Personensuche
X
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
1
Security Analysis of the 3MF Data Format:
, In:
?
Challenges in Cybersecurity and Privacy - the European Research Landscape ,
2
FutureTrust – Future Trust Services for Trustworthy Global ..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
3
DISTINCT : Identity Theft using In-Browser Communication..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
5
Breaking the Specification: PDF Certification:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
6
1 Trillion Dollar Refund : How To Spoof PDF Signatures:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
7
Practical Decryption exFiltration : Breaking PDF Encrypt..:
, In:
?
Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science ,
8
PostScript Undead: Pwning the Web with a 35 Years Old Langu..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
9
SECRET : On the Feasibility of a Secure, Efficient, and ..:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
10
SoK: Single Sign-On Security — An Evaluation of OpenID Conn..:
, In:
?
Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium ,
11
On The (In-)Security Of JavaScript Object Signing And Encry..:
, In:
?
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security ,
12
Guardians of the Clouds : When Identity Providers Fail:
, In:
?
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security ,
13
Your Software at my Service : Security Analysis of SaaS ..:
, In:
?
Proceedings of the 2013 ACM workshop on Digital identity management ,
14