Jorg Schwenk’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (8)


Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption
  • Conference Paper

June 2020

·

66 Reads

·

3 Citations

Jens Muller

·

·

Damian Poddebniak

·

[...]

·

Jorg Schwenk







Citations (8)


... To address a part of the issues recognized in many distributed storage structures, various plans have been proposed, for instance, setting up, by the distributed storage providers, an equality between customer security and learning amassed from customers' data [1], realizing a crossbreed encryption and access control scheme that will ensure an occupation based access control [2] or despite depicting a nonexclusive arrangement of activity in which the encryption and deciphering organizations are segregated from capacity advantage [3]. There are similarly extraordinary courses of action proposed starting late, as showed in papers [4][5][6][7][8][9]. Notwithstanding the way that these courses of action can upgrade the security dimension of a distributed storage system, there is so far a prerequisite for a customer to trust in a provider. ...

Reference:

User Data Control Protocol for Cloud Security, Gumpina Babu Rao, Dr. G. Lavanya Devi, Prof. N. V. E. S. Murthy, Helix Vol. 9 (1), 2019, pp4763- 4768, DOI 10.29042/2019-4763-4768.
Your Cloud in My Company: Modern Rights Management Services Revisited
  • Citing Conference Paper
  • August 2016

... By embedding the IPNS key within images, audio files, or other media, the secret can be transmitted without arousing suspicion. Another mechanism is to leverage encrypted messaging applications that provide end-to-end encryption and forward secrecy, such as Signal or WhatsApp [91]- [93]. These platforms are designed to resist surveillance and interception, making them suitable for securely transmitting the IPNS key and root certificate [94]. ...

More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema
  • Citing Conference Paper
  • April 2018

... 2. OpenID Connect: this is an interoperable authentication protocol, which is developed based on the OAuth 2.0 framework of specifications (Alrodhan and Alqarni 2017;Mainka et al. 2017;Naik and Jenkins 2017). Ope-nID Connect streamlines the process of obtaining user profile data in a REST-like and interoperable manner, as well as user identity verification based on authentication carried out by an authorisation server. ...

SoK: Single Sign-On Security — An Evaluation of OpenID Connect
  • Citing Conference Paper
  • April 2017

... Moreover, due to the diversity of application scenarios and functional requirements, specific types of IoT devices may suffer from their own security issues. Hence, some work [62], [63], [64] has analyzed the security of specific IoT devices, including smart locks, printers and home-based devices, etc. In addition, some researchers also considered the security of communication between devices, clouds and apps, such as remote binding [32], device pairing [65], [66], messaging protocols [67] and the interactions [68]. ...

SoK: Exploiting Network Printers
  • Citing Conference Paper
  • May 2017

... Smart TV, connected to the Internet, may create security and privacy issue for users due to hackers, scammers, spammers, etc. (Ksibi et al., 2021;Niemietz et al., 2015). Privacy and security issues are critical for lifelogging systems Ksibi et al., 2021;Petroulakis et al., 2012). ...

Not so Smart: On Smart TV Apps
  • Citing Conference Paper
  • September 2015

... As a result, if an assertion is still true and pertinent, it should be cached and utilised again. This can accelerate the authenticate process, lessen the strain on the IdP, and enhance customer satisfaction (Mainka et al. 2016). (d) For SAML to be efficient, both the IdP and the SP must be accessible and dependable. ...

Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on
  • Citing Conference Paper
  • March 2016

... Frosch et al. 19 first provided a comprehensive and accurate description of interaction process of the TextSecure protocol and conducted a security analysis. They established formal security definitions and security proof for the three component modules of the protocol and found that it was vulnerable to a UKS attack. ...

How Secure is TextSecure?
  • Citing Conference Paper
  • March 2016