The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jörg Schwenk: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk
    Trustworthy Verification and Visualisation of Multiple XML-Signatures. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:311-320 [Conf]
  2. Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk
    Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:291-300 [Conf]
  3. Tobias Martin, R. Schaffelhofer, Jörg Schwenk
    Tree-based Key Agreement for Multicast. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  4. Jörg Schwenk
    Establishing a Key Hierarchy for Conditional Access without Encryption. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:176-182 [Conf]
  5. Jörg Schwenk
    How to Security Broadcast a Secret. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:247-257 [Conf]
  6. Mark Manulis, Jörg Schwenk
    Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:107-124 [Conf]
  7. Jörg Schwenk, Jörg Eisfeld
    Public Key Encryption and Signature Schemes Based on Polynomials over Zn. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:60-71 [Conf]
  8. André Adelsbach, Sebastian Gajek, Jörg Schwenk
    Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:204-216 [Conf]
  9. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
    Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:187-201 [Conf]
  10. Jana Dittmann, Enrico Hauer, Claus Vielhauer, Jörg Schwenk, Eva Saar
    Customer Identification for MPEG Video Based on Digital Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:383-390 [Conf]
  11. Sebastian Gajek, Jörg Schwenk, Christoph Wegener
    SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:6-17 [Conf]
  12. Mark Manulis, Jörg Schwenk
    Provably Secure Framework for Information Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:603-621 [Conf]
  13. Emmanuel Bresson, Mark Manulis, Jörg Schwenk
    On Security Models and Compilers for Group Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:292-307 [Conf]
  14. Lijun Liao, Jörg Schwenk
    End-to-End Header Protection in Signed S/MIME. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1646-1658 [Conf]
  15. Jörg Schwenk, Tobias Martin, Erik Neumann
    From pay-tv to pay-streaming: similarities and differences. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:40-43 [Conf]
  16. André Adelsbach, Jörg Schwenk
    Key-assignment strategies for CPPM. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:107-115 [Conf]

  17. The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. [Citation Graph (, )][DBLP]


  18. Secure Bindings of SAML Assertions to TLS Sessions. [Citation Graph (, )][DBLP]


  19. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. [Citation Graph (, )][DBLP]


  20. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. [Citation Graph (, )][DBLP]


  21. TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management. [Citation Graph (, )][DBLP]


  22. SAMLizing the European Citizen Card. [Citation Graph (, )][DBLP]


  23. Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]


  24. SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. [Citation Graph (, )][DBLP]


  25. Secure Emails in XML Format Using Web Services. [Citation Graph (, )][DBLP]


  26. A Browser-Based Kerberos Authentication Scheme. [Citation Graph (, )][DBLP]


  27. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. [Citation Graph (, )][DBLP]


  28. A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys. [Citation Graph (, )][DBLP]


  29. Sicherheitsanalyse von Kreditkarten am Beispiel von EMV. [Citation Graph (, )][DBLP]


  30. Securing Email Communication with XML Technology. [Citation Graph (, )][DBLP]


  31. A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. [Citation Graph (, )][DBLP]


  32. Analysis of Signature Wrapping Attacks and Countermeasures. [Citation Graph (, )][DBLP]


  33. Risks of the CardSpace Protocol. [Citation Graph (, )][DBLP]


  34. Group key agreement for wireless mesh networks. [Citation Graph (, )][DBLP]


  35. Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. [Citation Graph (, )][DBLP]


  36. Protecting Code Voting Against Vote Selling. [Citation Graph (, )][DBLP]


  37. On the Equivalence of Generic Group Models. [Citation Graph (, )][DBLP]


  38. Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]


  39. Secure Internet Voting with Code Sheets. [Citation Graph (, )][DBLP]


  40. CAPTCHA-based Code Voting. [Citation Graph (, )][DBLP]


  41. Code Voting with Linkable Group Signatures. [Citation Graph (, )][DBLP]


  42. Breaking and fixing the inline approach. [Citation Graph (, )][DBLP]


  43. Stronger TLS bindings for SAML assertions and SAML artifacts. [Citation Graph (, )][DBLP]


  44. Extending the similarity-based XML multicast approach with digital signatures. [Citation Graph (, )][DBLP]


  45. The curse of namespaces in the domain of XML signature. [Citation Graph (, )][DBLP]


  46. A New RSA-Based Signature Scheme. [Citation Graph (, )][DBLP]


  47. Streaming-Based Verification of XML Signatures in SOAP Messages. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002