default search action
BibTeX records: Jörg Schwenk
@inproceedings{DBLP:conf/uss/BaumerBS24, author = {Fabian B{\"{a}}umer and Marcus Brinkmann and J{\"{o}}rg Schwenk}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number Manipulation}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/b\%C3\%A4umer}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/BaumerBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DunscheMEMBSS24, author = {Martin Dunsche and Marcel Maehren and Nurullah Erinola and Robert Merget and Nicolai Bissantz and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/dunsche}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DunscheMEMBSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NossKMNS23, author = {Dominik Trevor No{\ss} and Lukas Knittel and Christian Mainka and Marcus Niemietz and J{\"{o}}rg Schwenk}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Finding All Cross-Site Needles in the {DOM} Stack: {A} Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2456--2470}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616598}, doi = {10.1145/3576915.3616598}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NossKMNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ErinolaMMSS23, author = {Nurullah Erinola and Marcel Maehren and Robert Merget and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Exploring the Unknown {DTLS} Universe: Analysis of the {DTLS} Server Ecosystem on the Internet}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4859--4876}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/erinola}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ErinolaMMSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HebrokNMEMSS23, author = {Sven Hebrok and Simon Nachtigall and Marcel Maehren and Nurullah Erinola and Robert Merget and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {We Really Need to Talk About Session Tickets: {A} Large-Scale Analysis of Cryptographic Dangers with {TLS} Session Tickets}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4877--4894}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/hebrok}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HebrokNMEMSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GierlingsBS23, author = {Matthias Gierlings and Marcus Brinkmann and J{\"{o}}rg Schwenk}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7037--7054}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gierlings}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GierlingsBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RohlmannMMHS23, author = {Simon Rohlmann and Vladislav Mladenov and Christian Mainka and Daniel Hirschberger and J{\"{o}}rg Schwenk}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Every Signature is Broken: On the Insecurity of Microsoft Office's {OOXML} Signatures}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7411--7428}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/rohlmann}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RohlmannMMHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-12422, author = {Fabian B{\"{a}}umer and Marcus Brinkmann and J{\"{o}}rg Schwenk}, title = {Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number Manipulation}, journal = {CoRR}, volume = {abs/2312.12422}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.12422}, doi = {10.48550/ARXIV.2312.12422}, eprinttype = {arXiv}, eprint = {2312.12422}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-12422.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Schwenk22, author = {J{\"{o}}rg Schwenk}, title = {Guide to Internet Cryptography - Security Protocols and Real-World Attack Implications}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19439-9}, doi = {10.1007/978-3-031-19439-9}, isbn = {978-3-031-19438-2}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Schwenk22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SchwenkS22, author = {J{\"{o}}rg Schwenk and Douglas Stebila}, title = {A reduction-based proof for authentication and session key security in three-party Kerberos}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {2}, pages = {61--84}, year = {2022}, url = {https://doi.org/10.1504/IJACT.2022.10052385}, doi = {10.1504/IJACT.2022.10052385}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SchwenkS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JannettMMS22, author = {Louis Jannett and Vladislav Mladenov and Christian Mainka and J{\"{o}}rg Schwenk}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{DISTINCT:} Identity Theft using In-Browser Communications in Dual-Window Single Sign-On}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1553--1567}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560692}, doi = {10.1145/3548606.3560692}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JannettMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MaehrenNHMSS22, author = {Marcel Maehren and Philipp Nieting and Sven Hebrok and Robert Merget and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {TLS-Anvil: Adapting Combinatorial Testing for {TLS} Libraries}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {215--232}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/maehren}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/MaehrenNHMSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RohlmannMMS22, author = {Simon Rohlmann and Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3075--3092}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/rohlmann}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RohlmannMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KnittelMNNS21, author = {Lukas Knittel and Christian Mainka and Marcus Niemietz and Dominik Trevor No{\ss} and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1771--1788}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484739}, doi = {10.1145/3460120.3484739}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KnittelMNNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Kenneth G. Paterson}, title = {SoK: Game-Based Security Models for Group Key Exchange}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {148--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_7}, doi = {10.1007/978-3-030-75539-3\_7}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0007NMMS21, author = {Jens M{\"{u}}ller and Dominik Noss and Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, title = {Processing Dangerous Paths - On Security and Privacy of the Portable Document Format}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/processing-dangerous-paths-on-security-and-privacy-of-the-portable-document-format/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/0007NMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RohlmannMMS21, author = {Simon Rohlmann and Vladislav Mladenov and Christian Mainka and J{\"{o}}rg Schwenk}, title = {Breaking the Specification: {PDF} Certification}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1485--1501}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00110}, doi = {10.1109/SP40001.2021.00110}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/RohlmannMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MergetBASMS21, author = {Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and J{\"{o}}rg Schwenk}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in {TLS-DH(E)}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {213--230}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/merget}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/MergetBASMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrinkmannDMP0SS21, author = {Marcus Brinkmann and Christian Dresen and Robert Merget and Damian Poddebniak and Jens M{\"{u}}ller and Juraj Somorovsky and J{\"{o}}rg Schwenk and Sebastian Schinzel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ALPACA:} Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in {TLS} Authentication}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4293--4310}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BrinkmannDMP0SS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, title = {SoK: Game-based Security Models for Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2021}, url = {https://eprint.iacr.org/2021/305}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LauerGMHS20, author = {Sebastian Lauer and Kai Gellert and Robert Merget and Tobias Handirk and J{\"{o}}rg Schwenk}, title = {{T0RTT:} Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {2}, pages = {336--357}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0030}, doi = {10.2478/POPETS-2020-0030}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/LauerGMHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/00040SB20, author = {Stefan Hoffmann and Jens M{\"{u}}ller and J{\"{o}}rg Schwenk and Gerd Bumiller}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Powerless Security}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {213--232}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_11}, doi = {10.1007/978-3-030-57878-7\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/00040SB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchwenkBP0SS20, author = {J{\"{o}}rg Schwenk and Marcus Brinkmann and Damian Poddebniak and Jens M{\"{u}}ller and Juraj Somorovsky and Sebastian Schinzel}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Mitigation of Attacks on Email End-to-End Encryption}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1647--1664}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417878}, doi = {10.1145/3372297.3417878}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchwenkBP0SS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0007BPSS20, author = {Jens M{\"{u}}ller and Marcus Brinkmann and Damian Poddebniak and Sebastian Schinzel and J{\"{o}}rg Schwenk}, title = {Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162218}, doi = {10.1109/CNS48642.2020.9162218}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/0007BPSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DowlingRS20, author = {Benjamin Dowling and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {341--373}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_12}, doi = {10.1007/978-3-030-45374-9\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DowlingRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchageSL20, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk and Sebastian Lauer}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {567--596}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_20}, doi = {10.1007/978-3-030-45388-6\_20}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchageSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/0007IMMSS20, author = {Jens M{\"{u}}ller and Fabian Ising and Christian Mainka and Vladislav Mladenov and Sebastian Schinzel and J{\"{o}}rg Schwenk}, editor = {Yuval Yarom and Sarah Zennou}, title = {Office Document Security and Privacy}, booktitle = {14th {USENIX} Workshop on Offensive Technologies, {WOOT} 2020, August 11, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/woot20/presentation/muller}, timestamp = {Mon, 01 Feb 2021 08:41:50 +0100}, biburl = {https://dblp.org/rec/conf/woot/0007IMMSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MergetBASMS20, author = {Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and J{\"{o}}rg Schwenk}, title = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in {TLS-DH(E)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2020}, url = {https://eprint.iacr.org/2020/1151}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MergetBASMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchageSL20, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk and Sebastian Lauer}, title = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1519}, year = {2020}, url = {https://eprint.iacr.org/2020/1519}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SchageSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchwenkWH19, author = {J{\"{o}}rg Schwenk and Tobias Wich and Detlef H{\"{u}}hnlein}, title = {Moderne Vertrauensdienste f{\"{u}}r vertrauensw{\"{u}}rdige Transaktionen}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {4}, pages = {214--219}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1095-5}, doi = {10.1007/S11623-019-1095-5}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchwenkWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/0007BPSS19, author = {Jens M{\"{u}}ller and Marcus Brinkmann and Damian Poddebniak and Sebastian Schinzel and J{\"{o}}rg Schwenk}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {24--42}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_2}, doi = {10.1007/978-3-030-21568-2\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/0007BPSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MladenovMSGS19, author = {Vladislav Mladenov and Christian Mainka and Karsten Meyer zu Selhausen and Martin Grothe and J{\"{o}}rg Schwenk}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {1 Trillion Dollar Refund: How To Spoof {PDF} Signatures}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1--14}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3339812}, doi = {10.1145/3319535.3339812}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MladenovMSGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0007IMMSS19, author = {Jens M{\"{u}}ller and Fabian Ising and Vladislav Mladenov and Christian Mainka and Sebastian Schinzel and J{\"{o}}rg Schwenk}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Practical Decryption exFiltration: Breaking {PDF} Encryption}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {15--29}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354214}, doi = {10.1145/3319535.3354214}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0007IMMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/EngelbertzMSHES19, author = {Nils Engelbertz and Vladislav Mladenov and Juraj Somorovsky and David Herring and Nurullah Erinola and J{\"{o}}rg Schwenk}, editor = {Heiko Ro{\ss}nagel and Sven Wagner and Detlef H{\"{u}}hnlein}, title = {Security Analysis of XAdES Validation in the {CEF} Digital Signature Services {(DSS)}}, booktitle = {Open Identity Summit 2019, {OID} 2019, Garmisch-Partenkirchen, Germany, March 28-29, 2019}, series = {{LNI}}, volume = {{P-293}}, pages = {95--106}, publisher = {{GI}}, year = {2019}, url = {https://dl.gi.de/handle/20.500.12116/20997}, timestamp = {Tue, 04 Jul 2023 17:42:03 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/EngelbertzMSHES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0007BPBSSS19, author = {Jens M{\"{u}}ller and Marcus Brinkmann and Damian Poddebniak and Hanno B{\"{o}}ck and Sebastian Schinzel and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {Nadia Heninger and Patrick Traynor}, title = {"Johnny, you are fired!" - Spoofing OpenPGP and {S/MIME} Signatures in Emails}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1011--1028}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/muller}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/0007BPBSSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MergetSAYFSS19, author = {Robert Merget and Juraj Somorovsky and Nimrod Aviram and Craig Young and Janis Fliegenschmidt and J{\"{o}}rg Schwenk and Yuval Shavitt}, editor = {Nadia Heninger and Patrick Traynor}, title = {Scalable Scanning and Automatic Classification of {TLS} Padding Oracle Vulnerabilities}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1029--1046}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/merget}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MergetSAYFSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-07550, author = {Jens M{\"{u}}ller and Marcus Brinkmann and Damian Poddebniak and Sebastian Schinzel and J{\"{o}}rg Schwenk}, title = {Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption}, journal = {CoRR}, volume = {abs/1904.07550}, year = {2019}, url = {http://arxiv.org/abs/1904.07550}, eprinttype = {arXiv}, eprint = {1904.07550}, timestamp = {Fri, 26 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-07550.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingRS19, author = {Benjamin Dowling and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk}, title = {Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2019}, url = {https://eprint.iacr.org/2019/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchwenkS19, author = {J{\"{o}}rg Schwenk and Douglas Stebila}, title = {A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2019}, url = {https://eprint.iacr.org/2019/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchwenkS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauerGMHS19, author = {Sebastian Lauer and Kai Gellert and Robert Merget and Tobias Handirk and J{\"{o}}rg Schwenk}, title = {{T0RTT:} Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1433}, year = {2019}, url = {https://eprint.iacr.org/2019/1433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauerGMHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/RoslerMS18, author = {Paul R{\"{o}}sler and Christian Mainka and J{\"{o}}rg Schwenk}, title = {More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {415--429}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00036}, doi = {10.1109/EUROSP.2018.00036}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/RoslerMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0007MFS18, author = {Jens M{\"{u}}ller and Vladislav Mladenov and Dennis Felsch and J{\"{o}}rg Schwenk}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {PostScript Undead: Pwning the Web with a 35 Years Old Language}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {603--622}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_28}, doi = {10.1007/978-3-030-00470-5\_28}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/0007MFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PoddebniakD0ISF18, author = {Damian Poddebniak and Christian Dresen and Jens M{\"{u}}ller and Fabian Ising and Sebastian Schinzel and Simon Friedberger and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {William Enck and Adrienne Porter Felt}, title = {Efail: Breaking {S/MIME} and OpenPGP Email Encryption using Exfiltration Channels}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {549--566}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/poddebniak}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/PoddebniakD0ISF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FelschGSCS18, author = {Dennis Felsch and Martin Grothe and J{\"{o}}rg Schwenk and Adam Czubak and Marcin Szymanek}, editor = {William Enck and Adrienne Porter Felt}, title = {The Dangers of Key Reuse: Practical Attacks on IPsec {IKE}}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {567--583}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/felsch}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FelschGSCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/EngelbertzEHSMS18, author = {Nils Engelbertz and Nurullah Erinola and David Herring and Juraj Somorovsky and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Christian Rossow and Yves Younan}, title = {Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/engelbertz}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/EngelbertzEHSMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JagerKSS17, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Authenticated Confidential Channel Establishment and the Security of {TLS-DHE}}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {1276--1324}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9248-2}, doi = {10.1007/S00145-016-9248-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JagerKSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HaleJLS17, author = {Britta Hale and Tibor Jager and Sebastian Lauer and J{\"{o}}rg Schwenk}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {20--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_2}, doi = {10.1007/978-3-319-61204-1\_2}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/HaleJLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NiemietzS17, author = {Marcus Niemietz and J{\"{o}}rg Schwenk}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Out of the Dark: {UI} Redressing and Trustworthy Events}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {229--249}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_11}, doi = {10.1007/978-3-030-02641-7\_11}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/NiemietzS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FelschMMS17, author = {Dennis Felsch and Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {{SECRET:} On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {835--848}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052982}, doi = {10.1145/3052973.3052982}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FelschMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeiderichSS17, author = {Mario Heiderich and Christopher Sp{\"{a}}th and J{\"{o}}rg Schwenk}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {DOMPurify: Client-Side Protection Against {XSS} and Markup Injection}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {116--134}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_7}, doi = {10.1007/978-3-319-66399-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeiderichSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MainkaMSW17, author = {Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk and Tobias Wich}, title = {SoK: Single Sign-On Security - An Evaluation of OpenID Connect}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {251--266}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.32}, doi = {10.1109/EUROSP.2017.32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MainkaMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MullerMSS17, author = {Jens M{\"{u}}ller and Vladislav Mladenov and Juraj Somorovsky and J{\"{o}}rg Schwenk}, title = {SoK: Exploiting Network Printers}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {213--230}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.47}, doi = {10.1109/SP.2017.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MullerMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchwenkNM17, author = {J{\"{o}}rg Schwenk and Marcus Niemietz and Christian Mainka}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Same-Origin Policy: Evaluation in Modern Browsers}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {713--727}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schwenk}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/SchwenkNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/GrotheNSS17, author = {Martin Grothe and Tobias Niemann and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {William Enck and Collin Mulliner}, title = {Breaking and Fixing Gridcoin}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/grothe}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/GrotheNSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoslerMS17, author = {Paul R{\"{o}}sler and Christian Mainka and J{\"{o}}rg Schwenk}, title = {More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2017}, url = {http://eprint.iacr.org/2017/713}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoslerMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GrotheMRJKS16, author = {Martin Grothe and Christian Mainka and Paul R{\"{o}}sler and Johanna Jupke and Jan Kaiser and J{\"{o}}rg Schwenk}, title = {Your Cloud in My Company: Modern Rights Management Services Revisited}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {217--222}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.69}, doi = {10.1109/ARES.2016.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GrotheMRJKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HorstGJS16, author = {Matthias Horst and Martin Grothe and Tibor Jager and J{\"{o}}rg Schwenk}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Breaking {PPTP} VPNs via {RADIUS} Encryption}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {159--175}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_10}, doi = {10.1007/978-3-319-48965-0\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/HorstGJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MainkaMS16, author = {Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, title = {Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {321--336}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.33}, doi = {10.1109/EUROSP.2016.33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MainkaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/FroschMBBSH16, author = {Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and J{\"{o}}rg Schwenk and Thorsten Holz}, title = {How Secure is TextSecure?}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {457--472}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.41}, doi = {10.1109/EUROSP.2016.41}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/FroschMBBSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/HuhnleinFSPSHWN16, author = {Detlef H{\"{u}}hnlein and Tilman Frosch and J{\"{o}}rg Schwenk and Carl{-}Markus Piswanger and Marc Sel and Tina H{\"{u}}hnlein and Tobias Wich and Daniel Nemmert and Ren{\'{e}} Lottes and Juraj Somorovsky and Vladislav Mladenov and Cristina Condovici and Herbert Leitold and Sophie Stalla{-}Bourdillon and Niko Tsakalakis and Jan Eichholz and Frank{-}Michael Kamm and Andreas K{\"{u}}hne and Damian Wabisch and Roger Dean and Jon Shamah and Mikheil Kapanadze and Nuno Ponte and Jose Martins and Renato Portela and Cagatay Karabat and Snezana Stojicic and Slobodan Nedeljkovic and Vincent Bouckaert and Alexandre Defays and Bruce Anderson and Michael Jonas and Christina Hermanns and Thomas Schubert and Dirk Wegener and Alexander Sazonov}, editor = {Detlef H{\"{u}}hnlein and Heiko Ro{\ss}nagel and Christian H. Schunck and Maurizio Talamo}, title = {FutureTrust - Future Trust Services for Trustworthy Global Transactions}, booktitle = {Open Identity Summit 2016, 13-14 October 2016, Rome, Italy}, series = {{LNI}}, volume = {{P-264}}, pages = {27--41}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/602}, timestamp = {Tue, 30 Jul 2024 10:43:12 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/HuhnleinFSPSHWN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/ElsafieS16, author = {Abeer Elsafie and J{\"{o}}rg Schwenk}, editor = {Christophe Debruyne and Herv{\'{e}} Panetto and Robert Meersman and Tharam S. Dillon and Eva K{\"{u}}hn and Declan O'Sullivan and Claudio Agostino Ardagna}, title = {Evaluating Two Methods for WS-(Security) Policy Negotiation and Decision Making}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2016 Conferences - Confederated International Conferences: CoopIS, C{\&}TC, and {ODBASE} 2016, Rhodes, Greece, October 24-28, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10033}, pages = {890--909}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48472-3\_56}, doi = {10.1007/978-3-319-48472-3\_56}, timestamp = {Tue, 15 Nov 2022 15:22:36 +0100}, biburl = {https://dblp.org/rec/conf/otm/ElsafieS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/GrotheMRS16, author = {Martin Grothe and Christian Mainka and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk}, editor = {Natalie Silvanovich and Patrick Traynor}, title = {How to Break Microsoft Rights Management Services}, booktitle = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin, TX, USA, August 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/woot16/workshop-program/presentation/grothe}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/GrotheMRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/SpathMMS16, author = {Christopher Sp{\"{a}}th and Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Natalie Silvanovich and Patrick Traynor}, title = {SoK: {XML} Parser Vulnerabilities}, booktitle = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin, TX, USA, August 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/woot16/workshop-program/presentation/spath}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/SpathMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schwenk16, author = {J{\"{o}}rg Schwenk}, title = {Nonce-based Kerberos is a Secure Delegated {AKE} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2016}, url = {http://eprint.iacr.org/2016/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schwenk16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FelschHSS15, author = {Dennis Felsch and Mario Heiderich and Frederic Schulz and J{\"{o}}rg Schwenk}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Florian Kerschbaum and Cristina Nita{-}Rotaru}, title = {How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces}, booktitle = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {5--16}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808425.2808432}, doi = {10.1145/2808425.2808432}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FelschHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JagerSS15, author = {Tibor Jager and J{\"{o}}rg Schwenk and Juraj Somorovsky}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {On the Security of {TLS} 1.3 and {QUIC} Against Weaknesses in PKCS{\#}1 v1.5 Encryption}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1185--1196}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813657}, doi = {10.1145/2810103.2813657}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JagerSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeiderichNS15, author = {Mario Heiderich and Marcus Niemietz and J{\"{o}}rg Schwenk}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Waiting for {CSP} - Securing Legacy Web Applications with JSAgents}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_2}, doi = {10.1007/978-3-319-24174-6\_2}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HeiderichNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AltmeierMSS15, author = {Christian Altmeier and Christian Mainka and Juraj Somorovsky and J{\"{o}}rg Schwenk}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services}, booktitle = {Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9481}, pages = {65--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29883-2\_5}, doi = {10.1007/978-3-319-29883-2\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AltmeierMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JagerSS15, author = {Tibor Jager and J{\"{o}}rg Schwenk and Juraj Somorovsky}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Practical Invalid Curve Attacks on {TLS-ECDH}}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {407--425}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_21}, doi = {10.1007/978-3-319-24174-6\_21}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/JagerSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/MainkaMGS15, author = {Christian Mainka and Vladislav Mladenov and Tim Guenther and J{\"{o}}rg Schwenk}, editor = {Detlef H{\"{u}}hnlein and Heiko Ro{\ss}nagel and Raik Kuhlisch and Jan Ziesing}, title = {Automatic recognition, processing and attacking of single sign-on protocols with burp suite}, booktitle = {Open Identity Summit 2015, 10-11 November 2015, Berlin, Germany}, series = {{LNI}}, volume = {{P-251}}, pages = {119--131}, publisher = {{GI}}, year = {2015}, url = {https://dl.gi.de/handle/20.500.12116/1977}, timestamp = {Tue, 30 Jul 2024 10:43:25 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/MainkaMGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BergsmaJS15, author = {Florian Bergsma and Tibor Jager and J{\"{o}}rg Schwenk}, editor = {Jonathan Katz}, title = {One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {477--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_21}, doi = {10.1007/978-3-662-46447-2\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BergsmaJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/ElsafieS15, author = {Abeer Elsafie and J{\"{o}}rg Schwenk}, editor = {Liang{-}Jie Zhang and Rami Bahsoon}, title = {Semi-automated Fuzzy {MCDM} and Lattice Solutions for WS-Policy Intersection}, booktitle = {2015 {IEEE} World Congress on Services, {SERVICES} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {167--174}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SERVICES.2015.33}, doi = {10.1109/SERVICES.2015.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/ElsafieS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siot/NiemietzSMS15, author = {Marcus Niemietz and Juraj Somorovsky and Christian Mainka and J{\"{o}}rg Schwenk}, editor = {Gabriel Ghinita and Pedro Peris{-}Lopez}, title = {Not so Smart: On Smart {TV} Apps}, booktitle = {2015 International Workshop on Secure Internet of Things, SIoT 2015, Vienna, Austria, September 21-25, 2015}, pages = {72--81}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SIOT.2015.13}, doi = {10.1109/SIOT.2015.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siot/NiemietzSMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/KupserMSS15, author = {Dennis Kupser and Christian Mainka and J{\"{o}}rg Schwenk and Juraj Somorovsky}, editor = {Aur{\'{e}}lien Francillon and Thomas Ptacek}, title = {How to Break {XML} Encryption - Automatically}, booktitle = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington, DC, USA, August 10-11, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/woot15/workshop-program/presentation/kupser}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/woot/KupserMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NiemietzS15, author = {Marcus Niemietz and J{\"{o}}rg Schwenk}, title = {Owning Your Home Network: Router Security Revisited}, journal = {CoRR}, volume = {abs/1506.04112}, year = {2015}, url = {http://arxiv.org/abs/1506.04112}, eprinttype = {arXiv}, eprint = {1506.04112}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NiemietzS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MladenovMKFS15, author = {Vladislav Mladenov and Christian Mainka and Julian Krautwald and Florian Feldmann and J{\"{o}}rg Schwenk}, title = {On the security of modern Single Sign-On Protocols: OpenID Connect 1.0}, journal = {CoRR}, volume = {abs/1508.04324}, year = {2015}, url = {http://arxiv.org/abs/1508.04324}, eprinttype = {arXiv}, eprint = {1508.04324}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MladenovMKFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BergsmaJS15, author = {Florian Bergsma and Tibor Jager and J{\"{o}}rg Schwenk}, title = {One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2015}, url = {http://eprint.iacr.org/2015/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BergsmaJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleJLS15, author = {Britta Hale and Tibor Jager and Sebastian Lauer and J{\"{o}}rg Schwenk}, title = {Speeding: On Low-Latency Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1214}, year = {2015}, url = {http://eprint.iacr.org/2015/1214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleJLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeiderichNSHS14, author = {Mario Heiderich and Marcus Niemietz and Felix Schuster and Thorsten Holz and J{\"{o}}rg Schwenk}, title = {Scriptless attacks: Stealing more pie without touching the sill}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {567--599}, year = {2014}, url = {https://doi.org/10.3233/JCS-130494}, doi = {10.3233/JCS-130494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeiderichNSHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiSYBS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Christoph Bader and J{\"{o}}rg Schwenk}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {New Modular Compilers for Authenticated Key Exchange}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_1}, doi = {10.1007/978-3-319-07536-5\_1}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiSYBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MainkaMFKS14, author = {Christian Mainka and Vladislav Mladenov and Florian Feldmann and Julian Krautwald and J{\"{o}}rg Schwenk}, editor = {Gail{-}Joon Ahn and Alina Oprea and Reihaneh Safavi{-}Naini}, title = {Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud}, booktitle = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {93--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664168.2664172}, doi = {10.1145/2664168.2664172}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MainkaMFKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MayerNMS14, author = {Andreas Mayer and Marcus Niemietz and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Gail{-}Joon Ahn and Alina Oprea and Reihaneh Safavi{-}Naini}, title = {Guardians of the Clouds: When Identity Providers Fail}, booktitle = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {105--116}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664168.2664171}, doi = {10.1145/2664168.2664171}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MayerNMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BergsmaDKSS14, author = {Florian Bergsma and Benjamin Dowling and Florian Kohlar and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Multi-Ciphersuite Security of the Secure Shell {(SSH)} Protocol}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {369--381}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660286}, doi = {10.1145/2660267.2660286}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BergsmaDKSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Schwenk14, author = {J{\"{o}}rg Schwenk}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Modelling Time for Authenticated Key Exchange Protocols}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {277--294}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_16}, doi = {10.1007/978-3-319-11212-1\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Schwenk14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/JavedBKDS14, author = {Ashar Javed and David Bletgen and Florian Kohlar and Markus D{\"{u}}rmuth and J{\"{o}}rg Schwenk}, title = {Secure Fallback Authentication and the Trusted Friend Attack}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {22--28}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.30}, doi = {10.1109/ICDCSW.2014.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/JavedBKDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JavedRS14, author = {Ashar Javed and Jens Riemer and J{\"{o}}rg Schwenk}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {{SIACHEN:} {A} Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {515--528}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_33}, doi = {10.1007/978-3-319-13257-0\_33}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JavedRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/MayerMSFM14, author = {Andreas Mayer and Vladislav Mladenov and J{\"{o}}rg Schwenk and Florian Feldmann and Christopher Meyer}, editor = {Detlef H{\"{u}}hnlein and Heiko Ro{\ss}nagel}, title = {Strengthening Web Authentication through {TLS} - Beyond {TLS} Client Certificates}, booktitle = {Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany}, series = {{LNI}}, volume = {{P-237}}, pages = {97--108}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/2642}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/MayerMSFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiSYKS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Florian Kohlar and J{\"{o}}rg Schwenk}, editor = {Hugo Krawczyk}, title = {On the Security of the Pre-shared Key Ciphersuites of {TLS}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {669--684}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_38}, doi = {10.1007/978-3-642-54631-0\_38}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiSYKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MayerMS14, author = {Andreas Mayer and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {On the Security of Holder-of-Key Single Sign-On}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {65--77}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20069}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MayerMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JavedMS14, author = {Ashar Javed and Christian Merz and J{\"{o}}rg Schwenk}, title = {TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.9}, doi = {10.1109/TRUSTCOM.2014.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JavedMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MeyerSWSST14, author = {Christopher Meyer and Juraj Somorovsky and Eugen Weiss and J{\"{o}}rg Schwenk and Sebastian Schinzel and Erik Tews}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Revisiting {SSL/TLS} Implementations: New Bleichenbacher Side Channels and Attacks}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {733--748}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/meyer}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/MeyerSWSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JavedS14, author = {Ashar Javed and J{\"{o}}rg Schwenk}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Systematically Breaking Online {WYSIWYG} Editors}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {122--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_10}, doi = {10.1007/978-3-319-15087-1\_10}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JavedS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MainkaMS14, author = {Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, title = {Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On}, journal = {CoRR}, volume = {abs/1412.1623}, year = {2014}, url = {http://arxiv.org/abs/1412.1623}, eprinttype = {arXiv}, eprint = {1412.1623}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MainkaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSYKS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Florian Kohlar and J{\"{o}}rg Schwenk}, title = {On the Security of the Pre-Shared Key Ciphersuites of {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2014}, url = {http://eprint.iacr.org/2014/037}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSYKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FroschMBBSH14, author = {Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and J{\"{o}}rg Schwenk and Thorsten Holz}, title = {How Secure is TextSecure?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {904}, year = {2014}, url = {http://eprint.iacr.org/2014/904}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FroschMBBSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JagerS13, author = {Tibor Jager and J{\"{o}}rg Schwenk}, title = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {225--245}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9120-y}, doi = {10.1007/S00145-012-9120-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JagerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeiderichSFMY13, author = {Mario Heiderich and J{\"{o}}rg Schwenk and Tilman Frosch and Jonas Magazinius and Edward Z. Yang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {mXSS attacks: attacking well-secured web-applications by using innerHTML mutations}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {777--788}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516723}, doi = {10.1145/2508859.2516723}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeiderichSFMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MichaelisMS13, author = {Kai Michaelis and Christopher Meyer and J{\"{o}}rg Schwenk}, editor = {Ed Dawson}, title = {Randomly Failed! The State of Randomness in Current Java Implementations}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {129--144}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_9}, doi = {10.1007/978-3-642-36095-4\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MichaelisMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/HuhnleinSWMFMSBH13, author = {Detlef H{\"{u}}hnlein and J{\"{o}}rg Schwenk and Tobias Wich and Vladislav Mladenov and Florian Feldmann and Andreas Mayer and Johannes Schm{\"{o}}lz and Bud P. Bruegger and Moritz Horsch}, editor = {Thomas Gro{\ss} and Marit Hansen}, title = {Options for integrating eID and {SAML}}, booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013}, pages = {85--96}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517881.2517892}, doi = {10.1145/2517881.2517892}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/HuhnleinSWMFMSBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/FalkenbergMSS13, author = {Andreas Falkenberg and Christian Mainka and Juraj Somorovsky and J{\"{o}}rg Schwenk}, title = {A New Approach towards DoS Penetration Testing on Web Services}, booktitle = {2013 {IEEE} 20th International Conference on Web Services, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {491--498}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICWS.2013.72}, doi = {10.1109/ICWS.2013.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/FalkenbergMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/FeldmannS13, author = {Florian Feldmann and J{\"{o}}rg Schwenk}, editor = {Detlef H{\"{u}}hnlein and Heiko Ro{\ss}nagel}, title = {How to authenticate mobile devices in a web environment - the {SIM-ID} approach}, booktitle = {Open Identity Summit 2013, September 9th - 11th 2013, Kloster Banz, Germany}, series = {{LNI}}, volume = {{P-223}}, pages = {130--141}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/17186}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/FeldmannS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JavedS13, author = {Ashar Javed and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {103--123}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_7}, doi = {10.1007/978-3-319-05149-9\_7}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JavedS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MeyerS13, author = {Christopher Meyer and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {SoK: Lessons Learned from {SSL/TLS} Attacks}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {189--209}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_12}, doi = {10.1007/978-3-319-05149-9\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MeyerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zeus/ElsafieMS13, author = {Abeer Elsafie and Christian Mainka and J{\"{o}}rg Schwenk}, editor = {Oliver Kopp and Niels Lohmann}, title = {A new approach for WS-Policy Intersection using Partial Ordered Sets}, booktitle = {Proceedings of the 5\({}^{\mbox{th}}\) Central-European Workshop on Services and their Composition, Rostock, Germany, February 21-22, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1029}, pages = {45--48}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1029/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/zeus/ElsafieMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerS13, author = {Christopher Meyer and J{\"{o}}rg Schwenk}, title = {Lessons Learned From Previous {SSL/TLS} Attacks - {A} Brief Chronology Of Attacks And Weaknesses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2013}, url = {http://eprint.iacr.org/2013/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohlarSS13, author = {Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {On the Security of {TLS-DH} and {TLS-RSA} in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2013}, url = {http://eprint.iacr.org/2013/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohlarSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schwenk13, author = {J{\"{o}}rg Schwenk}, title = {Modelling Time, or {A} Step Towards Reduction-based Security Proofs for {OTP} and Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2013}, url = {http://eprint.iacr.org/2013/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schwenk13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingGKSS13, author = {Benjamin Dowling and Florian Giesen and Florian Kohlar and J{\"{o}}rg Schwenk and Douglas Stebila}, title = {Multi-ciphersuite security and the {SSH} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2013}, url = {http://eprint.iacr.org/2013/813}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingGKSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JensenJIMS12, author = {Meiko Jensen and Holger Junker and Luigi Lo Iacono and Christian Mainka and J{\"{o}}rg Schwenk}, title = {{XML} Signature Wrapping Angriffe wirksam unterbinden}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {236--240}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0091-9}, doi = {10.1007/S11623-012-0091-9}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JensenJIMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeiderichNSHS12, author = {Mario Heiderich and Marcus Niemietz and Felix Schuster and Thorsten Holz and J{\"{o}}rg Schwenk}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Scriptless attacks: stealing the pie without touching the sill}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {760--771}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382276}, doi = {10.1145/2382196.2382276}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HeiderichNSHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/MainkaJIS12a, author = {Christian Mainka and Meiko Jensen and Luigi Lo Iacono and J{\"{o}}rg Schwenk}, editor = {Ivan I. Ivanov and Marten van Sinderen and Frank Leymann and Tony Shan}, title = {Making {XML} Signatures Immune to {XML} Signature Wrapping Attacks}, booktitle = {Cloud Computing and Services Science - Second International Conference, {CLOSER} 2012, Porto, Portugal, April 18-21, 2012. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {367}, pages = {151--167}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-04519-1\_10}, doi = {10.1007/978-3-319-04519-1\_10}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/MainkaJIS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/MainkaJIS12, author = {Christian Mainka and Meiko Jensen and Luigi Lo Iacono and J{\"{o}}rg Schwenk}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Tony Shan}, title = {XSpRES - Robust and Effective {XML} Signatures for Web Services}, booktitle = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April, 2012}, pages = {187--197}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 29 Mar 2017 16:45:24 +0200}, biburl = {https://dblp.org/rec/conf/closer/MainkaJIS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/SomorovskyMTSSW12, author = {Juraj Somorovsky and Christopher Meyer and Thang Tran and Mohamad Sbeiti and J{\"{o}}rg Schwenk and Christian Wietfeld}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Tony Shan}, title = {SeC2: Secure Mobile Solution for Distributed Public Cloud Storages}, booktitle = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April, 2012}, pages = {555--561}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 29 May 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/SomorovskyMTSSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JagerKSS12, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {On the Security of {TLS-DHE} in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {273--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_17}, doi = {10.1007/978-3-642-32009-5\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JagerKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MeyerFS12, author = {Christopher Meyer and Florian Feldmann and J{\"{o}}rg Schwenk}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Sometimes It's Better to Be STUCK! {SAML} Transportation Unit for Cryptographic Keys}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {110--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_9}, doi = {10.1007/978-3-642-37682-5\_9}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MeyerFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangS12, author = {Zheng Yang and J{\"{o}}rg Schwenk}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {264--275}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_17}, doi = {10.1007/978-3-642-33272-2\_17}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YangS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/MainkaSS12, author = {Christian Mainka and Juraj Somorovsky and J{\"{o}}rg Schwenk}, title = {Penetration Testing Tool for Web Services Security}, booktitle = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu, HI, USA, June 24-29, 2012}, pages = {163--170}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SERVICES.2012.7}, doi = {10.1109/SERVICES.2012.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/MainkaSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/SomorovskyS12, author = {Juraj Somorovsky and J{\"{o}}rg Schwenk}, title = {Technical Analysis of Countermeasures against Attack on {XML} Encryption - or - Just Another Motivation for Authenticated Encryption}, booktitle = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu, HI, USA, June 24-29, 2012}, pages = {171--178}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SERVICES.2012.6}, doi = {10.1109/SERVICES.2012.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/SomorovskyS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12, author = {Detlef H{\"{u}}hnlein and Dirk Petrautzki and Johannes Schm{\"{o}}lz and Tobias Wich and Moritz Horsch and Thomas Wieland and Jan Eichholz and Alexander Wiesmaier and Johannes Braun and Florian Feldmann and Simon Potzernheim and J{\"{o}}rg Schwenk and Christian Kahlo and Andreas K{\"{u}}hne and Heiko Veit}, editor = {Neeraj Suri and Michael Waidner}, title = {On the design and implementation of the Open eCard App}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {95--110}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18266}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SomorovskyMSKJ12, author = {Juraj Somorovsky and Andreas Mayer and J{\"{o}}rg Schwenk and Marco Kampmann and Meiko Jensen}, editor = {Tadayoshi Kohno}, title = {On Breaking {SAML:} Be Whoever You Want to Be}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {397--412}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/somorovsky}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SomorovskyMSKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/KohlarSJG11, author = {Florian Kohlar and J{\"{o}}rg Schwenk and Meiko Jensen and Sebastian Gajek}, title = {On Cryptographically Strong Bindings of {SAML} Assertions to Transport Layer Security}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {3}, number = {4}, pages = {20--35}, year = {2011}, url = {https://doi.org/10.4018/jmcmc.2011100102}, doi = {10.4018/JMCMC.2011100102}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/KohlarSJG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/JensenSBGI11, author = {Meiko Jensen and J{\"{o}}rg Schwenk and Jens{-}Matthias Bohli and Nils Gruschka and Luigi Lo Iacono}, editor = {Ling Liu and Manish Parashar}, title = {Security Prospects through Cloud Computing by Adopting Multiple Clouds}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {565--572}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CLOUD.2011.85}, doi = {10.1109/CLOUD.2011.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/JensenSBGI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SomorovskyHJSGI11, author = {Juraj Somorovsky and Mario Heiderich and Meiko Jensen and J{\"{o}}rg Schwenk and Nils Gruschka and Luigi Lo Iacono}, editor = {Christian Cachin and Thomas Ristenpart}, title = {All your clouds are belong to us: security analysis of cloud management interfaces}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {3--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046664}, doi = {10.1145/2046660.2046664}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SomorovskyHJSGI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/SchwenkKA11, author = {J{\"{o}}rg Schwenk and Florian Kohlar and Marcus Amon}, editor = {Abhilasha Bhargav{-}Spantzel and Thomas Gro{\ss}}, title = {The power of recognition: secure single sign-on using {TLS} channel bindings}, booktitle = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity Management, Chicago, IL, {USA} - October 21, 2011}, pages = {63--72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046642.2046656}, doi = {10.1145/2046642.2046656}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/SchwenkKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HeiderichFNS11, author = {Mario Heiderich and Tilman Frosch and Marcus Niemietz and J{\"{o}}rg Schwenk}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {89--103}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_6}, doi = {10.1007/978-3-642-32747-6\_6}, timestamp = {Thu, 27 Feb 2020 12:57:38 +0100}, biburl = {https://dblp.org/rec/conf/voteid/HeiderichFNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schwenk11, author = {J{\"{o}}rg Schwenk}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{HTTP} Authentication}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {564--565}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_653}, doi = {10.1007/978-1-4419-5906-5\_653}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schwenk11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKSS11, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {A Standard-Model Security Analysis of {TLS-DHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2011}, url = {http://eprint.iacr.org/2011/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0024351, author = {J{\"{o}}rg Schwenk}, title = {Sicherheit und Kryptographie im Internet - Von sicherer E-Mail bis zu IP-Verschl{\"{u}}sselung {(3.} Aufl.)}, publisher = {Vieweg}, year = {2010}, url = {http://www.viewegteubner.de/index.php;do=show\_book/book\_id=20237}, isbn = {978-3-8348-0814-1}, timestamp = {Fri, 04 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0024351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KohlarSJG10, author = {Florian Kohlar and J{\"{o}}rg Schwenk and Meiko Jensen and Sebastian Gajek}, title = {Secure Bindings of {SAML} Assertions to {TLS} Sessions}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {62--69}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.89}, doi = {10.1109/ARES.2010.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KohlarSJG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/JensenSS10, author = {Meiko Jensen and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010, Miami, FL, USA, 5-10 July, 2010}, pages = {540--541}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CLOUD.2010.61}, doi = {10.1109/CLOUD.2010.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/JensenSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SchageS10, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {A New RSA-Based Signature Scheme}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_1}, doi = {10.1007/978-3-642-12678-9\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SchageS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JagerKSS10, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Masayuki Abe}, title = {Generic Compilers for Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {232--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_14}, doi = {10.1007/978-3-642-17373-8\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JagerKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SchageS10, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Radu Sion}, title = {A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {129--142}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_12}, doi = {10.1007/978-3-642-14577-3\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/SchageS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BussmeyerGSW10, author = {Daniel Bu{\ss}meyer and Felix Gr{\"{o}}bert and J{\"{o}}rg Schwenk and Christoph Wegener}, editor = {Radu Sion}, title = {Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {320--327}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_25}, doi = {10.1007/978-3-642-14577-3\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BussmeyerGSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/NoackS10, author = {Andreas Noack and J{\"{o}}rg Schwenk}, title = {Group key agreement performance in wireless mesh networks}, booktitle = {The 35th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings}, pages = {176--179}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/LCN.2010.5735694}, doi = {10.1109/LCN.2010.5735694}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/NoackS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/SomorovskyJS10, author = {Juraj Somorovsky and Meiko Jensen and J{\"{o}}rg Schwenk}, title = {Streaming-Based Verification of {XML} Signatures in {SOAP} Messages}, booktitle = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {637--644}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SERVICES.2010.57}, doi = {10.1109/SERVICES.2010.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/SomorovskyJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SovisKS10, author = {Pavol Sovis and Florian Kohlar and J{\"{o}}rg Schwenk}, editor = {Felix C. Freiling}, title = {Security Analysis of OpenID}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {329--340}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19793}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SovisKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKSS10, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Generic Compilers for Authenticated Key Exchange (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2010}, url = {http://eprint.iacr.org/2010/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GruschkaJIS09, author = {Nils Gruschka and Meiko Jensen and Luigi Lo Iacono and J{\"{o}}rg Schwenk}, title = {{XML} Signature Wrapping Angriffe - What you process is not always what you verify}, journal = {Datenschutz und Datensicherheit}, volume = {33}, number = {9}, pages = {553--560}, year = {2009}, url = {https://doi.org/10.1007/s11623-009-0142-z}, doi = {10.1007/S11623-009-0142-Z}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GruschkaJIS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/GajekMS09, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, title = {User-aware provably secure protocols for browser-based mutual authentication}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {290--308}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028028}, doi = {10.1504/IJACT.2009.028028}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GajekMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ManulisS09, author = {Mark Manulis and J{\"{o}}rg Schwenk}, title = {Security model and framework for information aggregation in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {5}, number = {2}, pages = {13:1--13:28}, year = {2009}, url = {https://doi.org/10.1145/1498915.1498919}, doi = {10.1145/1498915.1498919}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ManulisS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JensenS09, author = {Meiko Jensen and J{\"{o}}rg Schwenk}, title = {The Accountability Problem of Flooding Attacks in Service-Oriented Architectures}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.11}, doi = {10.1109/ARES.2009.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JensenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/JensenSGI09, author = {Meiko Jensen and J{\"{o}}rg Schwenk and Nils Gruschka and Luigi Lo Iacono}, title = {On Technical Security Issues in Cloud Computing}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2009, Bangalore, India, 21-25 September, 2009}, pages = {109--116}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CLOUD.2009.60}, doi = {10.1109/CLOUD.2009.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/JensenSGI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JagerS09, author = {Tibor Jager and J{\"{o}}rg Schwenk}, editor = {Mitsuru Matsui}, title = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {399--416}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_24}, doi = {10.1007/978-3-642-10366-7\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JagerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/EichholzHS09, author = {Jan Eichholz and Detlef H{\"{u}}hnlein and J{\"{o}}rg Schwenk}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Detlef H{\"{u}}hnlein}, title = {SAMLizing the European Citizen Card}, booktitle = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-155}}, pages = {105--116}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/23195}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/EichholzHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/WolfSW09, author = {Christopher Wolf and J{\"{o}}rg Schwenk and Zidu Wang}, editor = {Stefan Fischer and Erik Maehle and R{\"{u}}diger Reischuk}, title = {Sicherheitsanalyse von Kreditkarten am Beispiel von {EMV}}, booktitle = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September 28 - October 2, 2009, Proceedings}, series = {{LNI}}, volume = {{P-154}}, pages = {1732--1743}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/31139}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/WolfSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/GajekJLS09, author = {Sebastian Gajek and Meiko Jensen and Lijun Liao and J{\"{o}}rg Schwenk}, title = {Analysis of Signature Wrapping Attacks and Countermeasures}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los Angeles, CA, USA, 6-10 July 2009}, pages = {575--582}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICWS.2009.12}, doi = {10.1109/ICWS.2009.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/GajekJLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GajekSSX09, author = {Sebastian Gajek and J{\"{o}}rg Schwenk and Michael Steiner and Chen Xuan}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Risks of the CardSpace Protocol}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {278--293}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_23}, doi = {10.1007/978-3-642-04474-8\_23}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/GajekSSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/NoackS09, author = {Andreas Noack and J{\"{o}}rg Schwenk}, title = {Group key agreement for wireless mesh networks}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {945--952}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355044}, doi = {10.1109/LCN.2009.5355044}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/NoackS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/JensenLS09, author = {Meiko Jensen and Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Ernesto Damiani and Seth Proctor and Anoop Singhal}, title = {The curse of namespaces in the domain of {XML} signature}, booktitle = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {29--36}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655121.1655129}, doi = {10.1145/1655121.1655129}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/JensenLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/AzziniMJS09, author = {Antonia Azzini and Stefania Marrara and Meiko Jensen and J{\"{o}}rg Schwenk}, editor = {Ernesto Damiani and Seth Proctor and Anoop Singhal}, title = {Extending the similarity-based {XML} multicast approach with digital signatures}, booktitle = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {45--52}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655121.1655131}, doi = {10.1145/1655121.1655131}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/AzziniMJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerS09, author = {Tibor Jager and J{\"{o}}rg Schwenk}, title = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2009}, url = {http://eprint.iacr.org/2009/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GajekMS08, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {6--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_2}, doi = {10.1007/978-3-540-70500-0\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GajekMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/BrueggerHS08, author = {Bud P. Bruegger and Detlef H{\"{u}}hnlein and J{\"{o}}rg Schwenk}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Detlef H{\"{u}}hnlein}, title = {TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management}, booktitle = {{BIOSIG} 2008 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 11.-12. September 2008 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-137}}, pages = {93--104}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21201}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/BrueggerHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GajekMSS08, author = {Sebastian Gajek and Mark Manulis and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Provably secure browser-based user-aware mutual authentication over {TLS}}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {300--311}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368354}, doi = {10.1145/1368310.1368354}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GajekMSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GajekJMS08, author = {Sebastian Gajek and Tibor Jager and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {A Browser-Based Kerberos Authentication Scheme}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {115--129}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_8}, doi = {10.1007/978-3-540-88313-5\_8}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GajekJMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/HelbachSS08, author = {J{\"{o}}rg Helbach and J{\"{o}}rg Schwenk and Sven Sch{\"{a}}ge}, editor = {Robert Krimmer and R{\"{u}}diger Grimm}, title = {Code Voting with Linkable Group Signatures}, booktitle = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-131}}, pages = {209--221}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/29183}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/HelbachSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/OppligerSL08, author = {Rolf Oppliger and J{\"{o}}rg Schwenk and Christoph L{\"{o}}hr}, editor = {Robert Krimmer and R{\"{u}}diger Grimm}, title = {CAPTCHA-based Code Voting}, booktitle = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-131}}, pages = {223--236}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/29184}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/OppligerSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiaoS08, author = {Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {A Novel Solution for End-to-End Integrity Protection in Signed {PGP} Mail}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {19--32}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_2}, doi = {10.1007/978-3-540-88625-9\_2}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiaoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/JagerS08, author = {Tibor Jager and J{\"{o}}rg Schwenk}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {On the Equivalence of Generic Group Models}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {200--209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_14}, doi = {10.1007/978-3-540-88733-1\_14}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/JagerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GajekMPSS08, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Universally Composable Security Analysis of {TLS}}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {313--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_22}, doi = {10.1007/978-3-540-88733-1\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GajekMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/JagerJS08, author = {Tibor Jager and Heiko J{\"{a}}kel and J{\"{o}}rg Schwenk}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei {SSL/TLS}}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {127--136}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21471}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/JagerJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/OppligerSH08, author = {Rolf Oppliger and J{\"{o}}rg Schwenk and J{\"{o}}rg Helbach}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Protecting Code Voting Against Vote Selling}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {193--204}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21476}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/OppligerSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/GajekLS08, author = {Sebastian Gajek and Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Ernesto Damiani and Seth Proctor}, title = {Stronger {TLS} bindings for {SAML} assertions and {SAML} artifacts}, booktitle = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456492.1456495}, doi = {10.1145/1456492.1456495}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/GajekLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GajekMPSS08, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, title = {Universally Composable Security Analysis of {TLS} - Secure Sessions with Handshake and Record Layer Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2008}, url = {http://eprint.iacr.org/2008/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GajekMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerS08, author = {Tibor Jager and J{\"{o}}rg Schwenk}, title = {The Generic Hardness of Subset Membership Problems under the Factoring Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2008}, url = {http://eprint.iacr.org/2008/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PaarSSW07, author = {Christof Paar and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk and Christoph Wegener}, title = {Studieren mit Sicherheit in Bochum - Die Studieng{\"{a}}nge zum Thema IT-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {31}, number = {5}, pages = {338--342}, year = {2007}, url = {https://doi.org/10.1007/s11623-007-0130-0}, doi = {10.1007/S11623-007-0130-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PaarSSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GajekLS07, author = {Sebastian Gajek and Lijun Liao and J{\"{o}}rg Schwenk}, title = {Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS}, journal = {Datenschutz und Datensicherheit}, volume = {31}, number = {11}, pages = {816--821}, year = {2007}, url = {https://doi.org/10.1007/s11623-007-0265-z}, doi = {10.1007/S11623-007-0265-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GajekLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecows/GajekLMS07, author = {Sebastian Gajek and Lijun Liao and Bodo M{\"{o}}ller and J{\"{o}}rg Schwenk}, editor = {Cesare Pautasso and Thomas Gschwind}, title = {SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services}, booktitle = {Proceedings of the 2nd {ECOWS07} Workshop on Emerging Web Services Technology, {WEWST} 2007, Halle (Saale), Germany, November 26, 2007}, series = {{CEUR} Workshop Proceedings}, volume = {313}, publisher = {CEUR-WS.org}, year = {2007}, url = {https://ceur-ws.org/Vol-313/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:23 +0100}, biburl = {https://dblp.org/rec/conf/ecows/GajekLMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecows/LiaoS07, author = {Lijun Liao and J{\"{o}}rg Schwenk}, title = {Secure Emails in {XML} Format Using Web Services}, booktitle = {Fifth {IEEE} European Conference on Web Services {(ECOWS} 2007), 26-28 November 2007, Halle (Saale), Germany}, pages = {129--136}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ECOWS.2007.12}, doi = {10.1109/ECOWS.2007.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecows/LiaoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecows/GajekLMS07a, author = {Sebastian Gajek and Lijun Liao and Bodo M{\"{o}}ller and J{\"{o}}rg Schwenk}, editor = {Thomas Gschwind and Cesare Pautasso}, title = {SSL-over-SOAP: Towards a Token-based Key Establishment framework for Web services}, booktitle = {Emerging Web Services Technology, Volume II, Final Proceedings of the 2nd {ECOWS07} Workshop on Emerging Web Services Technology, WEWST@ECOWS 2007, Halle (Saale), Germany, November 26, 2007}, series = {Whitestein series in software agent technologies and autonomic computing}, pages = {141--157}, publisher = {Birkh{\"{a}}user / Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-7643-8864-5\_10}, doi = {10.1007/978-3-7643-8864-5\_10}, timestamp = {Thu, 18 Jul 2019 16:35:16 +0200}, biburl = {https://dblp.org/rec/conf/ecows/GajekLMS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic/LiaoS07, author = {Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Hamid R. Arabnia and Victor A. Clincy and Joan Lu and Jan Smid}, title = {Securing Email Communication with {XML} Technology}, booktitle = {Proceedings of the 2007 International Conference on Internet Computing, {ICOMP} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {304--310}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Thu, 03 Jan 2008 15:16:43 +0100}, biburl = {https://dblp.org/rec/conf/ic/LiaoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ManulisS07, author = {Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Provably Secure Framework for Information Aggregation in Sensor Networks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4705}, pages = {603--621}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74472-6\_49}, doi = {10.1007/978-3-540-74472-6\_49}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ManulisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BressonMS07, author = {Emmanuel Bresson and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {On Security Models and Compilers for Group Key Exchange Protocols}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {292--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_20}, doi = {10.1007/978-3-540-75651-4\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BressonMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LiaoS07, author = {Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Robert Meersman and Zahir Tari}, title = {End-to-End Header Protection in Signed {S/MIME}}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1646--1658}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_37}, doi = {10.1007/978-3-540-76843-2\_37}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/LiaoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/GajekLS07, author = {Sebastian Gajek and Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Peng Ning and Ernesto Damiani and Seth Proctor}, title = {Breaking and fixing the inline approach}, booktitle = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {37--43}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314418.1314425}, doi = {10.1145/1314418.1314425}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/GajekLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HelbachS07, author = {J{\"{o}}rg Helbach and J{\"{o}}rg Schwenk}, editor = {Ammar Alkassar and Melanie Volkamer}, title = {Secure Internet Voting with Code Sheets}, booktitle = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4896}, pages = {166--177}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77493-8\_15}, doi = {10.1007/978-3-540-77493-8\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/HelbachS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisS07, author = {Mark Manulis and J{\"{o}}rg Schwenk}, title = {Provably Secure Framework for Information Aggregation is Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2007}, url = {http://eprint.iacr.org/2007/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0016894, author = {Albrecht Beutelspacher and J{\"{o}}rg Schwenk and Klaus{-}Dieter Wolfenstetter}, title = {Moderne Verfahren der Krypotgraphie - von {RSA} zu Zero-Knowledge {(6.} Aufl.)}, publisher = {Vieweg}, year = {2006}, isbn = {978-3-8348-0083-1}, timestamp = {Thu, 24 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0016894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ManulisSS06, author = {Mark Manulis and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Linkable Democratic Group Signatures}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {187--201}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_18}, doi = {10.1007/11689522\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ManulisSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GajekSW06, author = {Sebastian Gajek and J{\"{o}}rg Schwenk and Christoph Wegener}, editor = {Jana Dittmann}, title = {SSL-VA-Authentifizierung als Schutz von Phishing und Pharming}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {6--17}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24768}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GajekSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisSS06, author = {Mark Manulis and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, title = {Linkable Democratic Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2006}, url = {http://eprint.iacr.org/2006/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonMS06, author = {Emmanuel Bresson and Mark Manulis and J{\"{o}}rg Schwenk}, title = {On Security Models and Compilers for Group Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2006}, url = {http://eprint.iacr.org/2006/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/EwersKLS05, author = {Lars Ewers and Wolfgang Kubbilun and Lijun Liao and J{\"{o}}rg Schwenk}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {291--300}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_39}, doi = {10.1007/11552055\_39}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/EwersKLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/KubbilunGPS05, author = {Wolfgang Kubbilun and Sebastian Gajek and Michael Psarros and J{\"{o}}rg Schwenk}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Trustworthy Verification and Visualisation of Multiple XML-Signatures}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {311--320}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_41}, doi = {10.1007/11552055\_41}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/KubbilunGPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AdelsbachGS05, author = {Andr{\'{e}} Adelsbach and Sebastian Gajek and J{\"{o}}rg Schwenk}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Visual Spoofing of {SSL} Protected Web Sites and Effective Countermeasures}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {204--216}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_18}, doi = {10.1007/978-3-540-31979-5\_18}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AdelsbachGS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0012377, author = {Albrecht Beutelspacher and J{\"{o}}rg Schwenk and Klaus{-}Dieter Wolfenstetter}, title = {Moderne Verfahren der Kryptographie - von {RSA} zu Zero-Knowledge {(5.} Aufl.)}, publisher = {Vieweg}, year = {2004}, isbn = {978-3-528-46590-2}, timestamp = {Thu, 14 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0012377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ManulisS04, author = {Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on {IDH}}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {107--124}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_10}, doi = {10.1007/978-3-540-30496-8\_10}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/ManulisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AdelsbachS04, author = {Andr{\'{e}} Adelsbach and J{\"{o}}rg Schwenk}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Key-assignment strategies for {CPPM}}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {107--115}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022451}, doi = {10.1145/1022431.1022451}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AdelsbachS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MartinSS01, author = {Tobias Martin and R. Schaffelhofer and J{\"{o}}rg Schwenk}, editor = {Ralf Steinmetz and Jana Dittmann and Martin Steinebach}, title = {Tree-based Key Agreement for Multicast}, booktitle = {Communications and Multimedia Security Issues of the New Century, Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany}, series = {{IFIP} Conference Proceedings}, volume = {192}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/MartinSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchwenkMN01, author = {J{\"{o}}rg Schwenk and Tobias Martin and Erik Neumann}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {From pay-tv to pay-streaming: similarities and differences}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {40--43}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232470}, doi = {10.1145/1232454.1232470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchwenkMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/DittmannHVSS01, author = {Jana Dittmann and Enrico Hauer and Claus Vielhauer and J{\"{o}}rg Schwenk and Eva Saar}, editor = {Heung{-}Yeung Shum and Mark Liao and Shih{-}Fu Chang}, title = {Customer Identification for {MPEG} Video Based on Digital Fingerprinting}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2001, Second {IEEE} Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2195}, pages = {383--390}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45453-5\_49}, doi = {10.1007/3-540-45453-5\_49}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/pcm/DittmannHVSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/DittmannSSSU00, author = {Jana Dittmann and Peter Schmitt and Eva Saar and J{\"{o}}rg Schwenk and Johannes Ueberberg}, title = {Combining digital watermarks and collusion secure fingerprints for digital images}, journal = {J. Electronic Imaging}, volume = {9}, number = {4}, pages = {456--467}, year = {2000}, url = {https://doi.org/10.1117/1.1287729}, doi = {10.1117/1.1287729}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jei/DittmannSSSU00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Schwenk99, author = {J{\"{o}}rg Schwenk}, editor = {Bart Preneel}, title = {How to Security Broadcast a Secret}, booktitle = {Secure Information Networks: Communications and Multimedia Security, {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {152}, pages = {247--257}, publisher = {Kluwer}, year = {1999}, timestamp = {Mon, 14 Oct 2002 12:00:15 +0200}, biburl = {https://dblp.org/rec/conf/cms/Schwenk99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/DittmannBSSSU99, author = {Jana Dittmann and Alexander Behr and Mark Stabenau and Peter Schmitt and J{\"{o}}rg Schwenk and Johannes Ueberberg}, editor = {Ping Wah Wong and Edward J. Delp III}, title = {Combining digital watermarks and collusion-secure fingerprints for digital images}, booktitle = {Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 23, 1999}, series = {{SPIE} Proceedings}, volume = {3657}, pages = {171--183}, publisher = {{SPIE}}, year = {1999}, url = {https://doi.org/10.1117/12.344702}, doi = {10.1117/12.344702}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/DittmannBSSSU99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Schwenk96, author = {J{\"{o}}rg Schwenk}, editor = {Patrick Horster}, title = {Establishing a Key Hierarchy for Conditional Access without Encryption}, booktitle = {Communications and Multimedia Security II, Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996}, series = {{IFIP} Conference Proceedings}, volume = {70}, pages = {176--182}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Mon, 14 Oct 2002 12:00:10 +0200}, biburl = {https://dblp.org/rec/conf/cms/Schwenk96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SchwenkE96, author = {J{\"{o}}rg Schwenk and J{\"{o}}rg Eisfeld}, editor = {Ueli M. Maurer}, title = {Public Key Encryption and Signature Schemes Based on Polynomials over Zn}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {60--71}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_6}, doi = {10.1007/3-540-68339-9\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SchwenkE96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0082447, author = {Albrecht Beutelspacher and J{\"{o}}rg Schwenk and Klaus{-}Dieter Wolfenstetter}, title = {Moderne Verfahren der Kryptographie - von {RSA} zu Zero-Knowledge}, publisher = {Vieweg}, year = {1995}, isbn = {978-3-528-06590-4}, timestamp = {Thu, 28 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0082447.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.