The SCEAS System
Navigation Menu

Search the dblp DataBase


Sebastian Gajek: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rolf Oppliger, Sebastian Gajek
    Effective Protection Against Phishing and Web Spoofing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:32-41 [Conf]
  2. Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk
    Trustworthy Verification and Visualisation of Multiple XML-Signatures. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:311-320 [Conf]
  3. André Adelsbach, Sebastian Gajek, Jörg Schwenk
    Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:204-216 [Conf]
  4. Sebastian Gajek, Jörg Schwenk, Christoph Wegener
    SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:6-17 [Conf]

  5. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]

  6. Secure Bindings of SAML Assertions to TLS Sessions. [Citation Graph (, )][DBLP]

  7. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. [Citation Graph (, )][DBLP]

  8. Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]

  9. TruWallet: trustworthy and migratable wallet-based web authentication. [Citation Graph (, )][DBLP]

  10. SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. [Citation Graph (, )][DBLP]

  11. A Browser-Based Kerberos Authentication Scheme. [Citation Graph (, )][DBLP]

  12. Analysis of Signature Wrapping Attacks and Countermeasures. [Citation Graph (, )][DBLP]

  13. Risks of the CardSpace Protocol. [Citation Graph (, )][DBLP]

  14. Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]

  15. A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. [Citation Graph (, )][DBLP]

  16. Breaking and fixing the inline approach. [Citation Graph (, )][DBLP]

  17. Stronger TLS bindings for SAML assertions and SAML artifacts. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002