Veröffentlichungen

  1. T. Jager, K.G. Paterson, J. So­mo­rovs­ky
    One Bad Apple: Back­wards Com­pa­ti­bi­li­ty At­tacks on Sta­te-of-the-Art Cryp­to­gra­phy
    In Pro­cee­dings of the Net­work and Di­stri­bu­ted Sys­tem Se­cu­ri­ty Sym­po­si­um (NDSS), 2013. (Link)
  2. J. So­mo­rovs­ky, A. Mayer, J. Schwenk, M. Kampmann, M. Jensen
    On Brea­king SAML: Be Whoever You Want to Be
    In Pro­cee­dings of the 21st USE­NIX Se­cu­ri­ty Sym­po­si­um, 2012. (Link)
  3. T. Jager, S. Schin­zel, J. So­mo­rovs­ky
    Blei­chen­ba­cher’s At­tack Strikes Again: Brea­king PKCS#1 v1.5 in XML En­cryp­ti­on
    In Pro­cee­dings of the 17th Eu­ropean Sym­po­si­um on Re­se­arch in Com­pu­ter Se­cu­ri­ty (ESO­RICS), 2012 (Link)
  4. J. So­mo­rovs­ky, J. Schwenk
    Tech­ni­cal Ana­ly­sis of Coun­ter­me­a­su­res against At­tack on XML En­cryp­ti­on - or - Just Ano­ther Mo­ti­va­ti­on for Au­then­ti­ca­ted En­cryp­ti­on
    In Pro­cee­dings of the SER­VICES Work­shop on Se­cu­ri­ty and Pri­va­cy En­gi­nee­ring, 2012. (Link)
  5. T. Tran, M. Kuhnert, C. Wietfeld
    Energy-efficient Handoff Decision Algorithms for CSH-MU Mobility Solution
    21st IEEE International Conference on Computer Communication Networks (ICCCN), 2nd International Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services, IEEE, Munich, Germany, July 2012.
  6. T. Tran, M. Kuhnert, C. Wietfeld
    Seamless Context-aware Voice Service in the Cloud for Heterogeneous Network Environment
    21st IEEE International Conference on Computer Communication Networks (ICCCN), 2nd International Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services, IEEE, Munich, Germany, July 2012.
  7. T. Tran, M. Kuhnert, C. Wietfeld
    Performance Evaluation of Feasible and Holistic CSH-MU Handoff Solution for Seamless Emergency Service Provisioning
    17th IEEE Symposium on Computers and Communications (ISCC), IEEE, Cappadocia, Turkey, July 2012.
  8. J. So­mo­rovs­ky, C. Meyer, T. Tran, M. Sbei­ti, J. Schwenk, C. Wiet­feld
    Sec²: Se­cu­re Mo­bi­le So­lu­ti­on for Di­stri­bu­ted Pu­blic Cloud Sto­ra­ges
    The 2nd In­ter­na­tio­nal Con­fe­rence on Cloud Com­pu­ting and Ser­vices Sci­ence (CLO­SER), 2012. (Link)
  9. T. Jager, J. Somorovsky
    How To Break XML Encryption
    The 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Chicago, USA, October 2011.
  10. T. Tran, C. Wietfeld
    Cost-Effective and Feasible VOOH Solution for Seamless Service Roaming
    IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB), IEEE, Shanghai, China, October 2011.
  11. M. Jensen, C. Meyer, J. Somorovsky, J. Schwenk
    On the Effec­tiven­ess of XML Sche­ma Va­li­da­ti­on for Coun­tering XML Signa­tu­re Wrap­ping At­tacks
    IWSSC 2011: First In­ter­na­tio­nal Work­shop on Se­cu­ring Ser­vices on the Cloud, Milan, Italy, September 2011.
  12. C. Meyer, J. Somorovsky, B. Driessen, J. Schwenk, T. Tran, C. Wietfeld
    Sec²: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
    Proceedings of the DACH Security 2011 (Ed.: Peter Schartner, J. Taeger) , syssec Verlag, Vol. 9, September 2011. (PDF)
  13. M. Jen­sen, C. Meyer
    Ex­pres­siven­ess Con­s­i­de­ra­ti­ons of XML Si­gna­tu­res
    Pro­cee­dings of the 3rd IEEE In­ter­na­tio­nal Work­shop on Se­cu­ri­ty As­pects of Pro­cess and Ser­vices En­gi­nee­ring (SAPSE), München, Juli 2011.
  14. T. Tran, F.Z. Yousaf, C. Wietfeld
    Performance Evaluation of enhanced CSH-MU Solution in a Heterogeneous Network Environment
    IEEE Symposium on Computers and Communications (ISCC), IEEE, Kerkyra (Corfu), Greece, June 2011.

Fachvorträge:

  1. J. Somorovsky
    How To Break XML Signature and XML Encryption
    German OWASP Day 2011, München, November 2011.
  2. T. Tran
    Sichere mobile Kommunikation im Katastrophenmanagement
    Competence Center for Applied Security Technology (CAST) Workshop "Mobile Security", Darmstadt, August 2011.
  3. T. Tran
    Effiziente Client-basierte Handover-Verfahren zur Steigerung der Verfügbarkeit von Cloud-Diensten
    ITG 5.2.1 Workshop „Energy Efficient Communication, Cloud Computing and Virtualisation“, Flensburg, Mai 2011.
BMBF DLR utimaco adesso NDS CNI EMSEC Giesecke & Devrient Secure Flash Solutions