Sebastian Gajek

According to our database1, Sebastian Gajek authored at least 35 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Confidential Cloud Computing.
Datenschutz und Datensicherheit (dud), January, 2024

2022
A probabilistic virtual process chain to quantify process-induced uncertainties in Sheet Molding Compounds.
CoRR, 2022

2021
An FE-DMN method for the multiscale analysis of thermodynamical composites.
CoRR, 2021

An FE-DMN method for the multiscale analysis of fiber reinforced plastic components.
CoRR, 2021

IIoT and cyber-resilience.
AI Soc., 2021

2019
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model.
IACR Cryptol. ePrint Arch., 2019

2016
Remote Testimony: How to Trust an Autonomous Vehicle.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2014
Learning with Errors in the Exponent.
IACR Cryptol. ePrint Arch., 2014

Operational Signature Schemes.
IACR Cryptol. ePrint Arch., 2014

2011
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security.
Int. J. Mob. Comput. Multim. Commun., 2011

2010
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange.
IACR Cryptol. ePrint Arch., 2010

Secure Bindings of SAML Assertions to TLS Sessions.
Proceedings of the ARES 2010, 2010

2009
Foundations of provably secure browser-based protocols.
PhD thesis, 2009

User-aware provably secure protocols for browser-based mutual authentication.
Int. J. Appl. Cryptogr., 2009

Risks of the CardSpace Protocol.
Proceedings of the Information Security, 12th International Conference, 2009

Analysis of Signature Wrapping Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Web Services, 2009

TruWallet: trustworthy and migratable wallet-based web authentication.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008

Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen - Browser-basierte Protokolle im Sicherheitscheck.
Datenschutz und Datensicherheit, 2008

Stronger TLS bindings for SAML assertions and SAML artifacts.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

A Universally Composable Framework for the Analysis of Browser-Based Security Protocols.
Proceedings of the Provable Security, Second International Conference, 2008

A Browser-Based Kerberos Authentication Scheme.
Proceedings of the Computer Security, 2008

Provably secure browser-based user-aware mutual authentication over TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS.
Datenschutz und Datensicherheit, 2007

Breaking and fixing the inline approach.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

A Forensic Framework for Tracing Phishers.
Proceedings of the Future of Identity in the Information Society, 2007

SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services.
Proceedings of the 2nd ECOWS07 Workshop on Emerging Web Services Technology, 2007

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007

2006
SSL-VA-Authentifizierung als Schutz von Phishing und Pharming.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

2005
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
Proceedings of the Information Security Practice and Experience, 2005

Effective Protection Against Phishing and Web Spoofing.
Proceedings of the Communications and Multimedia Security, 2005

Trustworthy Verification and Visualisation of Multiple XML-Signatures.
Proceedings of the Communications and Multimedia Security, 2005


  Loading...