-
Notifications
You must be signed in to change notification settings - Fork 0
/
quellen.bib
99 lines (87 loc) · 2.82 KB
/
quellen.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
@conference{EURO2014,
Address = {Kopenhagen, D{\"a}nemark},
Author = {Juels, Ari and Ristenpart, Thomas},
Booktitle = {EUROCRYPT 2014},
Month = {Mai},
Title = {{Honey Encryption - Security Beyond the Brute-Force Bound}},
Year = {2014}
}
@conference{SACMAT2014,
Address = {London, Kanada},
Author = {Juels, Ari},
Booktitle = {19. ACM SACMAT},
Month = {Juni},
Title = {{A Bodyguard of Lies - The Use of Honey Objects in Information Security}},
Year = {2014}
}
@conference{ACM13,
author = {Juels, Ari and Rivest, Ronald L.},
title = {{Honeywords: Making Password-Cracking Detectable}},
booktitle = {Proceedings ACM CCS'13},
Address = {Berlin, Germany},
year = {2013},
month = {November}
}
@article{IEEE2014,
Author = {Juels, Ari and Ristenpart, Thomas},
Journal = {IEEE Security \& Privacy},
Month = {April},
Pages = {59-62},
Title = {{Honey Encryption - Encryption beyond the Brute-Force Barrier}},
Volume = {12},
Number={4},
Year = {2014}
}
@incollection{AE2000,
year={2000},
booktitle={Advances in Cryptology - ASIACRYPT 2000},
title={{Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm}},
publisher={Springer Berlin Heidelberg},
author={Bellare, Mihir and Namprempre, Chanathip}
}
@misc{CRCS2014,
author = {Juels, Ari},
title = {{The Password That Never Was}},
howpublished={\url{http://crcs.seas.harvard.edu/event/ari-juels-the-password-that-never-was}},
note = {Zugriff am 27.10.2014}
}
@book{Inversionsmethode,
title={Stochastische Simulation: Grundlagen, Algorithmen und Anwendungen},
author={Kolonko, M.},
isbn={9783834892904},
series={Vieweg Studium},
year={2008},
publisher={Vieweg Verlag, Friedr, \& Sohn Verlagsgesellschaft mbH}
}
@book{Schneier2006,
address = {München},
author = {Schneier, Bruce},
publisher = {Pearson Studium},
title = {{Angewandte Kryptographie - Der Klassiker. Protokolle, Algorithmen und Sourcecode in C}},
year = 2006
}
@techreport{pbkdf2000,
author = {Kaliski, B.},
howpublished = {RFC 2898},
type={RFC},
number = 2898,
organization = {Internet Engineering Task Force},
publisher = {IETF},
series = {Request for Comments},
title = {{PKCS \#5: Password-Based Cryptography Specification Version 2.0}},
url = {http://www.ietf.org/rfc/rfc2898.txt},
year = 2000
}
@misc{BSI2014,
author = {Bundesamt für Sicherheit in der Informationstechnik},
howpublished = {TR-02102-1},
month = {Januar},
title = {{Technische Richtlinie: Kryptographische Verfahren: Empfehlungen und Schlüssellängen}},
year = 2014
}
@misc{FolienVortrag,
author = {Juels, Ari and Ristenpart, Thomas},
title = {{Honey Encryption: Security Beyond the Brute-force Bound}},
howpublished={\url{http://ec14.compute.dtu.dk/talks/19.pdf}},
note = {Zugriff am 16.12.2014}
}