TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | F | G | H | J | K | L | M | N | P | R | S | T | V | W
Number of items at this level: 127.

A

Arul, Tolga and Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan (2019):
Privacy & Usability of IPTV Recommender Systems.
Las Vegas, USA, In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE), Las Vegas, USA, DOI: 10.1109/ICCE.2019.8662046,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Kumar, Manish and Katzenbeisser, Stefan (2019):
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems.
Las Vegas, USA, In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE), Las Vegas, USA, DOI: 10.1109/ICCE.2019.8661840,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Lotichius, Jan and Hatzfeld, Christian and Fernandes, Felipe and Sharma, Ratika and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Securing IoT Devices Using Robust DRAM PUFs.
Thessaloniki, Greece, In: 2018 Global Information Infrastructure and Networking Symposium (GIIS) (GIIS'18), Thessaloniki, Greece, DOI: 10.1109/GIIS.2018.8635789,
[Conference or Workshop Item]

Arul, Tolga and Anagnostopoulos, Nikolaos A. and Katzenbeisser, Stefan (2018):
Behavioral Workload Generation for IPTV.
Berlin, Germany, In: 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (ICCE-Berlin 2018), Berlin, Germany, DOI: 10.1109/ICCE-Berlin.2018.8576230,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI, In: 28th Crypto-Day, München, Deutschland, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos A. and Arul, Tolga and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2018):
Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs.
Prague, Czech Republic, In: 2018 Euromicro Conference on Digital System Design (DSD), Prague, Czech Republic, DOI: 10.1109/DSD.2018.00102,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Chandy, John A. and Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
Volume 2, In: Cryptography 2018, (7), MDPI, DOI: 10.3390/cryptography2020007,
[Article]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
2, In: Cryptography, (3), MDPI, ISSN 2410-387X, DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Article]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
abs/1801.05764, In: CoRR, [Online-Edition: http://arxiv.org/abs/1801.05764],
[Article]

Anagnostopoulos, Nikolaos Athanasios and Gabmeyer, Sebastian and Arul, Tolga and Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Amin, Osama (2015):
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
Darmstadt, Technische Universität, [Master Thesis]

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, Scottsdale, AZ, USA, pp. 942-953, [Conference or Workshop Item]

Alsouri, Sami (2013):
Behavior Compliance Control for More Trustworthy Computation Outsourcing.
TU Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3578],
[Ph.D. Thesis]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
67, In: Designs, Codes and Cryptography, (2), pp. 209-232, [Article]

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Lecture Notes in Computer Science, 7483, In: Information Security, In: 15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, pp. 168-187, ISSN 0302-9743, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11],
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, pp. 234-251, [Conference or Workshop Item]

B

Buchmann, Johannes and Geihs, Matthias and Hamacher, Kay and Katzenbeisser, Stefan and Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, SpringerOpen, p. 16, DOI: 10.1186/s13635-019-0099-x,
[Online-Edition: https://jis-eurasipjournals.springeropen.com/articles/10.118...],
[Article]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Ph.D. Thesis]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Ph.D. Thesis]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, pp. 847-861, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference or Workshop Item]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Birkholz, Henk and Krauß, Christoph and Zhdanova, Maria and Kuzhiyelil, Don and Arul, Tolga and Heinrich, Markus and Katzenbeisser, Stefan and Suri, Neeraj and Vateva-Gurova, Tsvetoslava and Schlehuber, Christian (2018):
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Zenodo, In: International Workshop on MILS: Architecture and Assurance for Secure Systems, Luxembourg, 25.06.2018, DOI: 10.5281/zenodo.1314095,
[Online-Edition: http://dx.doi.org/10.5281/zenodo.1314095],
[Conference or Workshop Item]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, pp. 118–134, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Conference or Workshop Item]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 15:1-15:8, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference or Workshop Item]

Büscher, Niklas and Franz, Martin and Holzer, Andreas and Veith, Helmut and Katzenbeisser, Stefan (2017):
On compiling Boolean circuits optimized for secure multi-party computation.
51, In: Formal Methods in System Design, (2), pp. 308-331, DOI: 10.1007/s10703-017-0300-0,
[Online-Edition: https://doi.org/10.1007/s10703-017-0300-0],
[Article]

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Conference or Workshop Item]

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Büscher, Niklas and Schiffner, Stefan and Fischer, Mathias (2016):
Consumer Privacy on Distributed Energy Markets.
In: Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, Germany, September 7-8, 2016, pp. 96-114, DOI: 10.1007/978-3-319-44760-5_7,
[Online-Edition: https://doi.org/10.1007/978-3-319-44760-5\_7],
[Conference or Workshop Item]

Buescher, Niklas and Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13, [Article]

Biedermann, Sebastian (2015):
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4415],
[Ph.D. Thesis]

Brzuska, Christina and Fischlin, Marc and Schröder, Heike and Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), Springer, pp. 51-70, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), Springer, pp. 43-54, [Conference or Workshop Item]

Baecher, Paul and Büscher, Niklas and Fischlin, Marc and Milde, Benjamin (2011):
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, pp. 56-67, DOI: 10.1007/978-3-642-21424-0_5,
[Online-Edition: https://doi.org/10.1007/978-3-642-21424-0\_5],
[Conference or Workshop Item]

C

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Master Thesis]

Cuong, N. and Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), Springer, pp. 3-15, [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2011):
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
In: International Workshop on Digital Forensics and Watermarking (IWDW 2011), Springer, pp. 387-397, [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2011):
Security of Copy-Move Forgery Detection Techniques.
In: International Conference on Acoustics, Speech and Signal Processing (ICASSP'11), IEEE Press, pp. 1864-1867, [Conference or Workshop Item]

D

Dmitrienko, Alexandra (2015):
Security and privacy aspects of mobile platforms and applications security.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4611],
[Ph.D. Thesis]

F

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
17, In: Information Security Technical Report, (3), pp. 117-128, [Article]

Franz, M. and Katzenbeisser, Stefan (2011):
Processing Encrypted Floating Point Signals.
In: Workshop on Multimedia and Security (MMSEC'11), ACM Press, pp. 103-108, [Conference or Workshop Item]

Franz, M. and Carbunar, B. and Sion, R. and Katzenbeisser, Stefan and Sotakova, M. and Williams, P. and Peter, Andreas (2011):
Oblivious Outsourced Storage with Delegation.
In: Financial Cryptography and Data Security (FC 2011), Springer, pp. 127-140, [Conference or Workshop Item]

G

Gölz, Arwed (2018):
Rule-based Anomaly Recognition in Railway Interlocking Systems.
TU Darmstadt, [Bachelor Thesis]

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), [Conference or Workshop Item]

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Gagliotti Vigil, Martín Augusto (2015):
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4669],
[Ph.D. Thesis]

H

Heinrich, Markus and Vateva-Gurova, Tsvetoslava and Arul, Tolga and Katzenbeisser, Stefan and Suri, Neeraj and Birkholz, Henk and Fuchs, Andreas and Krauß, Christoph and Zhdanova, Maria and Kuzhiyelil, Don and Tverdyshev, Sergey and Schlehuber, Christian (2019):
Security Requirements Engineering in Safety-Critical Railway Signalling Networks.
2019, In: Security and Communication Networks, Hindawi, DOI: 10.1155/2019/8348925,
[Article]

Heinrich, Markus and Vieten, Jannik and Arul, Tolga and Katzenbeisser, Stefan (2018):
Security Analysis of the RaSTA Safety Protocol.
In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 199-204, DOI: 10.1109/isi.2018.8587371,
[Online-Edition: https://doi.org/10.1109/ISI.2018.8587371],
[Conference or Workshop Item]

Heinrich, Markus (2016):
Identitätsmanagement in LST-Netzwerken.
TU Darmstadt, [Master Thesis]

Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), ACM Press, pp. 772-783, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Hamacher, Kay and Katzenbeisser, Stefan (2011):
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011), ACM Press, pp. 115-124, [Book Section]

J

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Darmstadt, Technische Universität, [Master Thesis]

K

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
In: 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/],
[Conference or Workshop Item]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8998],
[Ph.D. Thesis]

Kohnhäuser, Florian and Püllen, Dominik and Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
In: IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Online-Edition: https://www.ieee-security.org/TC/SPW2019/SafeThings/],
[Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, pp. 66-70, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Conference or Workshop Item]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Master Thesis]

Kumar, Manish and Anagnostopoulos, Nikolaos Athanasios and Fan, Yufan and Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: GI, In: 28th Crypto-Day, [Conference or Workshop Item]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Master Thesis]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, pp. 329-342, DOI: 10.1145/3196494.3196544,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544],
[Conference or Workshop Item]

Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Schloss Dagstuhl-Leibniz-Zentrum für Informatik, In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, pp. 10:1-10:27, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Online-Edition: https://2018.ecoop.org/],
[Conference or Workshop Item]

Karvelas, Nikolaos (2018):
Architectures based on Oblivious RAM for Enhancing User Privacy and their Applications to Genome Processing.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7573],
[Ph.D. Thesis]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

Kohnhäuser, Florian and Stute, Milan and Baumgärtner, Lars and Almon, Lars and Katzenbeisser, Stefan and Hollick, Matthias and Freisleben, Bernd (2017):
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
In: IEEE Conference on Local Computer Networks (LCN), IEEE, Singapore, [Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, Springer, Oslo, Norway, [Conference or Workshop Item]

Karvelas, Nikolaos and Senftleben, Marius and Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security, ACM, Reggio Calabria, Italy, [Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, pp. 75-86, [Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Article]

Kohnhäuser, Florian and Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Greece, pp. 320-338, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference or Workshop Item]

Kohnhäuser, Florian and Schaller, André and Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), Springer, Heraklion, Crete, Greece, pp. 3-21, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, Scottsdale, AZ, USA, pp. 25-35, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]

Kohnhäuser, Florian (2014):
PUF-based Software Integrity Protection.
Darmstadt, Technische Universität, [Master Thesis]

Katzenbeisser, Stefan and Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885, [Article]

Kohler, Mathias (2011):
A Framework for ProActive Caching in Business Process-driven Environments.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-27967],
[Ph.D. Thesis]

Katzenbeisser, Stefan and Dittmann, Jana and Vielhauer, Claus TU Darmstadt, Otto-von-Guericke-Universität Darmstadt, Fachhochschule Brandenburg (Corporate Creators) (2010):
Pattern Recognition for IT Security, Book of Abstracts.
-, [Online-Edition: urn:nbn:de:tuda-tuprints-22734],
[Other]

Krauß, Christoph (2010):
Handling Insider Attacks in Wireless Sensor Networks.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-21588],
[Ph.D. Thesis]

L

Lateef, Muhammad Raees (2015):
Design, Implementation and Evaluation of a Lightweight Attestation Scheme for Embedded Systems.
Darmstadt, Technische Universität, [Master Thesis]

M

Matyunin, Nikolay and Wang, Yujue and Kullmann, Kristian Dietmar and Arul, Tolga and Szefer, Jakub and Katzenbeisser, Stefan (2019):
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
In: 18th Workshop on Privacy in the Electronic Society (WPES’19), London, November 11, 2019, DOI: 10.1145/3338498.3358650,
[Online-Edition: https://doi.org/10.1145/3338498.3358650],
[Conference or Workshop Item]

Matyunin, Nikolay and Wang, Yujue and Katzenbeisser, Stefan (2019):
Vibrational Covert Channels using Low-Frequency Acoustic Signals.
In: 7th ACM Workshop on Information Hiding and Multimedia Security, Paris, France, July 3-5, 2019, [Conference or Workshop Item]

Matyunin, Nikolay and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Zero-permission acoustic cross-device tracking.
In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018, pp. 25-32, DOI: 10.1109/HST.2018.8383887,
[Online-Edition: https://doi.org/10.1109/HST.2018.8383887],
[Conference or Workshop Item]

Matyunin, Nikolay and Anagnostopoulos, Nikolaos Athanasios and Boukoros, Spyros and Heinrich, Markus and Schaller, André and Kolinichenko, Maksim and Katzenbeisser, Stefan (2018):
Tracking Private Browsing Sessions using CPU-based Covert Channels.
In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018, pp. 63-74, DOI: 10.1145/3212480.3212489,
[Online-Edition: http://doi.acm.org/10.1145/3212480.3212489],
[Conference or Workshop Item]

Matyunin, Nikolay and Szefer, Jakub and Biedermann, Sebastian and Katzenbeisser, Stefan (2016):
Covert channels using mobile device's magnetic field sensors.
In: 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016, pp. 525-532, DOI: 10.1109/ASPDAC.2016.7428065,
[Online-Edition: https://doi.org/10.1109/ASPDAC.2016.7428065],
[Conference or Workshop Item]

Müller, Sascha (2011):
Data-Centric Security with Attribute-Based Encryption.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-27751],
[Ph.D. Thesis]

Müller, S. and Katzenbeisser, Stefan (2011):
Hiding the Policy in Cryptographic Access Control.
In: International Workshop on Security and Trust Management (STM 2011), Springer, pp. 90-105, [Conference or Workshop Item]

Mink, Martin and Greifeneder, Rainer Rannenberg, Kai and Varadharajan, Vijay and Weber, Christian (eds.) (2010):
Evaluation of the Offensive Approach in Information Security Education.
In: Proceedings of the 25th IFIP TC11 International Information Security Conference, SEC 2010, Springer, pp. 203-214, [Conference or Workshop Item]

N

Nguyen, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE, ACM, [Conference or Workshop Item]

Nguyen, Hieu Cuong (2013):
Security of Forensic Techniques for Digital Images.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3587],
[Ph.D. Thesis]

P

Püllen, Dominik and Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Katzenbeisser, Stefan (2019):
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks.
In: COINS '19, New York, NY, USA, ACM, In: Proceedings of the International Conference on Omni-Layer Intelligent Systems, New York, NY, USA, pp. 31-37, ISBN 978-1-4503-6640-3,
DOI: 10.1145/3312614.3312626,
[Conference or Workshop Item]

Püllen, Dominik and Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Katzenbeisser, Stefan (2018):
Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks.
Taipei, Taiwan, In: 2018 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2018), Taipei, Taiwan, DOI: 10.1109/VNC.2018.8628375,
[Conference or Workshop Item]

Peter, Andreas and Hartmann, T. and Müller, S. and Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), IEEE, pp. 79-84, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference or Workshop Item]

Peter, Andreas and Kronberg, M. and Trei, W. and Katzenbeisser, Stefan (2012):
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
In: International Conference on Information Security (ISC 2012), Springer, pp. 242-257, [Conference or Workshop Item]

R

Rochaeli, Taufiq (2009):
An automated policy refinement process supported by expert knowledge.
Darmstadt, Technische Universität, TU Darmstadt, [Ph.D. Thesis]

Rochaeli, Taufiq (2009):
An Automated Policy Refinement Process Supported by Expert Knowledge.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-13680],
[Ph.D. Thesis]

S

Schmid, Jakob (2018):
Independent Compilation for the Arithmetic Black Box.
TU Darmstadt, [Master Thesis]

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Skoric, Boris and Katzenbeisser, Stefan and Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Article]

Sharma, Ratika (2018):
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt, [Master Thesis]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelor Thesis]

Saleem, Umair Muhammad (2018):
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt, [Master Thesis]

Senftleben, Marius (2018):
Privacy-enhanced Microblogging.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7554],
[Ph.D. Thesis]

Sarangdhar, Ravi and Fan, Yufan and Anagnostopoulos, Nikolaos Athanasios and Gayer, Udo and Flederer, Frank and Mikschl, Tobias and Arul, Tolga and John, Philipp R. and Hierholz, Kirsten and Montenegro, Sergio and Katzenbeisser, Stefan (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.33800.52483,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference or Workshop Item]

Sarangdhar, Ravi (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Darmstadt, Technische Universität, [Bachelor Thesis]

Späth, Johannes and Ali, Karim and Bodden, Eric (2017):
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, [Conference or Workshop Item]

Schurig, Sebastian (2017):
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
Darmstadt, Technische Universität, [Master Thesis]

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Conference or Workshop Item]

Schaller, André (2017):
Lightweight Protocols and Applications for Memory-Based Intrinsic Physically Unclonable Functions on Commercial Off-The-Shelve Devices.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7014],
[Ph.D. Thesis]

Schaller, André and Stanko, Taras and Skoric, Boris and Katzenbeisser, Stefan (2017):
Eliminating Leakage in Reverse Fuzzy Extractors.
In: IEEE Transactions on Information Forensics and Security, [Article]

Schulz, Steffen and Schaller, André and Kohnhäuser, Florian and Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS, In: ESORICS 2017 - European Symposium on Research in Computer Security, Springer, Oslo, Norway, pp. 437-455, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Conference or Workshop Item]

Schlehuber, Christian and Heinrich, Markus and Vateva-Gurova, Tsvetoslava and Katzenbeisser, Stefan and Suri, Neeraj (2017):
Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
In: Security and Privacy Workshops (EuroS&PW), 2017 IEEE European Symposium on, pp. 139-145, DOI: 10.1109/eurospw.2017.63,
[Online-Edition: http://dx.doi.org/10.1109/eurospw.2017.63],
[Conference or Workshop Item]

Schlehuber, Christian and Heinrich, Markus and Vateva-Gurova, Tsvetoslava and Katzenbeisser, Stefan and Suri, Neeraj (2017):
A Security Architecture for Railway Signalling.
In: International Conference on Computer Safety, Reliability, and Security, pp. 320-328, DOI: 10.1007/978-3-319-66266-4_21,
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-66266-4_21],
[Conference or Workshop Item]

Schaller, André and Xiong, Wenjie and Gabmeyer, Sebastian and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Katzenbeisser, Stefan and Szefer, Jakub Gierlichs, Benedikt and Poschmann, Axel (eds.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS), 9813, In: Cryptographic Hardware and Embedded Systems (CHES 2016), Springer, Santa Barbara, California, USA, pp. 432-453, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Conference or Workshop Item]

Schäfer, Marcel (2016):
Collusion Secure Fingerprint Watermarking.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5244],
[Ph.D. Thesis]

Schaller, André and Skoric, Boris and Katzenbeisser, Stefan (2015):
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), Denver, Colorado, USA, pp. 15-20, ISBN 978-1-4503-3828-8,
DOI: 10.1145/2808414.2808417,
[Conference or Workshop Item]

Sommer, Dieter M. (2014):
Privacy-enhanced Identity Management – From Cryptography to Practice.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4016],
[Ph.D. Thesis]

Schröder, Heike (2013):
Physically Uncloneable Functions in the Stand-Alone and Universally Composable Framework.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3603],
[Ph.D. Thesis]

Schrittwieser, Sebastian and Katzenbeisser, Stefan (2011):
Code Obfuscation against Static and Dynamic Reverse Engineering.
In: International Conference on Information Hiding (IH 2011), Springer, pp. 270-284, [Conference or Workshop Item]

Stumpf, Frederic (2010):
Leveraging Attestation Techniques for Trust Establishment in Distributed Systems.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-20784],
[Ph.D. Thesis]

T

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master Thesis]

Thiemert, Stefan (2013):
Digitale Wasserzeichen zum Integritätsschutz von Videodaten.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3403],
[Ph.D. Thesis]

V

Vieten, Jannik (2017):
Security Analysis of the RaSTA Protocol.
TU Darmstadt, [Master Thesis]

W

Wachsmann, Christian (2014):
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851],
[Ph.D. Thesis]

This list was generated on Thu Dec 12 01:26:24 2019 CET.