The Accountability Problem of Flooding Attacks in Service-Oriented Architectures

2009 - Jörg Schwenk, Meiko Jensen,

Proceedings of the IEEE International Conference on Availability, Reliability, and Security (ARES)

The Curse of Namespaces in the Domain of XML Signature

2009 - Jörg Schwenk, Lijun Liao, Meiko Jensen,

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Using Compilers to Enhance Cryptographic Product Development

2009 - Ahmad-Reza Sadeghi, E. Bangerter, M. Barbosa, D. Bernstein, I. Damgård, D. Page, J. I. Pagter, S. Sovio

Accepted for Information Security Solutions Europe (ISSE) 2009

Modeling and Simulation of Industrial Plasmas

2008 - Torben Hemke, A. Steinbach, P. Kuecher, Ralf Peter Brinkmann

Fraunhofer-Center Nanoelektronische Technologien (PhD Review), Dresden, Germany, 17 December, oral contribution

Towards Next-Generation Botnets

2008 - Ralf Hund, Matthias Hamann, Thorsten Holz

European Conference on Computer Network Defense (EC2ND), Dublin, Ireland, December 2008 [PDF]

A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk


On the equivalence of generic group models

2008 - Tibor Jager, Jörg Schwenk

ProvSec 2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

2008 - Andy Rupp, G. Leander, E. Bangerter, A. Dent, Ahmad-Reza Sadeghi

In 14th International Conference on the Theory and Application of Cryptology and Information Security —- ASIACRYPT 2008 (to appear). Melbourne, Australia, Dezember 7-11, 2008.

Virtual System Prototyping Approach for LTE and Beyond Mobile Devices

2008 - David Szczesny, Anas Showk, Sebastian Hessel, V. Frascolla, J. Brock, Attila Bilgic

Easy-C Public Workshop, Dresden, Germany, 5. Dez. 2008

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.

2008 - Ahmad-Reza Sadeghi, Thomas Schneider,

11th International Conference on Information Security and Cryptology (ICISC'08), December 3-5, Seoul, South Korea. [pdf]