-
2
-
-
57049116609
-
-
Allen, C, Dierks, T, The TLS protocol -version 1.1. Internet proposed standard RFC 4346 2006
-
Allen, C., Dierks, T.: The TLS protocol -version 1.1. Internet proposed standard RFC 4346 (2006)
-
-
-
-
3
-
-
57049152390
-
-
Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.-K.: Oryptographically sound security proofs for basic and public-key kerberos (2006)
-
(2006)
Oryptographically sound security proofs for basic and public-key kerberos
-
-
Backes, M.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
Tsay, J.-K.5
-
4
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
5
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
ACM Press, New York
-
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Conference on Computer and Communications Security, pp. 62-73. ACM Press, New York (1993)
-
(1993)
Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols. In: FOCS
-
Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS. pp. 136-145. IEEE Computer Society. Los Alamitos (2001)
-
(2001)
IEEE Computer Society
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
33745816410
-
-
Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHl, pp. 581-590. ACM Press, New York (2006)
-
Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHl, pp. 581-590. ACM Press, New York (2006)
-
-
-
-
9
-
-
57049113251
-
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.-R., Schwenk, J.: Universally composable security analysis of tls - secure sessions with handshake and record layer protocols. Cryptology ePrint Archive, Report 2008/251 (2008)
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.-R., Schwenk, J.: Universally composable security analysis of tls - secure sessions with handshake and record layer protocols. Cryptology ePrint Archive, Report 2008/251 (2008)
-
-
-
-
10
-
-
77952417644
-
-
Gajek, S., Manulis, M., Sadeghi, A.-R., Schwenk, J.: Provably secure browser-based user-aware mutual authentication over tls. In: ASIACCS, pp. 300-311. ACM Press, New York (2008)
-
Gajek, S., Manulis, M., Sadeghi, A.-R., Schwenk, J.: Provably secure browser-based user-aware mutual authentication over tls. In: ASIACCS, pp. 300-311. ACM Press, New York (2008)
-
-
-
-
11
-
-
56949108849
-
-
Gajek, S., Schwenk, J., Xuan, C.: On the insecurity of microsoft's identity metasystem cardspace (HGI TR-2008-004) (2008)
-
Gajek, S., Schwenk, J., Xuan, C.: On the insecurity of microsoft's identity metasystem cardspace (HGI TR-2008-004) (2008)
-
-
-
-
12
-
-
84944734046
-
Security analysis of the SAML single sign-on browser/artifact profile
-
IEEE Computer Society, Los Alamitos
-
Groß, T.: Security analysis of the SAML single sign-on browser/artifact profile. In: Annual Computer Security Applications Conference. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
Annual Computer Security Applications Conference
-
-
Groß, T.1
-
13
-
-
57049128801
-
-
Groß, T., Pfitzmann, B.: Sami artifact information flow revisited. Research Report RZ 3643 (99653), IBM Research (2006)
-
Groß, T., Pfitzmann, B.: Sami artifact information flow revisited. Research Report RZ 3643 (99653), IBM Research (2006)
-
-
-
-
14
-
-
57049186670
-
Security proofs for the RSA-PSS signature scheme and its variants. Cryptology ePrint Archive
-
Report 2001/053
-
Jonsson, J.: Security proofs for the RSA-PSS signature scheme and its variants. Cryptology ePrint Archive. Report 2001/053 (2001)
-
(2001)
-
-
Jonsson, J.1
-
15
-
-
77952370957
-
-
Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58-71. ACM, New York (2007)
-
Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58-71. ACM, New York (2007)
-
-
-
-
16
-
-
33751032654
-
-
Kirda, E., Krügel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution for mitigating cross-site scripting attacks, pp. 330-337 (2006)
-
(2006)
Noxes: A client-side solution for mitigating cross-site scripting attacks
, pp. 330-337
-
-
Kirda, E.1
Krügel, C.2
Vigna, G.3
Jovanovic, N.4
-
17
-
-
0033719386
-
Risks of the Passport single sign-on protocol
-
Kormann, D., Rubin, A.: Risks of the Passport single sign-on protocol. Computer Networks 33(1-6), 51-58 (2000)
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 51-58
-
-
Kormann, D.1
Rubin, A.2
-
18
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
19
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: IEEE Symposium on Security and Privacy, pp. 184-200 (2001)
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
20
-
-
1142301938
-
Analysis of liberty single-signon with enabled clients
-
Pfitzmann, B., Waidner, M.: Analysis of liberty single-signon with enabled clients. IEEE Internet Computing 7(6), 38-44 (2003)
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 38-44
-
-
Pfitzmann, B.1
Waidner, M.2
-
21
-
-
1642489925
-
OAEP reconsidered
-
Shoup, V.: OAEP reconsidered, J. Cryptology 15(4), 223-249 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
-
22
-
-
38149086751
-
-
Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-by pharming, pp. 495-506 (2007)
-
(2007)
Drive-by pharming
, pp. 495-506
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
23
-
-
34548786769
-
The emperor's new security indicators
-
IEEE Computer Society, Los Alamitos
-
Stuart Schechter, A.O., Dhamija, R., Fischer, I.: The emperor's new security indicators. In: Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Symposium on Security and Privacy
-
-
Stuart Schechter, A.O.1
Dhamija, R.2
Fischer, I.3
|