21![Bachelor Thesis Analysis of Encrypted Databases with CryptDB Michael Skiba Date: Supervisor: Prof. Jörg Schwenk Advisor: Dr.-Ing. Christoph Bader Bachelor Thesis Analysis of Encrypted Databases with CryptDB Michael Skiba Date: Supervisor: Prof. Jörg Schwenk Advisor: Dr.-Ing. Christoph Bader](https://www.pdfsearch.io/img/4a87db3e93a48525b974b19d81ca891b.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2015-10-26 04:30:38
|
---|
22![Master Thesis Security Implications of DTD Attacks Against a Wide Range of XML Parsers Christopher Späth Date: Supervisor: Christian Mainka, Vladislav Mladenov, Jörg Schwenk Master Thesis Security Implications of DTD Attacks Against a Wide Range of XML Parsers Christopher Späth Date: Supervisor: Christian Mainka, Vladislav Mladenov, Jörg Schwenk](https://www.pdfsearch.io/img/cd44b2b1b836f07d9171e54f7bcb9e3f.jpg) | Add to Reading ListSource URL: nds.rub.deLanguage: English - Date: 2015-11-04 06:22:27
|
---|
23![Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk](https://www.pdfsearch.io/img/c8fe4f8fb80eee9b09cdf49133d5af78.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2016-04-20 11:46:50
|
---|
24![Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany](https://www.pdfsearch.io/img/c76e554458641247d88a6f423d87335a.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2012-08-16 02:39:46
|
---|
25![On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk](https://www.pdfsearch.io/img/a0cd7392a542191c59384d7e411b0c1a.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2015-08-21 05:45:15
|
---|
26![Practical Invalid Curve Attacks on TLS-ECDH ? Tibor Jager, J¨org Schwenk, and Juraj Somorovsky Horst G¨ortz Institute for IT Security, Ruhr University Bochum Abstract. Elliptic Curve Cryptography (ECC) is based on cycl Practical Invalid Curve Attacks on TLS-ECDH ? Tibor Jager, J¨org Schwenk, and Juraj Somorovsky Horst G¨ortz Institute for IT Security, Ruhr University Bochum Abstract. Elliptic Curve Cryptography (ECC) is based on cycl](https://www.pdfsearch.io/img/7552f5396e71caf0b4a0f1863638fc08.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2015-09-14 06:05:06
|
---|
27![Bachelorstudiengang Informatik/IT-Sicherheit Kryptographische Protokolle [KryptProt] Autoren: Jörg Schwenk Bachelorstudiengang Informatik/IT-Sicherheit Kryptographische Protokolle [KryptProt] Autoren: Jörg Schwenk](https://www.pdfsearch.io/img/734a980487a06a6bdaebb55fbcde4aa1.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: German - Date: 2015-12-13 10:24:18
|
---|
28![A New RSA-Based Signature Scheme ¨ ¨ Schwenk Sven Schage, Jorg ¨ A New RSA-Based Signature Scheme ¨ ¨ Schwenk Sven Schage, Jorg ¨](https://www.pdfsearch.io/img/ae4ed0746c1866eaeb46445e700b49ce.jpg) | Add to Reading ListSource URL: 2010.africacrypt.comLanguage: English - Date: 2010-05-24 11:31:52
|
---|
29![Botzilla: Detecting the “Phoning Home” of Malicious Software Konrad Rieck Guido Schwenk Botzilla: Detecting the “Phoning Home” of Malicious Software Konrad Rieck Guido Schwenk](https://www.pdfsearch.io/img/084bd0fc290e51efd94aeb4ce1bf378e.jpg) | Add to Reading ListSource URL: www-rsec.cs.uni-tuebingen.deLanguage: English - Date: 2010-03-31 08:31:13
|
---|
30![Owning Your Home Network: Router Security Revisited Marcus Niemietz J¨org Schwenk Owning Your Home Network: Router Security Revisited Marcus Niemietz J¨org Schwenk](https://www.pdfsearch.io/img/ebd2411796c2071a5bf961639c402029.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2015-06-14 20:11:37
|
---|