33 Publications

Mark all

[33]
2019 | Conference Paper | LibreCat-ID: 15908
Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[32]
2019 | Conference Paper | LibreCat-ID: 15910
Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., & Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn.
LibreCat
 
[31]
2019 | Conference Paper | LibreCat-ID: 15909
Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[30]
2018 | Conference Paper | LibreCat-ID: 15893
Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., & Rosler, P. (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). https://doi.org/10.1109/eurosp.2018.00031
LibreCat | DOI
 
[29]
2018 | Conference Paper | LibreCat-ID: 15906
Böck, H., Somorovsky, J., & Young, C. (2018). Return Of Bleichenbacher\textquoterights Oracle Threat (ROBOT). In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 817–849). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[28]
2018 | Conference Paper | LibreCat-ID: 15894
Detering, D., Somorovsky, J., Mainka, C., Mladenov, V., & Schwenk, J. (2018). On The (In-)Security Of JavaScript Object Signing And Encryption. In Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS. https://doi.org/10.1145/3150376.3150379
LibreCat | DOI
 
[27]
2018 | Conference Paper | LibreCat-ID: 15914
Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., & Schwenk, J. (2018). Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[26]
2018 | Conference Paper | LibreCat-ID: 15892
Albrecht, M. R., Massimo, J., Paterson, K. G., & Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243787
LibreCat | DOI | Download (ext.)
 
[25]
2018 | Conference Paper | LibreCat-ID: 15905
Poddebniak, D., Dresen, C., Müller, J., Ising, F., Schinzel, S., Friedberger, S., … Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 549–566). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[24]
2017 | Conference Paper | LibreCat-ID: 15895
Muller, J., Mladenov, V., Somorovsky, J., & Schwenk, J. (2017). SoK: Exploiting Network Printers. In 2017 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2017.47
LibreCat | DOI | Download (ext.)
 
[23]
2017 | Conference Paper | LibreCat-ID: 15912
Grothe, M., Niemann, T., Somorovsky, J., & Schwenk, J. (2017). Breaking and Fixing Gridcoin. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Vancouver, BC: {USENIX} Association.
LibreCat | Download (ext.)
 
[22]
2016 | Conference Paper | LibreCat-ID: 15913
Böck, H., Zauner, A., Devlin, S., Somorovsky, J., & Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[21]
2016 | Conference Paper | LibreCat-ID: 15907
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 689–706). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[20]
2016 | Conference Paper | LibreCat-ID: 15896
Somorovsky, J. (2016). Systematic Fuzzing and Testing of TLS Libraries. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16. https://doi.org/10.1145/2976749.2978411
LibreCat | DOI | Download (ext.)
 
[19]
2015 | Conference Paper | LibreCat-ID: 15898
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15. https://doi.org/10.1145/2810103.2813657
LibreCat | DOI | Download (ext.)
 
[18]
2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 
[17]
2015 | Conference Paper | LibreCat-ID: 15911
Kupser, D., Mainka, C., Schwenk, J., & Somorovsky, J. (2015). How to Break XML Encryption -- Automatically. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15). Washington, D.C.: {USENIX} Association.
LibreCat | Download (ext.)
 
[16]
2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat | DOI
 
[15]
2015 | Conference Paper | LibreCat-ID: 15900
Niemietz, M., Somorovsky, J., Mainka, C., & Schwenk, J. (2015). Not so Smart: On Smart TV Apps. In International Workshop on Secure Internet of Things (SIoT). https://doi.org/10.1109/siot.2015.13
LibreCat | DOI
 
[14]
2014 | Conference Paper | LibreCat-ID: 15904
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 733–748). San Diego, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[13]
2013 | Dissertation | LibreCat-ID: 15901
Somorovsky, J. (2013). On the insecurity of XML Security. https://doi.org/10.1515/itit-2014-1045
LibreCat | DOI
 
[12]
2013 | Conference Paper | LibreCat-ID: 15918
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat | Download (ext.)
 
[11]
2013 | Conference Paper | LibreCat-ID: 15902
Falkenberg, A., Mainka, C., Somorovsky, J., & Schwenk, J. (2013). A New Approach towards DoS Penetration Testing on Web Services. In 2013 IEEE 20th International Conference on Web Services. https://doi.org/10.1109/icws.2013.72
LibreCat | DOI
 
[10]
2013 | Journal Article | LibreCat-ID: 15903
Mainka, C., Mladenov, V., Somorovsky, J., & Schwenk, J. (2013). Penetration test tool for XML-based web services. CEUR Workshop Proceedings, 965, 31–35.
LibreCat
 
[9]
2012 | Conference Paper | LibreCat-ID: 15888
Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., & Jensen, M. (2012). On Breaking SAML: Be Whoever You Want to Be. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12) (pp. 397–412). Bellevue, WA: {USENIX}.
LibreCat | Download (ext.)
 
[8]
2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky, J., & Schwenk, J. (2012). Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption. In 2012 IEEE Eighth World Congress on Services. https://doi.org/10.1109/services.2012.6
LibreCat | DOI
 
[7]
2012 | Book Chapter | LibreCat-ID: 15891
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security – ESORICS 2012. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 
[6]
2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky, J., Meyer, C., Tran, T., Sbeiti, M., Schwenk, J., & Wietfeld, C. (2012). Sec2: Secure Mobile Solution for Distributed Public Cloud Storages.
LibreCat
 
[5]
2011 | Conference Paper | LibreCat-ID: 15887
Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019
LibreCat | DOI
 
[4]
2011 | Conference Paper | LibreCat-ID: 15915
Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756
LibreCat | DOI | Download (ext.)
 
[3]
2011 | Conference Paper | LibreCat-ID: 15916
Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.
LibreCat
 
[2]
2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664
LibreCat | DOI | Download (ext.)
 
[1]
2010 | Conference Paper | LibreCat-ID: 15889
Somorovsky, J., Jensen, M., & Schwenk, J. (2010). Streaming-Based Verification of XML Signatures in SOAP Messages. In 2010 6th World Congress on Services. https://doi.org/10.1109/services.2010.57
LibreCat | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed

33 Publications

Mark all

[33]
2019 | Conference Paper | LibreCat-ID: 15908
Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[32]
2019 | Conference Paper | LibreCat-ID: 15910
Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., & Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn.
LibreCat
 
[31]
2019 | Conference Paper | LibreCat-ID: 15909
Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[30]
2018 | Conference Paper | LibreCat-ID: 15893
Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., & Rosler, P. (2018). Attacking Deterministic Signature Schemes Using Fault Attacks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). https://doi.org/10.1109/eurosp.2018.00031
LibreCat | DOI
 
[29]
2018 | Conference Paper | LibreCat-ID: 15906
Böck, H., Somorovsky, J., & Young, C. (2018). Return Of Bleichenbacher\textquoterights Oracle Threat (ROBOT). In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 817–849). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[28]
2018 | Conference Paper | LibreCat-ID: 15894
Detering, D., Somorovsky, J., Mainka, C., Mladenov, V., & Schwenk, J. (2018). On The (In-)Security Of JavaScript Object Signing And Encryption. In Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS. https://doi.org/10.1145/3150376.3150379
LibreCat | DOI
 
[27]
2018 | Conference Paper | LibreCat-ID: 15914
Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., & Schwenk, J. (2018). Security Analysis of eIDAS -- The Cross-Country Authentication Scheme in Europe. In 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[26]
2018 | Conference Paper | LibreCat-ID: 15892
Albrecht, M. R., Massimo, J., Paterson, K. G., & Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243787
LibreCat | DOI | Download (ext.)
 
[25]
2018 | Conference Paper | LibreCat-ID: 15905
Poddebniak, D., Dresen, C., Müller, J., Ising, F., Schinzel, S., Friedberger, S., … Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 549–566). Baltimore, MD: {USENIX} Association.
LibreCat | Download (ext.)
 
[24]
2017 | Conference Paper | LibreCat-ID: 15895
Muller, J., Mladenov, V., Somorovsky, J., & Schwenk, J. (2017). SoK: Exploiting Network Printers. In 2017 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2017.47
LibreCat | DOI | Download (ext.)
 
[23]
2017 | Conference Paper | LibreCat-ID: 15912
Grothe, M., Niemann, T., Somorovsky, J., & Schwenk, J. (2017). Breaking and Fixing Gridcoin. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Vancouver, BC: {USENIX} Association.
LibreCat | Download (ext.)
 
[22]
2016 | Conference Paper | LibreCat-ID: 15913
Böck, H., Zauner, A., Devlin, S., Somorovsky, J., & Jovanovic, P. (2016). Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[21]
2016 | Conference Paper | LibreCat-ID: 15907
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., … Shavitt, Y. (2016). DROWN: Breaking TLS Using SSLv2. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 689–706). Austin, TX: {USENIX} Association.
LibreCat | Download (ext.)
 
[20]
2016 | Conference Paper | LibreCat-ID: 15896
Somorovsky, J. (2016). Systematic Fuzzing and Testing of TLS Libraries. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16. https://doi.org/10.1145/2976749.2978411
LibreCat | DOI | Download (ext.)
 
[19]
2015 | Conference Paper | LibreCat-ID: 15898
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15. https://doi.org/10.1145/2810103.2813657
LibreCat | DOI | Download (ext.)
 
[18]
2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 
[17]
2015 | Conference Paper | LibreCat-ID: 15911
Kupser, D., Mainka, C., Schwenk, J., & Somorovsky, J. (2015). How to Break XML Encryption -- Automatically. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15). Washington, D.C.: {USENIX} Association.
LibreCat | Download (ext.)
 
[16]
2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat | DOI
 
[15]
2015 | Conference Paper | LibreCat-ID: 15900
Niemietz, M., Somorovsky, J., Mainka, C., & Schwenk, J. (2015). Not so Smart: On Smart TV Apps. In International Workshop on Secure Internet of Things (SIoT). https://doi.org/10.1109/siot.2015.13
LibreCat | DOI
 
[14]
2014 | Conference Paper | LibreCat-ID: 15904
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In 23rd {USENIX} Security Symposium ({USENIX} Security 14) (pp. 733–748). San Diego, CA: {USENIX} Association.
LibreCat | Download (ext.)
 
[13]
2013 | Dissertation | LibreCat-ID: 15901
Somorovsky, J. (2013). On the insecurity of XML Security. https://doi.org/10.1515/itit-2014-1045
LibreCat | DOI
 
[12]
2013 | Conference Paper | LibreCat-ID: 15918
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat | Download (ext.)
 
[11]
2013 | Conference Paper | LibreCat-ID: 15902
Falkenberg, A., Mainka, C., Somorovsky, J., & Schwenk, J. (2013). A New Approach towards DoS Penetration Testing on Web Services. In 2013 IEEE 20th International Conference on Web Services. https://doi.org/10.1109/icws.2013.72
LibreCat | DOI
 
[10]
2013 | Journal Article | LibreCat-ID: 15903
Mainka, C., Mladenov, V., Somorovsky, J., & Schwenk, J. (2013). Penetration test tool for XML-based web services. CEUR Workshop Proceedings, 965, 31–35.
LibreCat
 
[9]
2012 | Conference Paper | LibreCat-ID: 15888
Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., & Jensen, M. (2012). On Breaking SAML: Be Whoever You Want to Be. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12) (pp. 397–412). Bellevue, WA: {USENIX}.
LibreCat | Download (ext.)
 
[8]
2012 | Conference Paper | LibreCat-ID: 15890
Somorovsky, J., & Schwenk, J. (2012). Technical Analysis of Countermeasures against Attack on XML Encryption -- or -- Just Another Motivation for Authenticated Encryption. In 2012 IEEE Eighth World Congress on Services. https://doi.org/10.1109/services.2012.6
LibreCat | DOI
 
[7]
2012 | Book Chapter | LibreCat-ID: 15891
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security – ESORICS 2012. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 
[6]
2012 | Conference Paper | LibreCat-ID: 15917
Somorovsky, J., Meyer, C., Tran, T., Sbeiti, M., Schwenk, J., & Wietfeld, C. (2012). Sec2: Secure Mobile Solution for Distributed Public Cloud Storages.
LibreCat
 
[5]
2011 | Conference Paper | LibreCat-ID: 15887
Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J. (2011). On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks. In 2011 1st International Workshop on Securing Services on the Cloud (IWSSC). https://doi.org/10.1109/iwsscloud.2011.6049019
LibreCat | DOI
 
[4]
2011 | Conference Paper | LibreCat-ID: 15915
Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756
LibreCat | DOI | Download (ext.)
 
[3]
2011 | Conference Paper | LibreCat-ID: 15916
Meyer, C., Somorovsky, J., Driessen, B., Schwenk, J., Tran, T., & Wietfeld, C. (2011). Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage.
LibreCat
 
[2]
2011 | Conference Paper | LibreCat-ID: 15885
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664
LibreCat | DOI | Download (ext.)
 
[1]
2010 | Conference Paper | LibreCat-ID: 15889
Somorovsky, J., Jensen, M., & Schwenk, J. (2010). Streaming-Based Verification of XML Signatures in SOAP Messages. In 2010 6th World Congress on Services. https://doi.org/10.1109/services.2010.57
LibreCat | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed