Jörg Schwenk
Jörg Schwenk
Professor für Netz- und Datensicherheit, Ruhr-Universität Bochum
Verified email at rub.de
Cited by
Cited by
On technical security issues in cloud computing
M Jensen, J Schwenk, N Gruschka, LL Iacono
2009 IEEE International Conference on Cloud Computing, 109-116, 2009
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Annual Cryptology Conference, 273-293, 2012
All your clouds are belong to us: security analysis of cloud management interfaces
J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ...
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011
Moderne Verfahren der Kryptographie
A Beutelspacher, J Schwenk, KD Wolfenstetter
Vieweg+ Teubner, 2006
Method for securing system protected by a key hierarchy
J Schwenk
US Patent 6,222,923, 2001
On breaking {SAML}: Be whoever you want to be
J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Scriptless attacks: stealing the pie without touching the sill
M Heiderich, M Niemietz, F Schuster, T Holz, J Schwenk
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Combining digital watermarks and collusion-secure fingerprints for digital images
J Dittmann, A Behr, M Stabenau, P Schmitt, J Schwenk, J Ueberberg
Security and Watermarking of Multimedia Contents 3657, 171-182, 1999
Combining digital watermarks and collusion secure fingerprints for digital images
J Dittmann, P Schmitt, E Saar, J Schwenk, J Ueberberg
Journal of Electronic Imaging 9 (4), 456-468, 2000
Sicherheit und Kryptographie im Internet
J Schwenk
Vieweg+ Teubner Verlag, 2005
Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd {USENIX} Security Symposium ({USENIX} Security 14), 733-748, 2014
Universally composable security analysis of TLS
S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk
International Conference on Provable Security, 313-327, 2008
Analysis of signature wrapping attacks and countermeasures
S Gajek, M Jensen, L Liao, J Schwenk
2009 IEEE International Conference on Web Services, 575-582, 2009
How secure is TextSecure?
T Frosch, C Mainka, C Bader, F Bergsma, J Schwenk, T Holz
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 457-472, 2016
Lessons Learned From Previous SSL/TLS Attacks-A Brief Chronology Of Attacks And Weaknesses.
C Meyer, J Schwenk
IACR Cryptol. ePrint Arch. 2013, 49, 2013
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption
T Jager, J Schwenk, J Somorovsky
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
2011 IEEE 4th international conference on cloud computing, 565-572, 2011
Penetration testing tool for web services security
C Mainka, J Somorovsky, J Schwenk
2012 IEEE Eighth World Congress on Services, 163-170, 2012
Breaking and fixing the inline approach
S Gajek, L Liao, J Schwenk
Proceedings of the 2007 ACM workshop on Secure web services, 37-43, 2007
Visual spoofing of SSL protected web sites and effective countermeasures
A Adelsbach, S Gajek, J Schwenk
International Conference on Information Security Practice and Experience …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20