[{"publication":"Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings","type":"conference","status":"public","_id":"3139","department":[{"_id":"558"}],"user_id":"38235","extern":"1","year":"2010","page":"232--249","citation":{"ama":"Jager T, Kohlar F, Schäge S, Schwenk J. Generic Compilers for Authenticated Key Exchange. In: <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>. ; 2010:232--249. doi:<a href=\"https://doi.org/10.1007/978-3-642-17373-8_14\">10.1007/978-3-642-17373-8_14</a>","chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Generic Compilers for Authenticated Key Exchange.” In <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 232--249, 2010. <a href=\"https://doi.org/10.1007/978-3-642-17373-8_14\">https://doi.org/10.1007/978-3-642-17373-8_14</a>.","ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Generic Compilers for Authenticated Key Exchange,” in <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 232--249.","short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 232--249.","bibtex":"@inproceedings{Jager_Kohlar_Schäge_Schwenk_2010, title={Generic Compilers for Authenticated Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-17373-8_14\">10.1007/978-3-642-17373-8_14</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2010}, pages={232--249} }","mla":"Jager, Tibor, et al. “Generic Compilers for Authenticated Key Exchange.” <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 232--249, doi:<a href=\"https://doi.org/10.1007/978-3-642-17373-8_14\">10.1007/978-3-642-17373-8_14</a>.","apa":"Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2010). Generic Compilers for Authenticated Key Exchange. In <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i> (pp. 232--249). <a href=\"https://doi.org/10.1007/978-3-642-17373-8_14\">https://doi.org/10.1007/978-3-642-17373-8_14</a>"},"date_updated":"2022-01-06T06:58:58Z","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"full_name":"Kohlar, Florian","last_name":"Kohlar","first_name":"Florian"},{"full_name":"Schäge, Sven","last_name":"Schäge","first_name":"Sven"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"}],"date_created":"2018-06-07T09:28:51Z","title":"Generic Compilers for Authenticated Key Exchange","doi":"10.1007/978-3-642-17373-8_14"},{"title":"The Semi-Generic Group Model and Applications to Pairing-Based Cryptography","doi":"10.1007/978-3-642-17373-8_31","date_updated":"2022-01-06T06:58:58Z","author":[{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"first_name":"Andy","last_name":"Rupp","full_name":"Rupp, Andy"}],"date_created":"2018-06-07T09:29:23Z","year":"2010","citation":{"ieee":"T. Jager and A. Rupp, “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography,” in <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 539--556.","chicago":"Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.” In <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 539--556, 2010. <a href=\"https://doi.org/10.1007/978-3-642-17373-8_31\">https://doi.org/10.1007/978-3-642-17373-8_31</a>.","ama":"Jager T, Rupp A. The Semi-Generic Group Model and Applications to Pairing-Based Cryptography. In: <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>. ; 2010:539--556. doi:<a href=\"https://doi.org/10.1007/978-3-642-17373-8_31\">10.1007/978-3-642-17373-8_31</a>","mla":"Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.” <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 539--556, doi:<a href=\"https://doi.org/10.1007/978-3-642-17373-8_31\">10.1007/978-3-642-17373-8_31</a>.","bibtex":"@inproceedings{Jager_Rupp_2010, title={The Semi-Generic Group Model and Applications to Pairing-Based Cryptography}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-17373-8_31\">10.1007/978-3-642-17373-8_31</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, author={Jager, Tibor and Rupp, Andy}, year={2010}, pages={539--556} }","short":"T. Jager, A. Rupp, in: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 539--556.","apa":"Jager, T., &#38; Rupp, A. (2010). The Semi-Generic Group Model and Applications to Pairing-Based Cryptography. In <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings</i> (pp. 539--556). <a href=\"https://doi.org/10.1007/978-3-642-17373-8_31\">https://doi.org/10.1007/978-3-642-17373-8_31</a>"},"page":"539--556","extern":"1","_id":"3140","user_id":"38235","department":[{"_id":"558"}],"status":"public","type":"conference","publication":"Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings"},{"date_created":"2018-06-07T09:29:52Z","author":[{"last_name":"Haralambiev","full_name":"Haralambiev, Kristiyan","first_name":"Kristiyan"},{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Eike","last_name":"Kiltz","full_name":"Kiltz, Eike"},{"first_name":"Victor","full_name":"Shoup, Victor","last_name":"Shoup"}],"date_updated":"2022-01-06T06:58:58Z","doi":"10.1007/978-3-642-13013-7_1","title":"Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model","citation":{"apa":"Haralambiev, K., Jager, T., Kiltz, E., &#38; Shoup, V. (2010). Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. In <i>Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i> (pp. 1--18). <a href=\"https://doi.org/10.1007/978-3-642-13013-7_1\">https://doi.org/10.1007/978-3-642-13013-7_1</a>","short":"K. Haralambiev, T. Jager, E. Kiltz, V. Shoup, in: Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 2010, pp. 1--18.","mla":"Haralambiev, Kristiyan, et al. “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.” <i>Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>, 2010, pp. 1--18, doi:<a href=\"https://doi.org/10.1007/978-3-642-13013-7_1\">10.1007/978-3-642-13013-7_1</a>.","bibtex":"@inproceedings{Haralambiev_Jager_Kiltz_Shoup_2010, title={Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-13013-7_1\">10.1007/978-3-642-13013-7_1</a>}, booktitle={Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, author={Haralambiev, Kristiyan and Jager, Tibor and Kiltz, Eike and Shoup, Victor}, year={2010}, pages={1--18} }","ama":"Haralambiev K, Jager T, Kiltz E, Shoup V. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. In: <i>Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>. ; 2010:1--18. doi:<a href=\"https://doi.org/10.1007/978-3-642-13013-7_1\">10.1007/978-3-642-13013-7_1</a>","ieee":"K. Haralambiev, T. Jager, E. Kiltz, and V. Shoup, “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model,” in <i>Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>, 2010, pp. 1--18.","chicago":"Haralambiev, Kristiyan, Tibor Jager, Eike Kiltz, and Victor Shoup. “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.” In <i>Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>, 1--18, 2010. <a href=\"https://doi.org/10.1007/978-3-642-13013-7_1\">https://doi.org/10.1007/978-3-642-13013-7_1</a>."},"page":"1--18","year":"2010","user_id":"38235","department":[{"_id":"558"}],"_id":"3141","extern":"1","type":"conference","publication":"Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings","status":"public"},{"date_updated":"2022-01-06T06:58:58Z","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"}],"date_created":"2018-06-07T09:30:18Z","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","doi":"10.1007/978-3-642-10366-7_24","year":"2009","citation":{"apa":"Jager, T., &#38; Schwenk, J. (2009). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. In <i>Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i> (pp. 399--416). <a href=\"https://doi.org/10.1007/978-3-642-10366-7_24\">https://doi.org/10.1007/978-3-642-10366-7_24</a>","short":"T. Jager, J. Schwenk, in: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 2009, pp. 399--416.","bibtex":"@inproceedings{Jager_Schwenk_2009, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-10366-7_24\">10.1007/978-3-642-10366-7_24</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2009}, pages={399--416} }","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i>, 2009, pp. 399--416, doi:<a href=\"https://doi.org/10.1007/978-3-642-10366-7_24\">10.1007/978-3-642-10366-7_24</a>.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” In <i>Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i>, 399--416, 2009. <a href=\"https://doi.org/10.1007/978-3-642-10366-7_24\">https://doi.org/10.1007/978-3-642-10366-7_24</a>.","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” in <i>Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i>, 2009, pp. 399--416.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. In: <i>Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i>. ; 2009:399--416. doi:<a href=\"https://doi.org/10.1007/978-3-642-10366-7_24\">10.1007/978-3-642-10366-7_24</a>"},"page":"399--416","_id":"3142","user_id":"38235","department":[{"_id":"558"}],"extern":"1","type":"conference","publication":"Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings","status":"public"},{"title":"A Browser-Based Kerberos Authentication Scheme","doi":"10.1007/978-3-540-88313-5_8","date_updated":"2022-01-06T06:58:58Z","author":[{"full_name":"Gajek, Sebastian","last_name":"Gajek","first_name":"Sebastian"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"full_name":"Manulis, Mark","last_name":"Manulis","first_name":"Mark"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2018-06-07T09:30:48Z","year":"2008","page":"115--129","citation":{"chicago":"Gajek, Sebastian, Tibor Jager, Mark Manulis, and Jörg Schwenk. “A Browser-Based Kerberos Authentication Scheme.” In <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 115--129, 2008. <a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">https://doi.org/10.1007/978-3-540-88313-5_8</a>.","ieee":"S. Gajek, T. Jager, M. Manulis, and J. Schwenk, “A Browser-Based Kerberos Authentication Scheme,” in <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 2008, pp. 115--129.","ama":"Gajek S, Jager T, Manulis M, Schwenk J. A Browser-Based Kerberos Authentication Scheme. In: <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>. ; 2008:115--129. doi:<a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">10.1007/978-3-540-88313-5_8</a>","apa":"Gajek, S., Jager, T., Manulis, M., &#38; Schwenk, J. (2008). A Browser-Based Kerberos Authentication Scheme. In <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i> (pp. 115--129). <a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">https://doi.org/10.1007/978-3-540-88313-5_8</a>","short":"S. Gajek, T. Jager, M. Manulis, J. Schwenk, in: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 2008, pp. 115--129.","bibtex":"@inproceedings{Gajek_Jager_Manulis_Schwenk_2008, title={A Browser-Based Kerberos Authentication Scheme}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">10.1007/978-3-540-88313-5_8</a>}, booktitle={Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, author={Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg}, year={2008}, pages={115--129} }","mla":"Gajek, Sebastian, et al. “A Browser-Based Kerberos Authentication Scheme.” <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 2008, pp. 115--129, doi:<a href=\"https://doi.org/10.1007/978-3-540-88313-5_8\">10.1007/978-3-540-88313-5_8</a>."},"extern":"1","_id":"3143","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings","type":"conference"},{"status":"public","type":"conference","publication":"Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3144","citation":{"ama":"Altmann K, Jager T, Rupp A. On Black-Box Ring Extraction and Integer Factorization. In: <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>. ; 2008:437--448. doi:<a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">10.1007/978-3-540-70583-3_36</a>","ieee":"K. Altmann, T. Jager, and A. Rupp, “On Black-Box Ring Extraction and Integer Factorization,” in <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>, 2008, pp. 437--448.","chicago":"Altmann, Kristina, Tibor Jager, and Andy Rupp. “On Black-Box Ring Extraction and Integer Factorization.” In <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>, 437--448, 2008. <a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">https://doi.org/10.1007/978-3-540-70583-3_36</a>.","short":"K. Altmann, T. Jager, A. Rupp, in: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations, 2008, pp. 437--448.","bibtex":"@inproceedings{Altmann_Jager_Rupp_2008, title={On Black-Box Ring Extraction and Integer Factorization}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">10.1007/978-3-540-70583-3_36</a>}, booktitle={Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations}, author={Altmann, Kristina and Jager, Tibor and Rupp, Andy}, year={2008}, pages={437--448} }","mla":"Altmann, Kristina, et al. “On Black-Box Ring Extraction and Integer Factorization.” <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>, 2008, pp. 437--448, doi:<a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">10.1007/978-3-540-70583-3_36</a>.","apa":"Altmann, K., Jager, T., &#38; Rupp, A. (2008). On Black-Box Ring Extraction and Integer Factorization. In <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i> (pp. 437--448). <a href=\"https://doi.org/10.1007/978-3-540-70583-3_36\">https://doi.org/10.1007/978-3-540-70583-3_36</a>"},"page":"437--448","year":"2008","doi":"10.1007/978-3-540-70583-3_36","title":"On Black-Box Ring Extraction and Integer Factorization","author":[{"last_name":"Altmann","full_name":"Altmann, Kristina","first_name":"Kristina"},{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Andy","last_name":"Rupp","full_name":"Rupp, Andy"}],"date_created":"2018-06-07T09:32:07Z","date_updated":"2022-01-06T06:58:58Z"},{"publication":"Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings","type":"conference","status":"public","department":[{"_id":"558"}],"user_id":"38235","_id":"3145","extern":"1","page":"200--209","citation":{"apa":"Jager, T., &#38; Schwenk, J. (2008). On the Equivalence of Generic Group Models. In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i> (pp. 200--209). <a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">https://doi.org/10.1007/978-3-540-88733-1_14</a>","short":"T. Jager, J. Schwenk, in: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008, pp. 200--209.","bibtex":"@inproceedings{Jager_Schwenk_2008, title={On the Equivalence of Generic Group Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">10.1007/978-3-540-88733-1_14</a>}, booktitle={Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2008}, pages={200--209} }","mla":"Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209, doi:<a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">10.1007/978-3-540-88733-1_14</a>.","ieee":"T. Jager and J. Schwenk, “On the Equivalence of Generic Group Models,” in <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>, 200--209, 2008. <a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">https://doi.org/10.1007/978-3-540-88733-1_14</a>.","ama":"Jager T, Schwenk J. On the Equivalence of Generic Group Models. In: <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings</i>. ; 2008:200--209. doi:<a href=\"https://doi.org/10.1007/978-3-540-88733-1_14\">10.1007/978-3-540-88733-1_14</a>"},"year":"2008","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2018-06-07T09:32:53Z","date_updated":"2022-01-06T06:58:58Z","doi":"10.1007/978-3-540-88733-1_14","title":"On the Equivalence of Generic Group Models"},{"page":"127--136","citation":{"ama":"Jager T, Jäkel H, Schwenk J. Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. In: <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i> ; 2008:127--136.","chicago":"Jager, Tibor, Heiko Jäkel, and Jörg Schwenk. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” In <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>, 127--136, 2008.","ieee":"T. Jager, H. Jäkel, and J. Schwenk, “Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS,” in <i>Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.</i>, 2008, pp. 127--136.","bibtex":"@inproceedings{Jager_Jäkel_Schwenk_2008, title={Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS}, booktitle={Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.}, author={Jager, Tibor and Jäkel, Heiko and Schwenk, Jörg}, year={2008}, pages={127--136} }","mla":"Jager, Tibor, et al. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>, 2008, pp. 127--136.","short":"T. Jager, H. Jäkel, J. Schwenk, in: Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss., 2008, pp. 127--136.","apa":"Jager, T., Jäkel, H., &#38; Schwenk, J. (2008). Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. In <i>Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.</i> (pp. 127--136)."},"year":"2008","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Heiko","last_name":"Jäkel","full_name":"Jäkel, Heiko"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2018-06-07T09:33:24Z","date_updated":"2022-01-06T06:58:58Z","title":"Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS","publication":"Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.","type":"conference","status":"public","department":[{"_id":"558"}],"user_id":"38235","_id":"3146","extern":"1"}]
