JorgSchwenk,“ M Jensen, C Meyer, J Somorovsky On the Effectiveness of XML Schema Validation for Countering XML Signature …, 2011 | 187* | 2011 |
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews 23rd USENIX Security Symposium (USENIX Security 14), 17, 2014 | 130 | 2014 |
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses C Meyer, J Schwenk Cryptology ePrint Archive,, 2013 | 89 | 2013 |
Sok: Lessons learned from ssl/tls attacks C Meyer, J Schwenk International Workshop on Information Security Applications, 189-209, 2013 | 78 | 2013 |
Randomly failed! The state of randomness in current Java implementations K Michaelis, C Meyer, J Schwenk Cryptographers’ Track at the RSA Conference, 129-144, 2013 | 65 | 2013 |
On the effectiveness of xml schema validation for countering xml signature wrapping attacks M Jensen, C Meyer, J Somorovsky, J Schwenk Securing Services on the Cloud (IWSSC), 2011 1st International Workshop on, 7-13, 2011 | 47 | 2011 |
Years of SSL/TLS Research—An Analysis of the Internet’s Security Foundation C Meyer PhD thesis, Ruhr-University Bochum, 2014 | 21 | 2014 |
SeC2: Secure Mobile Solution for Distributed Public Cloud Storages. J Somorovsky, C Meyer, T Tran, M Sbeiti, J Schwenk, C Wietfeld CLOSER, 555-561, 2012 | 13 | 2012 |
Expressiveness Considerations of XML Signatures M Jensen, C Meyer Computer Software and Applications Conference Workshops (COMPSACW), 2011 …, 2011 | 12 | 2011 |
Persistent Encryption with XML Encryption J Schwenk, C Meyer, J Somorovsky, M Jensen US Patent App. 13/563,817, 2012 | 2 | 2012 |
Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage C Meyer, J Somorovsky, B Driessen, J Schwenk, T Tran, C Wietfeld | 2 | 2011 |
Sicherer Schl ussel-und Informationsaustausch mit SAML D Felsch, T Schreiber, C Meyer, F Feldmann, J Schwenk | 1 | |
Strengthening Web Authentication through TLS-Beyond TLS Client Certificates A Mayer, V Mladenov, J Schwenk, F Feldmann, C Meyer Open Identity Summit 2014, 2014 | | 2014 |
SoK: Lessons Learned from SSL C Meyer, J Schwenk TLS Attacks, Revised Selected Papers of the 14th International Workshop on …, 2013 | | 2013 |
SoK: Lessons Learned From SSL/TLS Attacks C Meyer, J Schwenk The 14th International Workshop on Information Security Applications (WISA2013), 2013 | | 2013 |
Sicherer Schlüssel- und Informationsaustausch mit SAML D Felsch, T Schreiber, C Meyer, F Feldmann, J Schwenk DACH Security 2013, 2013 | | 2013 |
Sometimes It’s Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys C Meyer, F Feldmann, J Schwenk International Conference on Information Security and Cryptology, 110-125, 2012 | | 2012 |