Dr Guido Schmitz

  1. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1204-1215 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 6 Jan 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  3. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 30 Jul 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  5. Published

    A Tutorial-Style Introduction to DY

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 2021, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Science and Business Media Deutschland GmbH, p. 77-97 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13066 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 673-688 16 p. 6956594. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 7 Mar 2014, In: ArXiv.org.

    Research output: Contribution to journalArticle

  8. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 29 Oct 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  10. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web

    Fett, D., Küsters, R. & Schmitz, G., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer-Verlag, p. 43-65 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 Next