2009 |
33 | EE | Mark Manulis,
Jörg Schwenk:
Security model and framework for information aggregation in sensor networks.
TOSN 5(2): (2009) |
2008 |
32 | EE | Sebastian Gajek,
Mark Manulis,
Jörg Schwenk:
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
ACISP 2008: 6-20 |
31 | EE | Sebastian Gajek,
Mark Manulis,
Ahmad-Reza Sadeghi,
Jörg Schwenk:
Provably secure browser-based user-aware mutual authentication over TLS.
ASIACCS 2008: 300-311 |
30 | EE | Sebastian Gajek,
Tibor Jager,
Mark Manulis,
Jörg Schwenk:
A Browser-Based Kerberos Authentication Scheme.
ESORICS 2008: 115-129 |
29 | | Jörg Helbach,
Jörg Schwenk,
Sven Schäge:
Code Voting with Linkable Group Signatures.
Electronic Voting 2008: 209-208 |
28 | | Rolf Oppliger,
Jörg Schwenk,
Christoph Löhr:
CAPTCHA-based Code Voting.
Electronic Voting 2008: 223-222 |
27 | EE | Lijun Liao,
Jörg Schwenk:
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail.
ICICS 2008: 19-32 |
26 | EE | Tibor Jager,
Jörg Schwenk:
On the Equivalence of Generic Group Models.
ProvSec 2008: 200-209 |
25 | EE | Sebastian Gajek,
Mark Manulis,
Olivier Pereira,
Ahmad-Reza Sadeghi,
Jörg Schwenk:
Universally Composable Security Analysis of TLS.
ProvSec 2008: 313-327 |
24 | EE | Sebastian Gajek,
Lijun Liao,
Jörg Schwenk:
Stronger TLS bindings for SAML assertions and SAML artifacts.
SWS 2008: 11-20 |
23 | | Tibor Jager,
Heiko Jäkel,
Jörg Schwenk:
Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS.
Sicherheit 2008: 127-136 |
22 | | Rolf Oppliger,
Jörg Schwenk,
Jörg Helbach:
Protecting Code Voting Against Vote Selling.
Sicherheit 2008: 193-204 |
2007 |
21 | EE | Lijun Liao,
Jörg Schwenk:
Secure Emails in XML Format Using Web Services.
ECOWS 2007: 129-136 |
20 | EE | Mark Manulis,
Jörg Schwenk:
Provably Secure Framework for Information Aggregation in Sensor Networks.
ICCSA (1) 2007: 603-621 |
19 | EE | Emmanuel Bresson,
Mark Manulis,
Jörg Schwenk:
On Security Models and Compilers for Group Key Exchange Protocols.
IWSEC 2007: 292-307 |
18 | | Lijun Liao,
Jörg Schwenk:
Securing Email Communication with XML Technology.
International Conference on Internet Computing 2007: 304-310 |
17 | EE | Lijun Liao,
Jörg Schwenk:
End-to-End Header Protection in Signed S/MIME.
OTM Conferences (2) 2007: 1646-1658 |
16 | EE | Sebastian Gajek,
Lijun Liao,
Jörg Schwenk:
Breaking and fixing the inline approach.
SWS 2007: 37-43 |
15 | EE | Jörg Helbach,
Jörg Schwenk:
Secure Internet Voting with Code Sheets.
VOTE-ID 2007: 166-177 |
14 | EE | Sebastian Gajek,
Lijun Liao,
Bodo Möller,
Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services.
WEWST 2007 |
2006 |
13 | EE | Mark Manulis,
Ahmad-Reza Sadeghi,
Jörg Schwenk:
Linkable Democratic Group Signatures.
ISPEC 2006: 187-201 |
12 | | Sebastian Gajek,
Jörg Schwenk,
Christoph Wegener:
SSL-VA-Authentifizierung als Schutz von Phishing und Pharming.
Sicherheit 2006: 6-17 |
2005 |
11 | EE | Lars Ewers,
Wolfgang Kubbilun,
Lijun Liao,
Jörg Schwenk:
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.
Communications and Multimedia Security 2005: 291-300 |
10 | EE | Wolfgang Kubbilun,
Sebastian Gajek,
Michael Psarros,
Jörg Schwenk:
Trustworthy Verification and Visualisation of Multiple XML-Signatures.
Communications and Multimedia Security 2005: 311-320 |
9 | EE | André Adelsbach,
Sebastian Gajek,
Jörg Schwenk:
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
ISPEC 2005: 204-216 |
2004 |
8 | EE | Mark Manulis,
Jörg Schwenk:
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.
ESAS 2004: 107-124 |
7 | EE | André Adelsbach,
Jörg Schwenk:
Key-assignment strategies for CPPM.
MM&Sec 2004: 107-115 |
2001 |
6 | | Tobias Martin,
R. Schaffelhofer,
Jörg Schwenk:
Tree-based Key Agreement for Multicast.
Communications and Multimedia Security 2001 |
5 | EE | Jana Dittmann,
Enrico Hauer,
Claus Vielhauer,
Jörg Schwenk,
Eva Saar:
Customer Identification for MPEG Video Based on Digital Fingerprinting.
IEEE Pacific Rim Conference on Multimedia 2001: 383-390 |
4 | EE | Jörg Schwenk,
Tobias Martin,
Erik Neumann:
From pay-tv to pay-streaming: similarities and differences.
MM&Sec 2001: 40-43 |
1999 |
3 | | Jörg Schwenk:
How to Security Broadcast a Secret.
Communications and Multimedia Security 1999: 247-257 |
1996 |
2 | | Jörg Schwenk:
Establishing a Key Hierarchy for Conditional Access without Encryption.
Communications and Multimedia Security 1996: 176-182 |
1 | EE | Jörg Schwenk,
Jörg Eisfeld:
Public Key Encryption and Signature Schemes Based on Polynomials over Zn.
EUROCRYPT 1996: 60-71 |