Trust in IT
暂无分享,去创建一个
Arnold Picot | Thomas Götz | Udo Hertz | A. Picot | T. Götz | U. Hertz
[1] Alexandra Gerbasi,et al. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives , 2010 .
[2] Jörg Schwenk,et al. TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management , 2008, BIOSIG.
[3] Jörg Schwenk,et al. Analysis of Signature Wrapping Attacks and Countermeasures , 2009, 2009 IEEE International Conference on Web Services.
[4] Tibor Jager,et al. A Browser-Based Kerberos Authentication Scheme , 2008, ESORICS.
[5] Jörg Schwenk,et al. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy , 2008, ACISP.
[6] Jörg Schwenk,et al. Stronger TLS bindings for SAML assertions and SAML artifacts , 2008, SWS '08.
[7] Jörg Schwenk,et al. The curse of namespaces in the domain of XML signature , 2009, SWS '09.
[8] Ahmad-Reza Sadeghi,et al. Provably secure browser-based user-aware mutual authentication over TLS , 2008, ASIACCS '08.