|
Search the dblp DataBase
Jörg Schwenk:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk
Trustworthy Verification and Visualisation of Multiple XML-Signatures. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:311-320 [Conf]
- Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:291-300 [Conf]
- Tobias Martin, R. Schaffelhofer, Jörg Schwenk
Tree-based Key Agreement for Multicast. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
- Jörg Schwenk
Establishing a Key Hierarchy for Conditional Access without Encryption. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:176-182 [Conf]
- Jörg Schwenk
How to Security Broadcast a Secret. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1999, pp:247-257 [Conf]
- Mark Manulis, Jörg Schwenk
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:107-124 [Conf]
- Jörg Schwenk, Jörg Eisfeld
Public Key Encryption and Signature Schemes Based on Polynomials over Zn. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:60-71 [Conf]
- André Adelsbach, Sebastian Gajek, Jörg Schwenk
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:204-216 [Conf]
- Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:187-201 [Conf]
- Jana Dittmann, Enrico Hauer, Claus Vielhauer, Jörg Schwenk, Eva Saar
Customer Identification for MPEG Video Based on Digital Fingerprinting. [Citation Graph (0, 0)][DBLP] IEEE Pacific Rim Conference on Multimedia, 2001, pp:383-390 [Conf]
- Sebastian Gajek, Jörg Schwenk, Christoph Wegener
SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. [Citation Graph (0, 0)][DBLP] Sicherheit, 2006, pp:6-17 [Conf]
- Mark Manulis, Jörg Schwenk
Provably Secure Framework for Information Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2007, pp:603-621 [Conf]
- Emmanuel Bresson, Mark Manulis, Jörg Schwenk
On Security Models and Compilers for Group Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:292-307 [Conf]
- Lijun Liao, Jörg Schwenk
End-to-End Header Protection in Signed S/MIME. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2007, pp:1646-1658 [Conf]
- Jörg Schwenk, Tobias Martin, Erik Neumann
From pay-tv to pay-streaming: similarities and differences. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:40-43 [Conf]
- André Adelsbach, Jörg Schwenk
Key-assignment strategies for CPPM. [Citation Graph (0, 0)][DBLP] MM&Sec, 2004, pp:107-115 [Conf]
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. [Citation Graph (, )][DBLP]
Secure Bindings of SAML Assertions to TLS Sessions. [Citation Graph (, )][DBLP]
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. [Citation Graph (, )][DBLP]
On the Analysis of Cryptographic Assumptions in the Generic Ring Model. [Citation Graph (, )][DBLP]
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management. [Citation Graph (, )][DBLP]
SAMLizing the European Citizen Card. [Citation Graph (, )][DBLP]
Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. [Citation Graph (, )][DBLP]
Secure Emails in XML Format Using Web Services. [Citation Graph (, )][DBLP]
A Browser-Based Kerberos Authentication Scheme. [Citation Graph (, )][DBLP]
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. [Citation Graph (, )][DBLP]
A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys. [Citation Graph (, )][DBLP]
Sicherheitsanalyse von Kreditkarten am Beispiel von EMV. [Citation Graph (, )][DBLP]
Securing Email Communication with XML Technology. [Citation Graph (, )][DBLP]
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. [Citation Graph (, )][DBLP]
Analysis of Signature Wrapping Attacks and Countermeasures. [Citation Graph (, )][DBLP]
Risks of the CardSpace Protocol. [Citation Graph (, )][DBLP]
Group key agreement for wireless mesh networks. [Citation Graph (, )][DBLP]
Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. [Citation Graph (, )][DBLP]
Protecting Code Voting Against Vote Selling. [Citation Graph (, )][DBLP]
On the Equivalence of Generic Group Models. [Citation Graph (, )][DBLP]
Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]
Secure Internet Voting with Code Sheets. [Citation Graph (, )][DBLP]
CAPTCHA-based Code Voting. [Citation Graph (, )][DBLP]
Code Voting with Linkable Group Signatures. [Citation Graph (, )][DBLP]
Breaking and fixing the inline approach. [Citation Graph (, )][DBLP]
Stronger TLS bindings for SAML assertions and SAML artifacts. [Citation Graph (, )][DBLP]
Extending the similarity-based XML multicast approach with digital signatures. [Citation Graph (, )][DBLP]
The curse of namespaces in the domain of XML signature. [Citation Graph (, )][DBLP]
A New RSA-Based Signature Scheme. [Citation Graph (, )][DBLP]
Streaming-Based Verification of XML Signatures in SOAP Messages. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.010secs
|