IBM / ACM Press / Intel / Microsoft / ASP.NET / the AES / W3C XML Encryption Working Group / /
Country
United States / /
Currency
pence / USD / ETB / / /
Facility
Data Security Ruhr-University Bochum Horst Görtz Institute / Apache Rampart / Break XML Encryption Tibor Jager Juraj Somorovsky Horst Görtz Institute / /
IndustryTerm
simplified algorithms / security processing / realistic Web Service / Web Services Framework In / healthcare applications / decryption algorithm / cryptographic algorithm / healthcare / Web Service / real world Web Service framework / data processing / financial services / business communications / Web Services client / message processing / server applications / e - commerce / even other systems / inversion algorithm / real-world systems / Web Service endpoint / encryption algorithm / governmental and military applications / open source Web Services / Web Services / /
OperatingSystem
Linux / Ubuntu / /
Organization
Break XML Encryption Tibor Jager Juraj Somorovsky Horst Görtz Institute for IT Security / Data Security Ruhr-University Bochum Horst Görtz Institute for IT Security / German Federal Ministry of Education / European Commission / /
Person
Sebastian Schinzel / Robert A. van Engelen / Thorsten Holz / Stefan Wigchers / John Smith / Schwenk / Juraj Somorovsky Horst / /
Position
Code breaking General / Chair / /
Product
Apache Axis2 / OAxis / Web Service / /
ProgrammingLanguage
ASP.NET / Ruby on Rails / Java / XML Schema / XML / /
ProvinceOrState
Illinois / /
PublishedMedium
Lecture Notes in Computer Science / /
Technology
Data Security Ruhr-University Bochum tibor.jager@rub.de juraj.somorovsky@rub.de ABSTRACT XML Encryption / inversion algorithm / XML / XML processor / valid encryption / 2.1 Block Ciphers The XML Encryption / Linux / encryption algorithm / block cipher / data encryption / padding algorithm / eXtensible Markup Language / The algorithm / SSL / cryptographic algorithm / Encryption / Cryptography / public key / ATTACKING XML ENCRYPTION / Java / XML Encryption / ASCII / 4.2 Character Encondings The XML Encryption / optimized algorithms / decryption algorithm / digital signature / /