dblp.uni-trier.dewww.uni-trier.de

Jörg Schwenk

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
33EEMark Manulis, Jörg Schwenk: Security model and framework for information aggregation in sensor networks. TOSN 5(2): (2009)
2008
32EESebastian Gajek, Mark Manulis, Jörg Schwenk: Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. ACISP 2008: 6-20
31EESebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Provably secure browser-based user-aware mutual authentication over TLS. ASIACCS 2008: 300-311
30EESebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk: A Browser-Based Kerberos Authentication Scheme. ESORICS 2008: 115-129
29 Jörg Helbach, Jörg Schwenk, Sven Schäge: Code Voting with Linkable Group Signatures. Electronic Voting 2008: 209-208
28 Rolf Oppliger, Jörg Schwenk, Christoph Löhr: CAPTCHA-based Code Voting. Electronic Voting 2008: 223-222
27EELijun Liao, Jörg Schwenk: A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. ICICS 2008: 19-32
26EETibor Jager, Jörg Schwenk: On the Equivalence of Generic Group Models. ProvSec 2008: 200-209
25EESebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk: Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327
24EESebastian Gajek, Lijun Liao, Jörg Schwenk: Stronger TLS bindings for SAML assertions and SAML artifacts. SWS 2008: 11-20
23 Tibor Jager, Heiko Jäkel, Jörg Schwenk: Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. Sicherheit 2008: 127-136
22 Rolf Oppliger, Jörg Schwenk, Jörg Helbach: Protecting Code Voting Against Vote Selling. Sicherheit 2008: 193-204
2007
21EELijun Liao, Jörg Schwenk: Secure Emails in XML Format Using Web Services. ECOWS 2007: 129-136
20EEMark Manulis, Jörg Schwenk: Provably Secure Framework for Information Aggregation in Sensor Networks. ICCSA (1) 2007: 603-621
19EEEmmanuel Bresson, Mark Manulis, Jörg Schwenk: On Security Models and Compilers for Group Key Exchange Protocols. IWSEC 2007: 292-307
18 Lijun Liao, Jörg Schwenk: Securing Email Communication with XML Technology. International Conference on Internet Computing 2007: 304-310
17EELijun Liao, Jörg Schwenk: End-to-End Header Protection in Signed S/MIME. OTM Conferences (2) 2007: 1646-1658
16EESebastian Gajek, Lijun Liao, Jörg Schwenk: Breaking and fixing the inline approach. SWS 2007: 37-43
15EEJörg Helbach, Jörg Schwenk: Secure Internet Voting with Code Sheets. VOTE-ID 2007: 166-177
14EESebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk: SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. WEWST 2007
2006
13EEMark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Linkable Democratic Group Signatures. ISPEC 2006: 187-201
12 Sebastian Gajek, Jörg Schwenk, Christoph Wegener: SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. Sicherheit 2006: 6-17
2005
11EELars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk: Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. Communications and Multimedia Security 2005: 291-300
10EEWolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk: Trustworthy Verification and Visualisation of Multiple XML-Signatures. Communications and Multimedia Security 2005: 311-320
9EEAndré Adelsbach, Sebastian Gajek, Jörg Schwenk: Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. ISPEC 2005: 204-216
2004
8EEMark Manulis, Jörg Schwenk: Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. ESAS 2004: 107-124
7EEAndré Adelsbach, Jörg Schwenk: Key-assignment strategies for CPPM. MM&Sec 2004: 107-115
2001
6 Tobias Martin, R. Schaffelhofer, Jörg Schwenk: Tree-based Key Agreement for Multicast. Communications and Multimedia Security 2001
5EEJana Dittmann, Enrico Hauer, Claus Vielhauer, Jörg Schwenk, Eva Saar: Customer Identification for MPEG Video Based on Digital Fingerprinting. IEEE Pacific Rim Conference on Multimedia 2001: 383-390
4EEJörg Schwenk, Tobias Martin, Erik Neumann: From pay-tv to pay-streaming: similarities and differences. MM&Sec 2001: 40-43
1999
3 Jörg Schwenk: How to Security Broadcast a Secret. Communications and Multimedia Security 1999: 247-257
1996
2 Jörg Schwenk: Establishing a Key Hierarchy for Conditional Access without Encryption. Communications and Multimedia Security 1996: 176-182
1EEJörg Schwenk, Jörg Eisfeld: Public Key Encryption and Signature Schemes Based on Polynomials over Zn. EUROCRYPT 1996: 60-71

Coauthor Index

1André Adelsbach [7] [9]
2Emmanuel Bresson [19]
3Jana Dittmann [5]
4Jörg Eisfeld [1]
5Lars Ewers [11]
6Sebastian Gajek [9] [10] [12] [14] [16] [24] [25] [30] [31] [32]
7Enrico Hauer [5]
8Jörg Helbach [15] [22] [29]
9Tibor Jager [23] [26] [30]
10Heiko Jäkel [23]
11Wolfgang Kubbilun [10] [11]
12Lijun Liao [11] [14] [16] [17] [18] [21] [24] [27]
13Christoph Löhr [28]
14Mark Manulis [8] [13] [19] [20] [25] [30] [31] [32] [33]
15Tobias Martin [4] [6]
16Bodo Möller [14]
17Erik Neumann [4]
18Rolf Oppliger [22] [28]
19Olivier Pereira [25]
20Michael Psarros [10]
21Eva Saar [5]
22Ahmad-Reza Sadeghi [13] [25] [31]
23R. Schaffelhofer [6]
24Sven Schäge [29]
25Claus Vielhauer [5]
26Christoph Wegener [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)