Folgen
Christopher Meyer
Christopher Meyer
Reserach Assistant, Horst Görtz Institute for IT-Security, Ruhr-University Bochum
Bestätigte E-Mail-Adresse bei rub.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
JorgSchwenk,“
M Jensen, C Meyer, J Somorovsky
On the Effectiveness of XML Schema Validation for Countering XML Signature …, 2011
184*2011
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks
C Meyer, J Somorovsky, E Weiss, J Schwenk, S Schinzel, E Tews
23rd USENIX Security Symposium (USENIX Security 14), 17, 2014
1252014
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
C Meyer, J Schwenk
Cryptology ePrint Archive,, 2013
892013
Sok: Lessons learned from ssl/tls attacks
C Meyer, J Schwenk
International Workshop on Information Security Applications, 189-209, 2013
752013
Randomly failed! The state of randomness in current Java implementations
K Michaelis, C Meyer, J Schwenk
Cryptographers’ Track at the RSA Conference, 129-144, 2013
642013
On the effectiveness of xml schema validation for countering xml signature wrapping attacks
M Jensen, C Meyer, J Somorovsky, J Schwenk
Securing Services on the Cloud (IWSSC), 2011 1st International Workshop on, 7-13, 2011
462011
Years of SSL/TLS Research—An Analysis of the Internet’s Security Foundation
C Meyer
PhD thesis, Ruhr-University Bochum, 2014
202014
SeC2: Secure Mobile Solution for Distributed Public Cloud Storages.
J Somorovsky, C Meyer, T Tran, M Sbeiti, J Schwenk, C Wietfeld
CLOSER, 555-561, 2012
132012
Expressiveness Considerations of XML Signatures
M Jensen, C Meyer
Computer Software and Applications Conference Workshops (COMPSACW), 2011 …, 2011
122011
Persistent Encryption with XML Encryption
J Schwenk, C Meyer, J Somorovsky, M Jensen
US Patent App. 13/563,817, 2012
22012
Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
C Meyer, J Somorovsky, B Driessen, J Schwenk, T Tran, C Wietfeld
22011
Sicherer Schl ussel-und Informationsaustausch mit SAML
D Felsch, T Schreiber, C Meyer, F Feldmann, J Schwenk
1
Strengthening Web Authentication through TLS-Beyond TLS Client Certificates
A Mayer, V Mladenov, J Schwenk, F Feldmann, C Meyer
Open Identity Summit 2014, 2014
2014
SoK: Lessons Learned from SSL
C Meyer, J Schwenk
TLS Attacks, Revised Selected Papers of the 14th International Workshop on …, 2013
2013
SoK: Lessons Learned From SSL/TLS Attacks
C Meyer, J Schwenk
The 14th International Workshop on Information Security Applications (WISA2013), 2013
2013
Si­che­rer Schlüs­sel- und In­for­ma­ti­ons­aus­tausch mit SAML
D Felsch, T Schrei­ber, C Meyer, F Feldmann, J Schwenk
DACH Se­cu­ri­ty 2013, 2013
2013
Sometimes It’s Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys
C Meyer, F Feldmann, J Schwenk
International Conference on Information Security and Cryptology, 110-125, 2012
2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–17