3D surface and body documentation in forensic medicine: 3-D/CAD Photogrammetry merged with 3D radiological scanning R Dirnhofer, MJ Thali, P Vock, J Braun, J Wirth Journal of forensic sciences 48 (6), JFS2003118, 2003 | 113 | 2003 |
Long term confidentiality: a survey J Braun, J Buchmann, C Mullan, A Wiesmaier Designs, Codes and Cryptography 71, 459-478, 2014 | 45 | 2014 |
LINCOS: A storage system providing long-term integrity, authenticity, and confidentiality J Braun, J Buchmann, D Demirel, M Geihs, M Fujiwara, S Moriai, ... Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 37 | 2017 |
CA trust management for the Web PKI J Braun, F Volk, J Classen, J Buchmann, M Mühlhäuser Journal of Computer Security 22 (6), 913-959, 2014 | 35 | 2014 |
The day the cryptography dies J Mulholland, M Mosca, J Braun IEEE Security & Privacy 15 (4), 14-21, 2017 | 29 | 2017 |
The potential of an individualized set of trusted cas: Defending against ca failures in the web pki J Braun, G Rynkowski 2013 International Conference on Social Computing, 600-605, 2013 | 23 | 2013 |
On the design and implementation of the Open eCard App D Hühnlein, D Petrautzki, J Schmölz, T Wich, M Horsch, T Wieland, ... Gesellschaft für Informatik eV, 2012 | 18 | 2012 |
X. 509-compliant hybrid certificates for the post-quantum transition N Bindel, J Braun, L Gladiator, T Stöckert, J Wirth Journal of Open Source Software 4 (40), 1606, 2019 | 16 | 2019 |
Password requirements markup language M Horsch, M Schlipf, J Braun, J Buchmann Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 14 | 2016 |
Quantum cryptography: a view from classical cryptography J Buchmann, J Braun, D Demirel, M Geihs Quantum science and technology 2 (2), 020502, 2017 | 12 | 2017 |
Trust views for the web PKI J Braun, F Volk, J Buchmann, M Mühlhäuser Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 12 | 2014 |
A distributed reputation system for certification authority trust management J Classen, J Braun, F Volk, M Hollick, J Buchmann, M Mühlhäuser 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1349-1356, 2015 | 11 | 2015 |
An efficient mobile PACE implementation A Wiesmaier, M Horsch, J Braun, F Kiefer, D Hhnlein, F Strenzke, ... Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 11 | 2011 |
Revocation and non-repudiation: when the first destroys the latter J Braun, F Kiefer, A Hülsing European Public Key Infrastructure Workshop, 31-46, 2013 | 6 | 2013 |
How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities J Braun, A Hülsing, A Wiesmaier, MAG Vigil, J Buchmann Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013 | 6 | 2013 |
Mobile Authentisierung und Signatur J Braun, M Horsch, A Wiesmaier, D Hühnlein DA-CH Security, 32-43, 2011 | 6 | 2011 |
Password Policy Markup Language M Horsch, M Schlipf, S Haas, J Braun, J Buchmann Gesellschaft für Informatik eV, 2016 | 5 | 2016 |
Entwicklung einer SOA-basierten Webanwendung zur Buchung und Verwaltung von Segeltouren: Proprietäre Software vs. Open Source M Siebenhaar, T Lehrig, J Braun, T Görge Wirtschaftsinformatik 50, 325-329, 2008 | 5 | 2008 |
Password Assistance M Horsch, J Braun, J Buchmann Gesellschaft für Informatik, Bonn, 2017 | 4 | 2017 |
Maintaining security and trust in large scale public key infrastructures J Braun Technische Universität, 2015 | 4 | 2015 |