Urmăriți
Jörg Schwenk
Jörg Schwenk
Professor für Netz- und Datensicherheit, Ruhr-Universität Bochum
Adresă de e-mail confirmată pe rub.de
Titlu
Citat de
Citat de
Anul
On technical security issues in cloud computing
M Jensen, J Schwenk, N Gruschka, LL Iacono
2009 IEEE international conference on cloud computing, 109-116, 2009
11102009
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
2942012
All your clouds are belong to us: security analysis of cloud management interfaces
J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ...
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011
2392011
Moderne Verfahren der Kryptographie
A Beutelspacher, J Schwenk, KD Wolfenstetter
Vieweg+ Teubner Verlag, 2001
2042001
More is less: On the end-to-end security of group chats in signal, whatsapp, and threema
P Rösler, C Mainka, J Schwenk
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 415-429, 2018
1722018
On breaking {SAML}: Be whoever you want to be
J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen
21st USENIX Security Symposium (USENIX Security 12), 397-412, 2012
1522012
Method for securing system protected by a key hierarchy
J Schwenk
US Patent 6,222,923, 2001
1392001
Revisiting {SSL/TLS} implementations: New bleichenbacher side channels and attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd USENIX Security Symposium (USENIX Security 14), 733-748, 2014
1382014
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1352019
Scriptless attacks: stealing the pie without touching the sill
M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1352012
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption
T Jager, J Schwenk, J Somorovsky
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1242015
How secure is TextSecure?
T Frosch, C Mainka, C Bader, F Bergsma, J Schwenk, T Holz
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 457-472, 2016
1222016
Combining digital watermarks and collusion-secure fingerprints for digital images
J Dittmann, A Behr, M Stabenau, P Schmitt, J Schwenk, J Ueberberg
Security and Watermarking of Multimedia Contents 3657, 171-182, 1999
1061999
SoK: single sign-on security—an evaluation of openID connect
C Mainka, V Mladenov, J Schwenk, T Wich
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 251-266, 2017
1032017
Public key encryption and digital signatures based on permutation polynomials
J Schwenk, K Huber
Electronics Letters 34 (8), 759-760, 1998
991998
Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels
D Poddebniak, C Dresen, J Müller, F Ising, S Schinzel, S Friedberger, ...
27th USENIX Security Symposium (USENIX Security 18), 549-566, 2018
922018
Penetration testing tool for web services security
C Mainka, J Somorovsky, J Schwenk
2012 IEEE Eighth World Congress on Services, 163-170, 2012
912012
Universally composable security analysis of TLS
S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk
Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008
912008
Combining digital watermarks and collusion secure fingerprints for digital images
J Dittmann, P Schmitt, E Saar, J Schwenk, J Ueberberg
Journal of Electronic Imaging 9 (4), 456-467, 2000
912000
Analysis of signature wrapping attacks and countermeasures
S Gajek, M Jensen, L Liao, J Schwenk
2009 IEEE international conference on web services, 575-582, 2009
902009
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20