Schwenk

Results: 95



#Item
21Bachelor Thesis Analysis of Encrypted Databases with CryptDB Michael Skiba Date: Supervisor: Prof. Jörg Schwenk Advisor: Dr.-Ing. Christoph Bader

Bachelor Thesis Analysis of Encrypted Databases with CryptDB Michael Skiba Date: Supervisor: Prof. Jörg Schwenk Advisor: Dr.-Ing. Christoph Bader

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-10-26 04:30:38
    22Master Thesis Security Implications of DTD Attacks Against a Wide Range of XML Parsers Christopher Späth Date: Supervisor: Christian Mainka, Vladislav Mladenov, Jörg Schwenk

    Master Thesis Security Implications of DTD Attacks Against a Wide Range of XML Parsers Christopher Späth Date: Supervisor: Christian Mainka, Vladislav Mladenov, Jörg Schwenk

    Add to Reading List

    Source URL: nds.rub.de

    Language: English - Date: 2015-11-04 06:22:27
      23Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov  Jörg Schwenk

      Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2016-04-20 11:46:50
      24Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

      Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2012-08-16 02:39:46
      25On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

      On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2015-08-21 05:45:15
      26Practical Invalid Curve Attacks on TLS-ECDH ? Tibor Jager, J¨org Schwenk, and Juraj Somorovsky Horst G¨ortz Institute for IT Security, Ruhr University Bochum Abstract. Elliptic Curve Cryptography (ECC) is based on cycl

      Practical Invalid Curve Attacks on TLS-ECDH ? Tibor Jager, J¨org Schwenk, and Juraj Somorovsky Horst G¨ortz Institute for IT Security, Ruhr University Bochum Abstract. Elliptic Curve Cryptography (ECC) is based on cycl

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2015-09-14 06:05:06
        27Bachelorstudiengang Informatik/IT-Sicherheit  Kryptographische Protokolle [KryptProt] Autoren: Jörg Schwenk

        Bachelorstudiengang Informatik/IT-Sicherheit Kryptographische Protokolle [KryptProt] Autoren: Jörg Schwenk

        Add to Reading List

        Source URL: www.nds.rub.de

        Language: German - Date: 2015-12-13 10:24:18
          28A New RSA-Based Signature Scheme ¨ ¨ Schwenk Sven Schage, Jorg ¨

          A New RSA-Based Signature Scheme ¨ ¨ Schwenk Sven Schage, Jorg ¨

          Add to Reading List

          Source URL: 2010.africacrypt.com

          Language: English - Date: 2010-05-24 11:31:52
            29Botzilla: Detecting the “Phoning Home” of Malicious Software Konrad Rieck Guido Schwenk

            Botzilla: Detecting the “Phoning Home” of Malicious Software Konrad Rieck Guido Schwenk

            Add to Reading List

            Source URL: www-rsec.cs.uni-tuebingen.de

            Language: English - Date: 2010-03-31 08:31:13
              30Owning Your Home Network: Router Security Revisited Marcus Niemietz J¨org Schwenk

              Owning Your Home Network: Router Security Revisited Marcus Niemietz J¨org Schwenk

              Add to Reading List

              Source URL: arxiv.org

              Language: English - Date: 2015-06-14 20:11:37