TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | D | F | G | J | K | M | N | R | S | T | U | W
Number of items at this level: 55.

A

Aragon, Santiago and Tiloca, Marco and Maass, Max and Hollick, Matthias and Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4, DOI: 10.1109/CNS.2018.8433209,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7696],
[Article]

B

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
In: 23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, pp. 521-541, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Ph.D. Thesis]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
43, In: Datenschutz und Datensicherheit - DuD, (5), Springer, pp. 276-280, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version), DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Ph.D. Thesis]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, pp. 118–134, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 15:1-15:8, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference or Workshop Item]

Brendel, J. and Demirel, D. (2016):
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 543-550, DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]

D

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, pp. 1-6, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Daubert, Jörg (2017):
GRK 2050: D.4 AlterEgo.
Schloß Dagstuhl, Germany, Schloß Dagstuhl, [Report]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, pp. 738-744, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Grube, Tim and Schiffner, Stefan and Kikiras, Panayotis and Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
76, In: Elsevier Computer Communications (ComCom), Elsevier, pp. 42-53, ISSN 0140-3664, DOI: 10.1016/j.comcom.2015.11.004,
[Article]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],
[Ph.D. Thesis]

F

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference or Workshop Item]

Fomichev, Mikhail and Maass, Max and Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
23, In: ACM GetMobile: Mobile Comp. and Comm., (2), ACM, pp. 16-21, ISSN 2375-0529, DOI: 10.1145/3372300.3372304,
[Article]

Fischlin, Marc and Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Fomichev, Mikhail and Maass, Max and Almon, Lars and Molina, Alejandro and Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
3, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), (1), ACM, DOI: 10.1145/3314397,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8516],
[Article]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
PP, In: IEEE Communications Surveys & Tutorials, p. 1, DOI: 10.1109/COMST.2017.2748278,
[Article]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, pp. 1-10, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Funke, Sebastian Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, pp. 1-10, [Conference or Workshop Item]

G

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference or Workshop Item]

Gedeon, Julien and Brandherm, Florian and Egert, Rolf and Grube, Tim and Mühlhäuser, Max (2019):
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges.
7, In: IEEE Access, IEEE, pp. 152847-152878, ISSN 2169-3536, DOI: 10.1109/ACCESS.2019.2948399,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9302],
[Article]

Grube, Tim and Daubert, Jörg and Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
IEEE, In: IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Online-Edition: https://ieeexplore.ieee.org/document/8647607],
[Conference or Workshop Item]

Grube, Tim (2018):
Efficient Anonymous Group Communication.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7704],
[Ph.D. Thesis]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, pp. 24-31, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference or Workshop Item]

Grube, Tim and Thummerer, Markus and Daubert, Jörg and Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., Oslo, Norway, Springer, In: 13th International Workshop on Security and Trust Management, Oslo, Norway, pp. 213-223, DOI: 10.1007/978-3-319-68063-7_15,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...],
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, pp. 1-8, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), pp. 337-340, DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference or Workshop Item]

J

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

K

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

M

Mantz, Dennis and Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, Jun 17, 2019 - Jun 21, 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]

Maass, Max and Schwär, Stephan and Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: LNCS, In: Privacy Technologies and Policy, In: Annual Privacy Forum 2019, Rome, Italy, June 7th and 8th, 2019, DOI: 10.1007/978-3-030-21752-5_2,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8725],
[Conference or Workshop Item]

Maass, Max and Schwär, Stephan and Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: Annual Privacy Forum (LNCS), In: Proceedings of the Annual Privacy Forum 2019, Rome, Italy, Rome, [Online-Edition: https://maass.xyz/publication/maass-2019-b/maass-2019-b.pdf],
[Conference or Workshop Item]

Maass, Max and Walter, Nicolas and Herrmann, Dominik and Hollick, Matthias (2019):
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
In: Wirtschaftsinformatik 2019, Siegen, Germany, 25-27.2.2019, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8515],
[Conference or Workshop Item]

Maass, Max (2017):
Web-Privacy: Lustwandeln im Trackergarten.
MRMCD 2017, [Online-Edition: https://media.ccc.de/v/DC9AG9],
[Other]

Maass, Max and Laubach, Anne and Herrmann, Dominik (2017):
PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
In: Proceedings of INFORMATIK 2017, Leipzig, Deutschland, [Online-Edition: https://arxiv.org/abs/1705.08889],
[Conference or Workshop Item]

Maass, Max and Wichmann, Pascal and Pridöhl, Henning and Herrmann, Dominik (2017):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
In: Proceedings of the Annual Privacy Forum 2017, Springer, Annual Privacy Forum 2017, Vienna, ISBN 978-3-319-67280-9,
DOI: 10.1007/978-3-319-67280-9_10,
[Online-Edition: https://arxiv.org/abs/1705.05139],
[Conference or Workshop Item]

N

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference or Workshop Item]

R

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference or Workshop Item]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference or Workshop Item]

S

Schürmann, Tim (2019):
Evaluation bayesianischer kognitiver Modelle in der Vorhersage menschlichen Verhaltens.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8601],
[Ph.D. Thesis]

Schneider, Thomas and Treiber, Amos (2019):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, [Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Stute, Milan and Maass, Max and Schons, Tom and Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: Proceedings of MSWiM '17, 2. updated version,
In: The 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, November 21-25, 2017, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7682],
[Conference or Workshop Item]

Strohbach, Martin and Daubert, Jörg and Ravkin, Herman and Lischka, Mario Curry, Edward and Wahlster, Wolfgang (eds.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, Springer, pp. 119-141, DOI: 10.1007/978-3-319-21569-3,
[Book Section]

T

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

U

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

W

Weiler, Michael (2018):
Measuring Real-World Tie Strength with Digital Footprint Data: An Assessment of Convergent Validity.
San Francisco, CA, USA, December 13-16, 2018, [Online-Edition: https://aisel.aisnet.org/icis2018/social/Presentations/1],
[Conference or Workshop Item]

Weiler, Michael and Hinz, Oliver (2018):
Without each other, we have nothing: a state-of-the-art analysis on how to operationalize social capital.
In: Review of Managerial Science, ISSN 1863-6691, DOI: 10.1007/s11846-018-0280-5,
[Online-Edition: https://doi.org/10.1007/s11846-018-0280-5],
[Article]

This list was generated on Thu Dec 12 01:33:28 2019 CET.