},
  doi          = {10.1109/SIOT.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siot/NiemietzSMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/KupserMSS15,
  author       = {Dennis Kupser and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk and
                  Juraj Somorovsky},
  editor       = {Aur{\'{e}}lien Francillon and
                  Thomas Ptacek},
  title        = {How to Break {XML} Encryption - Automatically},
  booktitle    = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington,
                  DC, USA, August 10-11, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/woot15/workshop-program/presentation/kupser},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/KupserMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NiemietzS15,
  author       = {Marcus Niemietz and
                  J{\"{o}}rg Schwenk},
  title        = {Owning Your Home Network: Router Security Revisited},
  journal      = {CoRR},
  volume       = {abs/1506.04112},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.04112},
  eprinttype    = {arXiv},
  eprint       = {1506.04112},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NiemietzS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MladenovMKFS15,
  author       = {Vladislav Mladenov and
                  Christian Mainka and
                  Julian Krautwald and
                  Florian Feldmann and
                  J{\"{o}}rg Schwenk},
  title        = {On the security of modern Single Sign-On Protocols: OpenID Connect
                  1.0},
  journal      = {CoRR},
  volume       = {abs/1508.04324},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.04324},
  eprinttype    = {arXiv},
  eprint       = {1508.04324},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MladenovMKFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergsmaJS15,
  author       = {Florian Bergsma and
                  Tibor Jager and
                  J{\"{o}}rg Schwenk},
  title        = {One-Round Key Exchange with Strong Security: An Efficient and Generic
                  Construction in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BergsmaJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleJLS15,
  author       = {Britta Hale and
                  Tibor Jager and
                  Sebastian Lauer and
                  J{\"{o}}rg Schwenk},
  title        = {Speeding: On Low-Latency Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1214},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleJLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HeiderichNSHS14,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  Felix Schuster and
                  Thorsten Holz and
                  J{\"{o}}rg Schwenk},
  title        = {Scriptless attacks: Stealing more pie without touching the sill},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {567--599},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130494},
  doi          = {10.3233/JCS-130494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HeiderichNSHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiSYBS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Christoph Bader and
                  J{\"{o}}rg Schwenk},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {New Modular Compilers for Authenticated Key Exchange},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_1},
  doi          = {10.1007/978-3-319-07536-5\_1},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiSYBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MainkaMFKS14,
  author       = {Christian Mainka and
                  Vladislav Mladenov and
                  Florian Feldmann and
                  Julian Krautwald and
                  J{\"{o}}rg Schwenk},
  editor       = {Gail{-}Joon Ahn and
                  Alina Oprea and
                  Reihaneh Safavi{-}Naini},
  title        = {Your Software at my Service: Security Analysis of SaaS Single Sign-On
                  Solutions in the Cloud},
  booktitle    = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing
                  Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664168.2664172},
  doi          = {10.1145/2664168.2664172},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MainkaMFKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MayerNMS14,
  author       = {Andreas Mayer and
                  Marcus Niemietz and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Gail{-}Joon Ahn and
                  Alina Oprea and
                  Reihaneh Safavi{-}Naini},
  title        = {Guardians of the Clouds: When Identity Providers Fail},
  booktitle    = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing
                  Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664168.2664171},
  doi          = {10.1145/2664168.2664171},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MayerNMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BergsmaDKSS14,
  author       = {Florian Bergsma and
                  Benjamin Dowling and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Multi-Ciphersuite Security of the Secure Shell {(SSH)} Protocol},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {369--381},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660286},
  doi          = {10.1145/2660267.2660286},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BergsmaDKSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Schwenk14,
  author       = {J{\"{o}}rg Schwenk},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Modelling Time for Authenticated Key Exchange Protocols},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {277--294},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_16},
  doi          = {10.1007/978-3-319-11212-1\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Schwenk14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/JavedBKDS14,
  author       = {Ashar Javed and
                  David Bletgen and
                  Florian Kohlar and
                  Markus D{\"{u}}rmuth and
                  J{\"{o}}rg Schwenk},
  title        = {Secure Fallback Authentication and the Trusted Friend Attack},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {22--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.30},
  doi          = {10.1109/ICDCSW.2014.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/JavedBKDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JavedRS14,
  author       = {Ashar Javed and
                  Jens Riemer and
                  J{\"{o}}rg Schwenk},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {{SIACHEN:} {A} Fine-Grained Policy Language for the Mitigation of
                  Cross-Site Scripting Attacks},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {515--528},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_33},
  doi          = {10.1007/978-3-319-13257-0\_33},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JavedRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/MayerMSFM14,
  author       = {Andreas Mayer and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk and
                  Florian Feldmann and
                  Christopher Meyer},
  editor       = {Detlef H{\"{u}}hnlein and
                  Heiko Ro{\ss}nagel},
  title        = {Strengthening Web Authentication through {TLS} - Beyond {TLS} Client
                  Certificates},
  booktitle    = {Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany},
  series       = {{LNI}},
  volume       = {{P-237}},
  pages        = {97--108},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/2642},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/MayerMSFM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiSYKS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  editor       = {Hugo Krawczyk},
  title        = {On the Security of the Pre-shared Key Ciphersuites of {TLS}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {669--684},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_38},
  doi          = {10.1007/978-3-642-54631-0\_38},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiSYKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MayerMS14,
  author       = {Andreas Mayer and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {On the Security of Holder-of-Key Single Sign-On},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {65--77},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20069},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MayerMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JavedMS14,
  author       = {Ashar Javed and
                  Christian Merz and
                  J{\"{o}}rg Schwenk},
  title        = {TTPCookie: Flexible Third-Party Cookie Management for Increasing Online
                  Privacy},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.9},
  doi          = {10.1109/TRUSTCOM.2014.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JavedMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MeyerSWSST14,
  author       = {Christopher Meyer and
                  Juraj Somorovsky and
                  Eugen Weiss and
                  J{\"{o}}rg Schwenk and
                  Sebastian Schinzel and
                  Erik Tews},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Revisiting {SSL/TLS} Implementations: New Bleichenbacher Side Channels
                  and Attacks},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {733--748},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/meyer},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MeyerSWSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JavedS14,
  author       = {Ashar Javed and
                  J{\"{o}}rg Schwenk},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Systematically Breaking Online {WYSIWYG} Editors},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_10},
  doi          = {10.1007/978-3-319-15087-1\_10},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JavedS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MainkaMS14,
  author       = {Christian Mainka and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  title        = {Do not trust me: Using malicious IdPs for analyzing and attacking
                  Single Sign-On},
  journal      = {CoRR},
  volume       = {abs/1412.1623},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.1623},
  eprinttype    = {arXiv},
  eprint       = {1412.1623},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MainkaMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSYKS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  title        = {On the Security of the Pre-Shared Key Ciphersuites of {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/037},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSYKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FroschMBBSH14,
  author       = {Tilman Frosch and
                  Christian Mainka and
                  Christoph Bader and
                  Florian Bergsma and
                  J{\"{o}}rg Schwenk and
                  Thorsten Holz},
  title        = {How Secure is TextSecure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/904},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FroschMBBSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JagerS13,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  title        = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {2},
  pages        = {225--245},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9120-y},
  doi          = {10.1007/S00145-012-9120-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JagerS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeiderichSFMY13,
  author       = {Mario Heiderich and
                  J{\"{o}}rg Schwenk and
                  Tilman Frosch and
                  Jonas Magazinius and
                  Edward Z. Yang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {mXSS attacks: attacking well-secured web-applications by using innerHTML
                  mutations},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {777--788},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516723},
  doi          = {10.1145/2508859.2516723},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeiderichSFMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MichaelisMS13,
  author       = {Kai Michaelis and
                  Christopher Meyer and
                  J{\"{o}}rg Schwenk},
  editor       = {Ed Dawson},
  title        = {Randomly Failed! The State of Randomness in Current Java Implementations},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_9},
  doi          = {10.1007/978-3-642-36095-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MichaelisMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/HuhnleinSWMFMSBH13,
  author       = {Detlef H{\"{u}}hnlein and
                  J{\"{o}}rg Schwenk and
                  Tobias Wich and
                  Vladislav Mladenov and
                  Florian Feldmann and
                  Andreas Mayer and
                  Johannes Schm{\"{o}}lz and
                  Bud P. Bruegger and
                  Moritz Horsch},
  editor       = {Thomas Gro{\ss} and
                  Marit Hansen},
  title        = {Options for integrating eID and {SAML}},
  booktitle    = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
                  Management, Berlin, Germany, November 8, 2013},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517881.2517892},
  doi          = {10.1145/2517881.2517892},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/HuhnleinSWMFMSBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/FalkenbergMSS13,
  author       = {Andreas Falkenberg and
                  Christian Mainka and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  title        = {A New Approach towards DoS Penetration Testing on Web Services},
  booktitle    = {2013 {IEEE} 20th International Conference on Web Services, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {491--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICWS.2013.72},
  doi          = {10.1109/ICWS.2013.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/FalkenbergMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/FeldmannS13,
  author       = {Florian Feldmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Detlef H{\"{u}}hnlein and
                  Heiko Ro{\ss}nagel},
  title        = {How to authenticate mobile devices in a web environment - the {SIM-ID}
                  approach},
  booktitle    = {Open Identity Summit 2013, September 9th - 11th 2013, Kloster Banz,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-223}},
  pages        = {130--141},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/17186},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/FeldmannS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JavedS13,
  author       = {Ashar Javed and
                  J{\"{o}}rg Schwenk},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Towards Elimination of Cross-Site Scripting on Mobile Versions of
                  Web Applications},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {103--123},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_7},
  doi          = {10.1007/978-3-319-05149-9\_7},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JavedS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MeyerS13,
  author       = {Christopher Meyer and
                  J{\"{o}}rg Schwenk},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {SoK: Lessons Learned from {SSL/TLS} Attacks},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {189--209},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_12},
  doi          = {10.1007/978-3-319-05149-9\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MeyerS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/zeus/ElsafieMS13,
  author       = {Abeer Elsafie and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  editor       = {Oliver Kopp and
                  Niels Lohmann},
  title        = {A new approach for WS-Policy Intersection using Partial Ordered Sets},
  booktitle    = {Proceedings of the 5\({}^{\mbox{th}}\) Central-European Workshop on
                  Services and their Composition, Rostock, Germany, February 21-22,
                  2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1029},
  pages        = {45--48},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1029/paper9.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:18 +0100},
  biburl       = {https://dblp.org/rec/conf/zeus/ElsafieMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerS13,
  author       = {Christopher Meyer and
                  J{\"{o}}rg Schwenk},
  title        = {Lessons Learned From Previous {SSL/TLS} Attacks - {A} Brief Chronology
                  Of Attacks And Weaknesses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlarSS13,
  author       = {Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {On the Security of {TLS-DH} and {TLS-RSA} in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohlarSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schwenk13,
  author       = {J{\"{o}}rg Schwenk},
  title        = {Modelling Time, or {A} Step Towards Reduction-based Security Proofs
                  for {OTP} and Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schwenk13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingGKSS13,
  author       = {Benjamin Dowling and
                  Florian Giesen and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {Multi-ciphersuite security and the {SSH} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/813},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingGKSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JensenJIMS12,
  author       = {Meiko Jensen and
                  Holger Junker and
                  Luigi Lo Iacono and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  title        = {{XML} Signature Wrapping Angriffe wirksam unterbinden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {236--240},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0091-9},
  doi          = {10.1007/S11623-012-0091-9},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JensenJIMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeiderichNSHS12,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  Felix Schuster and
                  Thorsten Holz and
                  J{\"{o}}rg Schwenk},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Scriptless attacks: stealing the pie without touching the sill},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {760--771},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382276},
  doi          = {10.1145/2382196.2382276},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HeiderichNSHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/MainkaJIS12a,
  author       = {Christian Mainka and
                  Meiko Jensen and
                  Luigi Lo Iacono and
                  J{\"{o}}rg Schwenk},
  editor       = {Ivan I. Ivanov and
                  Marten van Sinderen and
                  Frank Leymann and
                  Tony Shan},
  title        = {Making {XML} Signatures Immune to {XML} Signature Wrapping Attacks},
  booktitle    = {Cloud Computing and Services Science - Second International Conference,
                  {CLOSER} 2012, Porto, Portugal, April 18-21, 2012. Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {367},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-04519-1\_10},
  doi          = {10.1007/978-3-319-04519-1\_10},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/MainkaJIS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/MainkaJIS12,
  author       = {Christian Mainka and
                  Meiko Jensen and
                  Luigi Lo Iacono and
                  J{\"{o}}rg Schwenk},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Tony Shan},
  title        = {XSpRES - Robust and Effective {XML} Signatures for Web Services},
  booktitle    = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on
                  Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April,
                  2012},
  pages        = {187--197},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/MainkaJIS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/SomorovskyMTSSW12,
  author       = {Juraj Somorovsky and
                  Christopher Meyer and
                  Thang Tran and
                  Mohamad Sbeiti and
                  J{\"{o}}rg Schwenk and
                  Christian Wietfeld},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Tony Shan},
  title        = {SeC2: Secure Mobile Solution for Distributed Public Cloud Storages},
  booktitle    = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on
                  Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April,
                  2012},
  pages        = {555--561},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 29 May 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/SomorovskyMTSSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JagerKSS12,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {On the Security of {TLS-DHE} in the Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {273--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_17},
  doi          = {10.1007/978-3-642-32009-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JagerKSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MeyerFS12,
  author       = {Christopher Meyer and
                  Florian Feldmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Sometimes It's Better to Be STUCK! {SAML} Transportation Unit for
                  Cryptographic Keys},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_9},
  doi          = {10.1007/978-3-642-37682-5\_9},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MeyerFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangS12,
  author       = {Zheng Yang and
                  J{\"{o}}rg Schwenk},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {Strongly Authenticated Key Exchange Protocol from Bilinear Groups
                  without Random Oracles},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {264--275},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_17},
  doi          = {10.1007/978-3-642-33272-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/MainkaSS12,
  author       = {Christian Mainka and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  title        = {Penetration Testing Tool for Web Services Security},
  booktitle    = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu,
                  HI, USA, June 24-29, 2012},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERVICES.2012.7},
  doi          = {10.1109/SERVICES.2012.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/MainkaSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/SomorovskyS12,
  author       = {Juraj Somorovsky and
                  J{\"{o}}rg Schwenk},
  title        = {Technical Analysis of Countermeasures against Attack on {XML} Encryption
                  - or - Just Another Motivation for Authenticated Encryption},
  booktitle    = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu,
                  HI, USA, June 24-29, 2012},
  pages        = {171--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERVICES.2012.6},
  doi          = {10.1109/SERVICES.2012.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/SomorovskyS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12,
  author       = {Detlef H{\"{u}}hnlein and
                  Dirk Petrautzki and
                  Johannes Schm{\"{o}}lz and
                  Tobias Wich and
                  Moritz Horsch and
                  Thomas Wieland and
                  Jan Eichholz and
                  Alexander Wiesmaier and
                  Johannes Braun and
                  Florian Feldmann and
                  Simon Potzernheim and
                  J{\"{o}}rg Schwenk and
                  Christian Kahlo and
                  Andreas K{\"{u}}hne and
                  Heiko Veit},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {On the design and implementation of the Open eCard App},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {95--110},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18266},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SomorovskyMSKJ12,
  author       = {Juraj Somorovsky and
                  Andreas Mayer and
                  J{\"{o}}rg Schwenk and
                  Marco Kampmann and
                  Meiko Jensen},
  editor       = {Tadayoshi Kohno},
  title        = {On Breaking {SAML:} Be Whoever You Want to Be},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {397--412},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/somorovsky},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SomorovskyMSKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/KohlarSJG11,
  author       = {Florian Kohlar and
                  J{\"{o}}rg Schwenk and
                  Meiko Jensen and
                  Sebastian Gajek},
  title        = {On Cryptographically Strong Bindings of {SAML} Assertions to Transport
                  Layer Security},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {3},
  number       = {4},
  pages        = {20--35},
  year         = {2011},
  url          = {https://doi.org/10.4018/jmcmc.2011100102},
  doi          = {10.4018/JMCMC.2011100102},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/KohlarSJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JensenSBGI11,
  author       = {Meiko Jensen and
                  J{\"{o}}rg Schwenk and
                  Jens{-}Matthias Bohli and
                  Nils Gruschka and
                  Luigi Lo Iacono},
  editor       = {Ling Liu and
                  Manish Parashar},
  title        = {Security Prospects through Cloud Computing by Adopting Multiple Clouds},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {565--572},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CLOUD.2011.85},
  doi          = {10.1109/CLOUD.2011.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/JensenSBGI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SomorovskyHJSGI11,
  author       = {Juraj Somorovsky and
                  Mario Heiderich and
                  Meiko Jensen and
                  J{\"{o}}rg Schwenk and
                  Nils Gruschka and
                  Luigi Lo Iacono},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {All your clouds are belong to us: security analysis of cloud management
                  interfaces},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046664},
  doi          = {10.1145/2046660.2046664},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SomorovskyHJSGI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/SchwenkKA11,
  author       = {J{\"{o}}rg Schwenk and
                  Florian Kohlar and
                  Marcus Amon},
  editor       = {Abhilasha Bhargav{-}Spantzel and
                  Thomas Gro{\ss}},
  title        = {The power of recognition: secure single sign-on using {TLS} channel
                  bindings},
  booktitle    = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
                  Management, Chicago, IL, {USA} - October 21, 2011},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046642.2046656},
  doi          = {10.1145/2046642.2046656},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/SchwenkKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HeiderichFNS11,
  author       = {Mario Heiderich and
                  Tilman Frosch and
                  Marcus Niemietz and
                  J{\"{o}}rg Schwenk},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {The Bug That Made Me President a Browser- and Web-Security Case Study
                  on Helios Voting},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_6},
  doi          = {10.1007/978-3-642-32747-6\_6},
  timestamp    = {Thu, 27 Feb 2020 12:57:38 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/HeiderichFNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schwenk11,
  author       = {J{\"{o}}rg Schwenk},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{HTTP} Authentication},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {564--565},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_653},
  doi          = {10.1007/978-1-4419-5906-5\_653},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schwenk11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS11,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {A Standard-Model Security Analysis of {TLS-DHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0024351,
  author       = {J{\"{o}}rg Schwenk},
  title        = {Sicherheit und Kryptographie im Internet - Von sicherer E-Mail bis
                  zu IP-Verschl{\"{u}}sselung {(3.} Aufl.)},
  publisher    = {Vieweg},
  year         = {2010},
  url          = {http://www.viewegteubner.de/index.php;do=show\_book/book\_id=20237},
  isbn         = {978-3-8348-0814-1},
  timestamp    = {Fri, 04 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0024351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KohlarSJG10,
  author       = {Florian Kohlar and
                  J{\"{o}}rg Schwenk and
                  Meiko Jensen and
                  Sebastian Gajek},
  title        = {Secure Bindings of {SAML} Assertions to {TLS} Sessions},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.89},
  doi          = {10.1109/ARES.2010.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KohlarSJG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JensenSS10,
  author       = {Meiko Jensen and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Towards an Anonymous Access Control and Accountability Scheme for
                  Cloud Computing},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010,
                  Miami, FL, USA, 5-10 July, 2010},
  pages        = {540--541},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CLOUD.2010.61},
  doi          = {10.1109/CLOUD.2010.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/JensenSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SchageS10,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {A New RSA-Based Signature Scheme},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_1},
  doi          = {10.1007/978-3-642-12678-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SchageS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerKSS10,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Masayuki Abe},
  title        = {Generic Compilers for Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_14},
  doi          = {10.1007/978-3-642-17373-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JagerKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SchageS10,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Radu Sion},
  title        = {A CDH-Based Ring Signature Scheme with Short Signatures and Public
                  Keys},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_12},
  doi          = {10.1007/978-3-642-14577-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SchageS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BussmeyerGSW10,
  author       = {Daniel Bu{\ss}meyer and
                  Felix Gr{\"{o}}bert and
                  J{\"{o}}rg Schwenk and
                  Christoph Wegener},
  editor       = {Radu Sion},
  title        = {Attacking of SmartCard-Based Banking Applications with JavaScript-Based
                  Rootkits},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {320--327},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_25},
  doi          = {10.1007/978-3-642-14577-3\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BussmeyerGSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/NoackS10,
  author       = {Andreas Noack and
                  J{\"{o}}rg Schwenk},
  title        = {Group key agreement performance in wireless mesh networks},
  booktitle    = {The 35th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings},
  pages        = {176--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCN.2010.5735694},
  doi          = {10.1109/LCN.2010.5735694},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/NoackS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/SomorovskyJS10,
  author       = {Juraj Somorovsky and
                  Meiko Jensen and
                  J{\"{o}}rg Schwenk},
  title        = {Streaming-Based Verification of {XML} Signatures in {SOAP} Messages},
  booktitle    = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA,
                  July 5-10, 2010},
  pages        = {637--644},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SERVICES.2010.57},
  doi          = {10.1109/SERVICES.2010.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/SomorovskyJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SovisKS10,
  author       = {Pavol Sovis and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  editor       = {Felix C. Freiling},
  title        = {Security Analysis of OpenID},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {329--340},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19793},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SovisKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS10,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Generic Compilers for Authenticated Key Exchange (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GruschkaJIS09,
  author       = {Nils Gruschka and
                  Meiko Jensen and
                  Luigi Lo Iacono and
                  J{\"{o}}rg Schwenk},
  title        = {{XML} Signature Wrapping Angriffe - What you process is not always
                  what you verify},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {9},
  pages        = {553--560},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0142-z},
  doi          = {10.1007/S11623-009-0142-Z},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GruschkaJIS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/GajekMS09,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {User-aware provably secure protocols for browser-based mutual authentication},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {290--308},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028028},
  doi          = {10.1504/IJACT.2009.028028},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/GajekMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ManulisS09,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {Security model and framework for information aggregation in sensor
                  networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {5},
  number       = {2},
  pages        = {13:1--13:28},
  year         = {2009},
  url          = {https://doi.org/10.1145/1498915.1498919},
  doi          = {10.1145/1498915.1498919},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ManulisS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JensenS09,
  author       = {Meiko Jensen and
                  J{\"{o}}rg Schwenk},
  title        = {The Accountability Problem of Flooding Attacks in Service-Oriented
                  Architectures},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.11},
  doi          = {10.1109/ARES.2009.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JensenS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JensenSGI09,
  author       = {Meiko Jensen and
                  J{\"{o}}rg Schwenk and
                  Nils Gruschka and
                  Luigi Lo Iacono},
  title        = {On Technical Security Issues in Cloud Computing},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2009,
                  Bangalore, India, 21-25 September, 2009},
  pages        = {109--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CLOUD.2009.60},
  doi          = {10.1109/CLOUD.2009.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/JensenSGI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerS09,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  editor       = {Mitsuru Matsui},
  title        = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {399--416},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_24},
  doi          = {10.1007/978-3-642-10366-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JagerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/EichholzHS09,
  author       = {Jan Eichholz and
                  Detlef H{\"{u}}hnlein and
                  J{\"{o}}rg Schwenk},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Detlef H{\"{u}}hnlein},
  title        = {SAMLizing the European Citizen Card},
  booktitle    = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-155}},
  pages        = {105--116},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/23195},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/EichholzHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/WolfSW09,
  author       = {Christopher Wolf and
                  J{\"{o}}rg Schwenk and
                  Zidu Wang},
  editor       = {Stefan Fischer and
                  Erik Maehle and
                  R{\"{u}}diger Reischuk},
  title        = {Sicherheitsanalyse von Kreditkarten am Beispiel von {EMV}},
  booktitle    = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus
                  das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September
                  28 - October 2, 2009, Proceedings},
  series       = {{LNI}},
  volume       = {{P-154}},
  pages        = {1732--1743},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/31139},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/WolfSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/GajekJLS09,
  author       = {Sebastian Gajek and
                  Meiko Jensen and
                  Lijun Liao and
                  J{\"{o}}rg Schwenk},
  title        = {Analysis of Signature Wrapping Attacks and Countermeasures},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
                  Angeles, CA, USA, 6-10 July 2009},
  pages        = {575--582},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICWS.2009.12},
  doi          = {10.1109/ICWS.2009.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/GajekJLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GajekSSX09,
  author       = {Sebastian Gajek and
                  J{\"{o}}rg Schwenk and
                  Michael Steiner and
                  Chen Xuan},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Risks of the CardSpace Protocol},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_23},
  doi          = {10.1007/978-3-642-04474-8\_23},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/GajekSSX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/NoackS09,
  author       = {Andreas Noack and
                  J{\"{o}}rg Schwenk},
  title        = {Group key agreement for wireless mesh networks},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {945--952},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355044},
  doi          = {10.1109/LCN.2009.5355044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/NoackS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/JensenLS09,
  author       = {Meiko Jensen and
                  Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Ernesto Damiani and
                  Seth Proctor and
                  Anoop Singhal},
  title        = {The curse of namespaces in the domain of {XML} signature},
  booktitle    = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS}
                  2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655121.1655129},
  doi          = {10.1145/1655121.1655129},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/JensenLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/AzziniMJS09,
  author       = {Antonia Azzini and
                  Stefania Marrara and
                  Meiko Jensen and
                  J{\"{o}}rg Schwenk},
  editor       = {Ernesto Damiani and
                  Seth Proctor and
                  Anoop Singhal},
  title        = {Extending the similarity-based {XML} multicast approach with digital
                  signatures},
  booktitle    = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS}
                  2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655121.1655131},
  doi          = {10.1145/1655121.1655131},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/AzziniMJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerS09,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  title        = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GajekMS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong
                  Locked Same Origin Policy},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {6--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_2},
  doi          = {10.1007/978-3-540-70500-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GajekMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BrueggerHS08,
  author       = {Bud P. Bruegger and
                  Detlef H{\"{u}}hnlein and
                  J{\"{o}}rg Schwenk},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Detlef H{\"{u}}hnlein},
  title        = {TLS-Federation - a Secure and Relying-Party-Friendly Approach for
                  Federated Identity Management},
  booktitle    = {{BIOSIG} 2008 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 11.-12. September 2008 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-137}},
  pages        = {93--104},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21201},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/BrueggerHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GajekMSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Provably secure browser-based user-aware mutual authentication over
                  {TLS}},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {300--311},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368354},
  doi          = {10.1145/1368310.1368354},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GajekMSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GajekJMS08,
  author       = {Sebastian Gajek and
                  Tibor Jager and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {A Browser-Based Kerberos Authentication Scheme},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_8},
  doi          = {10.1007/978-3-540-88313-5\_8},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GajekJMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/HelbachSS08,
  author       = {J{\"{o}}rg Helbach and
                  J{\"{o}}rg Schwenk and
                  Sven Sch{\"{a}}ge},
  editor       = {Robert Krimmer and
                  R{\"{u}}diger Grimm},
  title        = {Code Voting with Linkable Group Signatures},
  booktitle    = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
                  f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
                  Castle Hofen, Bregenz, Austria},
  series       = {{LNI}},
  volume       = {{P-131}},
  pages        = {209--221},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/29183},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/HelbachSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/OppligerSL08,
  author       = {Rolf Oppliger and
                  J{\"{o}}rg Schwenk and
                  Christoph L{\"{o}}hr},
  editor       = {Robert Krimmer and
                  R{\"{u}}diger Grimm},
  title        = {CAPTCHA-based Code Voting},
  booktitle    = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
                  f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
                  Castle Hofen, Bregenz, Austria},
  series       = {{LNI}},
  volume       = {{P-131}},
  pages        = {223--236},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/29184},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/OppligerSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiaoS08,
  author       = {Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {A Novel Solution for End-to-End Integrity Protection in Signed {PGP}
                  Mail},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_2},
  doi          = {10.1007/978-3-540-88625-9\_2},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiaoS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/JagerS08,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {On the Equivalence of Generic Group Models},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {200--209},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_14},
  doi          = {10.1007/978-3-540-88733-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/JagerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/GajekMPSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Olivier Pereira and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Universally Composable Security Analysis of {TLS}},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_22},
  doi          = {10.1007/978-3-540-88733-1\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/GajekMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/JagerJS08,
  author       = {Tibor Jager and
                  Heiko J{\"{a}}kel and
                  J{\"{o}}rg Schwenk},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation
                  bei {SSL/TLS}},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {127--136},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21471},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/JagerJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/OppligerSH08,
  author       = {Rolf Oppliger and
                  J{\"{o}}rg Schwenk and
                  J{\"{o}}rg Helbach},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Protecting Code Voting Against Vote Selling},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {193--204},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21476},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/OppligerSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/GajekLS08,
  author       = {Sebastian Gajek and
                  Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Ernesto Damiani and
                  Seth Proctor},
  title        = {Stronger {TLS} bindings for {SAML} assertions and {SAML} artifacts},
  booktitle    = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
                  2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456492.1456495},
  doi          = {10.1145/1456492.1456495},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/GajekLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GajekMPSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Olivier Pereira and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  title        = {Universally Composable Security Analysis of {TLS} - Secure Sessions
                  with Handshake and Record Layer Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GajekMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerS08,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  title        = {The Generic Hardness of Subset Membership Problems under the Factoring
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PaarSSW07,
  author       = {Christof Paar and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk and
                  Christoph Wegener},
  title        = {Studieren mit Sicherheit in Bochum - Die Studieng{\"{a}}nge zum
                  Thema IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {31},
  number       = {5},
  pages        = {338--342},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11623-007-0130-0},
  doi          = {10.1007/S11623-007-0130-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PaarSSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GajekLS07,
  author       = {Sebastian Gajek and
                  Lijun Liao and
                  J{\"{o}}rg Schwenk},
  title        = {Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking
                  mit Secure HBCI/FinTS},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {31},
  number       = {11},
  pages        = {816--821},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11623-007-0265-z},
  doi          = {10.1007/S11623-007-0265-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GajekLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecows/GajekLMS07,
  author       = {Sebastian Gajek and
                  Lijun Liao and
                  Bodo M{\"{o}}ller and
                  J{\"{o}}rg Schwenk},
  editor       = {Cesare Pautasso and
                  Thomas Gschwind},
  title        = {SSL-over-SOAP: Towards a Token-based Key Establishment Framework for
                  Web Services},
  booktitle    = {Proceedings of the 2nd {ECOWS07} Workshop on Emerging Web Services
                  Technology, {WEWST} 2007, Halle (Saale), Germany, November 26, 2007},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {313},
  publisher    = {CEUR-WS.org},
  year         = {2007},
  url          = {https://ceur-ws.org/Vol-313/paper9.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ecows/GajekLMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecows/LiaoS07,
  author       = {Lijun Liao and
                  J{\"{o}}rg Schwenk},
  title        = {Secure Emails in {XML} Format Using Web Services},
  booktitle    = {Fifth {IEEE} European Conference on Web Services {(ECOWS} 2007), 26-28
                  November 2007, Halle (Saale), Germany},
  pages        = {129--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ECOWS.2007.12},
  doi          = {10.1109/ECOWS.2007.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecows/LiaoS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecows/GajekLMS07a,
  author       = {Sebastian Gajek and
                  Lijun Liao and
                  Bodo M{\"{o}}ller and
                  J{\"{o}}rg Schwenk},
  editor       = {Thomas Gschwind and
                  Cesare Pautasso},
  title        = {SSL-over-SOAP: Towards a Token-based Key Establishment framework for
                  Web services},
  booktitle    = {Emerging Web Services Technology, Volume II, Final Proceedings of
                  the 2nd {ECOWS07} Workshop on Emerging Web Services Technology, WEWST@ECOWS
                  2007, Halle (Saale), Germany, November 26, 2007},
  series       = {Whitestein series in software agent technologies and autonomic computing},
  pages        = {141--157},
  publisher    = {Birkh{\"{a}}user / Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-7643-8864-5\_10},
  doi          = {10.1007/978-3-7643-8864-5\_10},
  timestamp    = {Thu, 18 Jul 2019 16:35:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ecows/GajekLMS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic/LiaoS07,
  author       = {Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy and
                  Joan Lu and
                  Jan Smid},
  title        = {Securing Email Communication with {XML} Technology},
  booktitle    = {Proceedings of the 2007 International Conference on Internet Computing,
                  {ICOMP} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {304--310},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Thu, 03 Jan 2008 15:16:43 +0100},
  biburl       = {https://dblp.org/rec/conf/ic/LiaoS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ManulisS07,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Provably Secure Framework for Information Aggregation in Sensor Networks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4705},
  pages        = {603--621},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74472-6\_49},
  doi          = {10.1007/978-3-540-74472-6\_49},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ManulisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BressonMS07,
  author       = {Emmanuel Bresson and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {On Security Models and Compilers for Group Key Exchange Protocols},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {292--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_20},
  doi          = {10.1007/978-3-540-75651-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BressonMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/LiaoS07,
  author       = {Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {End-to-End Header Protection in Signed {S/MIME}},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4804},
  pages        = {1646--1658},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76843-2\_37},
  doi          = {10.1007/978-3-540-76843-2\_37},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/LiaoS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/GajekLS07,
  author       = {Sebastian Gajek and
                  Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Peng Ning and
                  Ernesto Damiani and
                  Seth Proctor},
  title        = {Breaking and fixing the inline approach},
  booktitle    = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
                  2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {37--43},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314418.1314425},
  doi          = {10.1145/1314418.1314425},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/GajekLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HelbachS07,
  author       = {J{\"{o}}rg Helbach and
                  J{\"{o}}rg Schwenk},
  editor       = {Ammar Alkassar and
                  Melanie Volkamer},
  title        = {Secure Internet Voting with Code Sheets},
  booktitle    = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007,
                  Bochum, Germany, October 4-5, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4896},
  pages        = {166--177},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77493-8\_15},
  doi          = {10.1007/978-3-540-77493-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/HelbachS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisS07,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {Provably Secure Framework for Information Aggregation is Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0016894,
  author       = {Albrecht Beutelspacher and
                  J{\"{o}}rg Schwenk and
                  Klaus{-}Dieter Wolfenstetter},
  title        = {Moderne Verfahren der Krypotgraphie - von {RSA} zu Zero-Knowledge
                  {(6.} Aufl.)},
  publisher    = {Vieweg},
  year         = {2006},
  isbn         = {978-3-8348-0083-1},
  timestamp    = {Thu, 24 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0016894.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ManulisSS06,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Linkable Democratic Group Signatures},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_18},
  doi          = {10.1007/11689522\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ManulisSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GajekSW06,
  author       = {Sebastian Gajek and
                  J{\"{o}}rg Schwenk and
                  Christoph Wegener},
  editor       = {Jana Dittmann},
  title        = {SSL-VA-Authentifizierung als Schutz von Phishing und Pharming},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {6--17},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24768},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GajekSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisSS06,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  title        = {Linkable Democratic Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonMS06,
  author       = {Emmanuel Bresson and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {On Security Models and Compilers for Group Key Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/EwersKLS05,
  author       = {Lars Ewers and
                  Wolfgang Kubbilun and
                  Lijun Liao and
                  J{\"{o}}rg Schwenk},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_39},
  doi          = {10.1007/11552055\_39},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/EwersKLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/KubbilunGPS05,
  author       = {Wolfgang Kubbilun and
                  Sebastian Gajek and
                  Michael Psarros and
                  J{\"{o}}rg Schwenk},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Trustworthy Verification and Visualisation of Multiple XML-Signatures},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {311--320},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_41},
  doi          = {10.1007/11552055\_41},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/KubbilunGPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/AdelsbachGS05,
  author       = {Andr{\'{e}} Adelsbach and
                  Sebastian Gajek and
                  J{\"{o}}rg Schwenk},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Visual Spoofing of {SSL} Protected Web Sites and Effective Countermeasures},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {204--216},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_18},
  doi          = {10.1007/978-3-540-31979-5\_18},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AdelsbachGS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0012377,
  author       = {Albrecht Beutelspacher and
                  J{\"{o}}rg Schwenk and
                  Klaus{-}Dieter Wolfenstetter},
  title        = {Moderne Verfahren der Kryptographie - von {RSA} zu Zero-Knowledge
                  {(5.} Aufl.)},
  publisher    = {Vieweg},
  year         = {2004},
  isbn         = {978-3-528-46590-2},
  timestamp    = {Thu, 14 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0012377.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ManulisS04,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on
                  {IDH}},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_10},
  doi          = {10.1007/978-3-540-30496-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ManulisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AdelsbachS04,
  author       = {Andr{\'{e}} Adelsbach and
                  J{\"{o}}rg Schwenk},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Key-assignment strategies for {CPPM}},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {107--115},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022451},
  doi          = {10.1145/1022431.1022451},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AdelsbachS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/MartinSS01,
  author       = {Tobias Martin and
                  R. Schaffelhofer and
                  J{\"{o}}rg Schwenk},
  editor       = {Ralf Steinmetz and
                  Jana Dittmann and
                  Martin Steinebach},
  title        = {Tree-based Key Agreement for Multicast},
  booktitle    = {Communications and Multimedia Security Issues of the New Century,
                  Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications
                  and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany},
  series       = {{IFIP} Conference Proceedings},
  volume       = {192},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 26 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/MartinSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchwenkMN01,
  author       = {J{\"{o}}rg Schwenk and
                  Tobias Martin and
                  Erik Neumann},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {From pay-tv to pay-streaming: similarities and differences},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {40--43},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232470},
  doi          = {10.1145/1232454.1232470},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchwenkMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/DittmannHVSS01,
  author       = {Jana Dittmann and
                  Enrico Hauer and
                  Claus Vielhauer and
                  J{\"{o}}rg Schwenk and
                  Eva Saar},
  editor       = {Heung{-}Yeung Shum and
                  Mark Liao and
                  Shih{-}Fu Chang},
  title        = {Customer Identification for {MPEG} Video Based on Digital Fingerprinting},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2001, Second
                  {IEEE} Pacific Rim Conference on Multimedia, Bejing, China, October
                  24-26, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2195},
  pages        = {383--390},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45453-5\_49},
  doi          = {10.1007/3-540-45453-5\_49},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/pcm/DittmannHVSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/DittmannSSSU00,
  author       = {Jana Dittmann and
                  Peter Schmitt and
                  Eva Saar and
                  J{\"{o}}rg Schwenk and
                  Johannes Ueberberg},
  title        = {Combining digital watermarks and collusion secure fingerprints for
                  digital images},
  journal      = {J. Electronic Imaging},
  volume       = {9},
  number       = {4},
  pages        = {456--467},
  year         = {2000},
  url          = {https://doi.org/10.1117/1.1287729},
  doi          = {10.1117/1.1287729},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jei/DittmannSSSU00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Schwenk99,
  author       = {J{\"{o}}rg Schwenk},
  editor       = {Bart Preneel},
  title        = {How to Security Broadcast a Secret},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {247--257},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Schwenk99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/DittmannBSSSU99,
  author       = {Jana Dittmann and
                  Alexander Behr and
                  Mark Stabenau and
                  Peter Schmitt and
                  J{\"{o}}rg Schwenk and
                  Johannes Ueberberg},
  editor       = {Ping Wah Wong and
                  Edward J. Delp III},
  title        = {Combining digital watermarks and collusion-secure fingerprints for
                  digital images},
  booktitle    = {Security and Watermarking of Multimedia Contents, San Jose, CA, USA,
                  January 23, 1999},
  series       = {{SPIE} Proceedings},
  volume       = {3657},
  pages        = {171--183},
  publisher    = {{SPIE}},
  year         = {1999},
  url          = {https://doi.org/10.1117/12.344702},
  doi          = {10.1117/12.344702},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/DittmannBSSSU99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Schwenk96,
  author       = {J{\"{o}}rg Schwenk},
  editor       = {Patrick Horster},
  title        = {Establishing a Key Hierarchy for Conditional Access without Encryption},
  booktitle    = {Communications and Multimedia Security II, Proceedings of the {IFIP}
                  {TC6/TC11} International Conference on Communications and Multimedia
                  Security at Essen, Germany, 23-24 September 1996},
  series       = {{IFIP} Conference Proceedings},
  volume       = {70},
  pages        = {176--182},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Mon, 14 Oct 2002 12:00:10 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Schwenk96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SchwenkE96,
  author       = {J{\"{o}}rg Schwenk and
                  J{\"{o}}rg Eisfeld},
  editor       = {Ueli M. Maurer},
  title        = {Public Key Encryption and Signature Schemes Based on Polynomials over
                  Zn},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_6},
  doi          = {10.1007/3-540-68339-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SchwenkE96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0082447,
  author       = {Albrecht Beutelspacher and
                  J{\"{o}}rg Schwenk and
                  Klaus{-}Dieter Wolfenstetter},
  title        = {Moderne Verfahren der Kryptographie - von {RSA} zu Zero-Knowledge},
  publisher    = {Vieweg},
  year         = {1995},
  isbn         = {978-3-528-06590-4},
  timestamp    = {Thu, 28 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0082447.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}