default search action
Sebastian Gajek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Sebastian Gajek, Sören Langenberg, Christian Stüble:
Confidential Cloud Computing. Datenschutz und Datensicherheit (dud) 48(1): 31-36 (2024) - [i9]Benedikt Sterr, Sebastian Gajek, Andrew N. Hrymak, Matti Schneider, Thomas Böhlke:
Deep material networks for fiber suspensions with infinite material contrast. CoRR abs/2406.11662 (2024) - 2022
- [i8]Nils Meyer, Sebastian Gajek, Johannes Görthofer, Andrew N. Hrymak, Luise Kärger, Frank Henning, Matti Schneider, Thomas Böhlke:
A probabilistic virtual process chain to quantify process-induced uncertainties in Sheet Molding Compounds. CoRR abs/2209.05873 (2022) - 2021
- [j5]Sebastian Gajek, Michael Lees, Christoph Jansen:
IIoT and cyber-resilience. AI Soc. 36(3): 725-735 (2021) - [i7]Sebastian Gajek, Matti Schneider, Thomas Böhlke:
An FE-DMN method for the multiscale analysis of fiber reinforced plastic components. CoRR abs/2103.08253 (2021) - [i6]Sebastian Gajek, Matti Schneider, Thomas Böhlke:
An FE-DMN method for the multiscale analysis of thermodynamical composites. CoRR abs/2109.14403 (2021) - 2020
- [c23]Sebastian Gajek, Marco Lewandowsky:
Trustless, Censorship-Resilient and Scalable Votings in the Permission-Based Blockchain Model. Euro-Par Workshops 2020: 54-65
2010 – 2019
- 2019
- [i5]Sebastian Gajek, Marco Lewandowsky:
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model. IACR Cryptol. ePrint Arch. 2019: 617 (2019) - 2016
- [c22]Sebastian Gajek:
Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption. CT-RSA 2016: 75-89 - [c21]Francesco Alesiani, Sebastian Gajek:
Remote Testimony: How to Trust an Autonomous Vehicle. VTC Spring 2016: 1-5 - 2015
- [c20]Özgür Dagdelen, Sebastian Gajek, Florian Göpfert:
Learning with Errors in the Exponent. ICISC 2015: 69-84 - 2014
- [i4]Michael Backes, Özgür Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder:
Operational Signature Schemes. IACR Cryptol. ePrint Arch. 2014: 820 (2014) - [i3]Özgür Dagdelen, Sebastian Gajek, Florian Göpfert:
Learning with Errors in the Exponent. IACR Cryptol. ePrint Arch. 2014: 826 (2014) - 2011
- [j4]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security. Int. J. Mob. Comput. Multim. Commun. 3(4): 20-35 (2011) - 2010
- [c19]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
Secure Bindings of SAML Assertions to TLS Sessions. ARES 2010: 62-69 - [i2]Ran Canetti, Sebastian Gajek:
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange. IACR Cryptol. ePrint Arch. 2010: 303 (2010)
2000 – 2009
- 2009
- [b1]Sebastian Gajek:
Foundations of provably secure browser-based protocols. Ruhr University Bochum, 2009, ISBN 978-3-89966-343-3, pp. 1-149 - [j3]Sebastian Gajek, Mark Manulis, Jörg Schwenk:
User-aware provably secure protocols for browser-based mutual authentication. Int. J. Appl. Cryptogr. 1(4): 290-308 (2009) - [c18]Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy:
TruWallet: trustworthy and migratable wallet-based web authentication. STC 2009: 19-28 - [c17]Sebastian Gajek, Meiko Jensen, Lijun Liao, Jörg Schwenk:
Analysis of Signature Wrapping Attacks and Countermeasures. ICWS 2009: 575-582 - [c16]Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan:
Risks of the CardSpace Protocol. ISC 2009: 278-293 - 2008
- [j2]Xuan Chen, Christoph Löhr, Sebastian Gajek, Sven Schäge:
Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen - Browser-basierte Protokolle im Sicherheitscheck. Datenschutz und Datensicherheit 32(8): 515-519 (2008) - [c15]Sebastian Gajek, Mark Manulis, Jörg Schwenk:
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. ACISP 2008: 6-20 - [c14]Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Provably secure browser-based user-aware mutual authentication over TLS. AsiaCCS 2008: 300-311 - [c13]Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk:
A Browser-Based Kerberos Authentication Scheme. ESORICS 2008: 115-129 - [c12]Sebastian Gajek:
A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. ProvSec 2008: 283-297 - [c11]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327 - [c10]Sebastian Gajek, Lijun Liao, Jörg Schwenk:
Stronger TLS bindings for SAML assertions and SAML artifacts. SWS 2008: 11-20 - [i1]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols. IACR Cryptol. ePrint Arch. 2008: 251 (2008) - 2007
- [j1]Sebastian Gajek, Lijun Liao, Jörg Schwenk:
Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS. Datenschutz und Datensicherheit 31(11): 816-821 (2007) - [c9]Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ARES 2007: 120-127 - [c8]Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. WEWST 2007 - [c7]Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment framework for Web services. WEWST@ECOWS (Final Proceedings) 2007: 141-157 - [c6]Sebastian Gajek, Ahmad-Reza Sadeghi:
A Forensic Framework for Tracing Phishers. FIDIS 2007: 23-35 - [c5]Sebastian Gajek, Lijun Liao, Jörg Schwenk:
Breaking and fixing the inline approach. SWS 2007: 37-43 - 2006
- [c4]Sebastian Gajek, Jörg Schwenk, Christoph Wegener:
SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. Sicherheit 2006: 6-17 - 2005
- [c3]Rolf Oppliger, Sebastian Gajek:
Effective Protection Against Phishing and Web Spoofing. Communications and Multimedia Security 2005: 32-41 - [c2]Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk:
Trustworthy Verification and Visualisation of Multiple XML-Signatures. Communications and Multimedia Security 2005: 311-320 - [c1]André Adelsbach, Sebastian Gajek, Jörg Schwenk:
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. ISPEC 2005: 204-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint