On the insecurity of XML Security

J. Somorovsky, On the Insecurity of XML Security, 2013.

Download
No fulltext has been uploaded.
Dissertation | Published | English
Abstract
XML Encryption and XML Signature describe how to apply encryption and signing algorithms to XML documents. These specifications are implemented in a wide range of systems and frameworks processing sensitive data, including banking, eGovernment, eCommerce, military, and eHealth infrastructures. The article presents practical and highly critical attacks which allow to forge signed XML documents or reveal contents of encrypted XML data.
Publishing Year
LibreCat-ID

Cite this

Somorovsky J. On the Insecurity of XML Security.; 2013. doi:10.1515/itit-2014-1045
Somorovsky, J. (2013). On the insecurity of XML Security. https://doi.org/10.1515/itit-2014-1045
@book{Somorovsky_2013, title={On the insecurity of XML Security}, DOI={10.1515/itit-2014-1045}, author={Somorovsky, Juraj}, year={2013} }
Somorovsky, Juraj. On the Insecurity of XML Security, 2013. https://doi.org/10.1515/itit-2014-1045.
J. Somorovsky, On the insecurity of XML Security. 2013.
Somorovsky, Juraj. On the Insecurity of XML Security. 2013, doi:10.1515/itit-2014-1045.

Export

Marked Publications

Open Data LibreCat

Search this title in

Google Scholar