Johannes Braun

Orcid: 0000-0001-6491-2250

Affiliations:
  • TU Darmstadt, Germany


According to our database1, Johannes Braun authored at least 25 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
J. Open Source Softw., 2019

2017
The Day the Cryptography Dies.
IEEE Secur. Priv., 2017

Update-tolerant and Revocable Password Backup (Extended Version).
CoRR, 2017

Password Assistance.
Proceedings of the Open Identity Summit 2017, 2017

LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Update-Tolerant and Revocable Password Backup.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
IACR Cryptol. ePrint Arch., 2016

Password Policy Markup Language.
Proceedings of the Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, 2016

Password Requirements Markup Language.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Maintaining security and trust in large scale public key infrastructures.
PhD thesis, 2015

A Distributed Reputation System for Certification Authority Trust Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
CA trust management for the Web PKI.
J. Comput. Secur., 2014

Long term confidentiality: a survey.
Des. Codes Cryptogr., 2014

Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures.
IACR Cryptol. ePrint Arch., 2013

Trust Views for the Web PKI.
IACR Cryptol. ePrint Arch., 2013

The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKI.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

On the Security of Encrypted Secret Sharing.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Revocation and Non-repudiation: When the First Destroys the Latter.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012

Perfect Confidentiality Network: A Solution for Information Theoretically Secure Key Agreement.
Proceedings of the 5th International Conference on New Technologies, 2012

iPIN and mTAN for Secure eID Applications.
Proceedings of the Information Security Practice and Experience, 2012

How to Avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
An efficient mobile PACE implementation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2008
Entwicklung einer SOA-basierten Webanwendung zur Buchung und Verwaltung von Segeltouren: Proprietäre Software vs. Open Source.
Wirtschaftsinf., 2008


  Loading...