1
0
0
News
Systemd schützt Logdateien vor Manipulationen - Pro-Linux
www.pro-linux.de
Die aktuelle Version des Init-Ersatzes Systemd kann Logdateien vor nachträglichen Manipulationen schützen. Dazu wurde jetzt das »Forward Secure Sealing«...
SSL/TLS - Stand der Dinge | Dipl.-Inform. Carsten Eilers
www.ceilers-news.de
Welche neuen Angriffe auf SSL/TLS gibt es?
Systemd to secure system log information against attacks - The H...
www.h-online.com
· Systemd to secure system log information against attacks Bertram Poettering, his brother; the FSPRG paper is due to be published shortly. ...
Hamburgs hellste Köpfe
archiv.mopo.de
Keine Rede davon, wenn man sich die Ergebnisse des Landeswettbewerbs Hamburg im ... der Bundeswehr), Bertram Poettering (19, Kirchengmeinde Bergstedt) und Felix ...
Netzwerk-Profile
Bertram Poettering | Semantic Scholar
www.semanticscholar.org
Semantic Scholar profile for Bertram Poettering, with 98 highly influential citations and 55 scientific research papers.
Ausbildung
Accepted Papers
acns2015.cs.columbia.edu
International Conference on Applied Cryptography and Network Security
Bücher
Bertram Poettering | XanEdu Customization Platform
www.academicpub.com
Author: Bertram Poettering. Results. Private discovery of common social contacts Springer Science+Business Media By: Emiliano De ...
Advances in Cryptology – CRYPTO 2018: 38th Annual ...
books.google.co.in
Bertram Poettering conducted part of the work at Ruhr University Bochum supported by ERC Project ERCC (FP ). Paul Rösler received support by SyncEnc, ...
Advances in Cryptology – ASIACRYPT 2016: 22nd International...
books.google.be
The two-volume set LNCS and LNCS constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of...
Dokumente zum Namen
[ ] Cryptographic Enforcement of Information Flow Policies...
arxiv.org
Authors:Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering. (Submitted on 30 Aug 2016). Abstract: We may ...
Plaintext awareness in identity-based key encapsulation - ProQuest
www.proquest.com
Mark Manulis · Bertram Poettering · Douglas Stebila. Published online: 22 November © Springer-Verlag Berlin Heidelberg Abstract The notion ...
[ ] Efficiency Improvements for Encrypt-to-Self - arXivarxiv.org › cs
arxiv.org
· Title:Efficiency Improvements for Encrypt-to-Self. Authors:Jeroen Pijnenburg, Bertram Poettering · Download PDF.
Publicly verifiable ciphertexts, Journal of Computer Security |...
www.deepdyve.com
a. , Mark Manulis. b. , Bertram Poettering. c. ,. Jothi Rangasamy. d. and Douglas Stebila. a,. ∗. a. Queensland University of Technology, Brisbane, QLD, Australia.
Wissenschaftliche Veröffentlichungen
dblp: Bertram Poettering
dblp.uni-trier.de
List of computer science publications by Bertram Poettering
Arbeitsbereich Technische Aspekte Multimodaler Systeme
tams.informatik.uni-hamburg.de
Thomas Knepper, Bertram Poettering, "Entwicklung eines Ortungsgeräts für Blinde", September Arbeit: 813k .pdf, Prototypenplatine . Legal Notice:
Search results for "Int. J. Inf. Sec." – FacetedDBLP
dblp.l3s.uni-hannover.de
Bertram Poettering, Douglas Stebila: Double-authentication-preventing signatures. Int. J. Inf. Sec : DBLP DOI BibTeX RDF: 1: Hani Ragab Hassen, Esma Lounes:
Veröffentlichungen allgemein
Even More Practical Secure Logging: Tree-Based Seekable Sequential...
link.springer.com
Sequential key generators produce a forward-secure sequence of symmetric cryptographic keys and are traditionally based on hash chains. An inherent...
Pseudorandom Signatures | Nils Fleischhacker
nilsfleischhacker.de
Pseudorandom Signatures. Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Abstract. We develop a three-level hierarchy ...
Practical Secure Logging: Seekable Sequential Key Generators |...
link.springer.com
In computer forensics, log files are indispensable resources that support auditors in identifying and understanding system threats and security breaches. If...
Security Reading Group Wiki
wiki.eecs.umich.edu
September 3, 2019, ICLab: A Global, Longitudinal Internet Censorship Measurement Platform ... Bertram Poettering, Jacob C.N. Schuldt (University of London). › secrit
Artikel & Meinungen
Wikipedia: RC4 – Wikipedia
RC4, ARC4 oder Arcfour ist eine Stromverschlüsselung, die mit Standards wie HTTPS, SSH Hochspringen ↑ Nadhem AlFardan, Dan Bernstein, Kenny Paterson, Bertram Poettering, Jacob Schuldt: On the Security of RC4 in TLS .
Research | Pooya Farshim
farshim.wordpress.com
I am interested in the rigorous development of cryptographic primitives, security models, and relationship between primitives. Recently, I have been working on...
Guide to Nginx + SSL + SPDY | Dogtown | MARE system Kiel
www.mare-system.de
MARE system Kiel - Security, Monitoring, Servermanagement
Schloss Dagstuhl : Participant List
www.dagstuhl.de
... (IBM Research - Zürich, CH); Bertram Poettering (Royal Holloway University of London, GB); Bartosz Przydatek (Google Switzerland - Zürich, ...
Sonstiges
Bertram Poettering - Google 学术搜索引用 - Google Scholarscholar.google.co.in/citations?user...hl=zh-CN
scholar.google.co.in
查看全部. 关注. Bertram Poettering. IBM Research Labs - Zurich. 在 zurich.ibm.com 的电子邮件经过验证. CryptographyComputer Security. 文章引用次数合著作者 ...
Practical Affiliation-Hiding Authentication from Improved Polynomial...
slideplayer.com
Outline Introduction Initial Technique Polynomial Interpolation Optimized Multi-Group AH Protocol Analysis Conclusion 3
Dr. Bertram Poettering
www.crypto.ruhr-uni-bochum.de
OpenPGP If you want to send me encrypted email, please use my OpenPGP key with key id 0x A.
Bertram Poettering | USENIXwww.usenix.org › conference › speaker-or-organizer
www.usenix.org
Bertram Poettering. Silver Sponsors. Bronze Sponsors. Media Sponsors & Industry Partners. © USENIX Privacy Policy · Contact Us.
CRYPTO Publications
dbs-lin.ruhr-uni-bochum.de
Ruhr-Universität Bochum, People-centred – Cosmopolitan - High-performance
Bertram Poettering - researchr alias
researchr.org
Linkable Message Tagging: Solving the key distribution problem of signature schemesFelix Günther, Bertram Poettering. iacr, 2014:14, [doi].
Oberseminar über Kryptographie
www.cits.ruhr-uni-bochum.de
Bertram Poettering : Causality in cryptographic channels (or: Why TLS is not the right protocol to protect your online chat) 5/64: Uhr: : Romain Gay :
Bertram Poettering
easychair.org
Bertram Poettering. Organization: Royal Holloway, University of London. Pages in this Program. CSF on Monday, July 9th · CSF Program · Program · Program for ...
Cryptology ePrint Archive: Report Deterring Certificate...
eprint.iacr.org
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Mihir Bellare and Bertram Poettering and Douglas ...
18th IMA International Conference on Cryptography and Coding
ima.org.uk
05-Mar — Bertram Poettering, IBM Research -Zurich Elizabeth Quaglia, Royal Holloway, University of London Ciara Rafferty, Queen's University Belfast › Events › Conferences
Li Li
lilicoding.github.io
... J. AlFardan,Daniel J. Bernstein,Kenneth G. Paterson,Bertram Poettering,Jacob ... CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. › venues › uss-fulllist
HackerOne
hackerone.com
A group of researchers (Nadhem AlFardan, Dan Bernstein, Kenny Paterson, Bertram Poettering and Jacob Schuldt) have found new attacks against TLS that allows an attacker to recover a limited amount of plaintext from a TLS connection when RC4 encryption is used. The attacks arise from statistical ...
ASICS: Authenticated key exchange security incorporating ...
www.douglas.stebila.ca
Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated key exchange security incorporating ... › ES...
Affiliation-Hiding Authentication with Archive ouverte HAL
hal.archives-ouvertes.fr
von M Manulis · · Zitiert von: 3 — Mark Manulis, Bertram Poettering. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. 5th Workshop on Information Security Theory and ... › ha...
Cryptanalysis of OCB2: Attacks on Authenticity and ...
www.springerprofessional.de
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. Autoren: Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering. Verlag: Springer ...
Cold Boot Attacks in the Discrete Logarithm Setting
eprint.iacr.org
Cryptology ePrint Archive: Report Cold Boot Attacks in the Discrete Logarithm Setting. Bertram Poettering and Dale L. Sibborn.
ACNS th International Conference on Applied Cryptography and...
acns2016.sccs.surrey.ac.uk
International Conference on Applied Cryptography and Network Security
An Approach For Securing RC4 Algorithm - IJERT
www.ijert.org
In todays world, Internet is playing a very important role in our life Nadhem AlFardan, Kenneth G. Paterson, Bertram Poettering, and Jacob C.N. Schuldt ... › an-approach-for-securing-rc4-al...
Verwandte Suchanfragen zu Bertram Poettering
Julia Hesse Benny Pinkas Douglas Stebila | Felix Heuer Lennart Poettering |
Personen Vorname "Bertram" (2356) Name "Poettering" (11) |
sortiert nach Relevanz / Datum