Veröffentlichungen

Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol

2014 - Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila

ACM Conference on Computer and Communications Security - Best Student Paper Award - [Webseite]

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten

2010 - Ahmad-Reza Sadeghi, Thomas Schneider

Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (PerspeGKtive'10), September 8, Mannheim, Germany.

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

2010 - Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

In Towards Hardware-Intrinsic Security: Foundations and Practice, Information Security and Cryptography, Springer-Verlag, September 2010.

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design

2010 - Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

Cryptology ePrint Archive: Report 2010/079 [PDF]

Em­bed­ded SFE: Off­loa­ding Ser­ver and Net­work using Hard­ware To­kens

2010 - Kimmo Jär­vi­nen, Vla­di­mir Ko­les­ni­kov, Ahmad-Reza Sadeghi, Thomas Schneider

14th In­ter­na­tio­nal Con­fe­rence on Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty (FC'10), Ja­nu­a­ry 25-28, Te­ne­ri­fe, Cana­ry Is­lands, Spain. [PDF]

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications

2005 - Jörg Schwenk, Lijun Liao, Lars Ewers, Wolfgang Kubbilun

In CMS 2005: Proceedings of the 9th IFIP International Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, volume 3677, pages 291-300, Springer, 2005. [Springer] [PDF] [Bibtex]
Seite: