TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Number of items at this level: 68.

Article

Alhassan, Masaud Y. and Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Online-Edition: https://encrypto.de/papers/AGKS20.pdf],
[Article]

Schneider, Thomas and Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Javadi, Mohammad and Yalame, Mohammad Hossein and Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020. IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Online-Edition: https://encrypto.de/papers/TNKSB19.pdf],
[Article]

Fomichev, Mikhail and Maass, Max and Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, (2), 23. pp. 16-21, ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Online-Edition: https://dl.acm.org/doi/10.1145/3372300.3372304],
[Article]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

Gedeon, Julien and Brandherm, Florian and Egert, Rolf and Grube, Tim and Mühlhäuser, Max (2019):
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges.
In: IEEE Access, 7IEEE, pp. 152847-152878, ISSN 2169-3536,
DOI: 10.1109/ACCESS.2019.2948399,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9302],
[Article]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), Springer, pp. 276-280, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Fomichev, Mikhail and Maass, Max and Almon, Lars and Molina, Alejandro and Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1), ACM, DOI: 10.1145/3314397,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8516],
[Article]

Aragon, Santiago and Tiloca, Marco and Maass, Max and Hollick, Matthias and Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7696],
[Article]

Weiler, Michael and Hinz, Oliver (2018):
Without each other, we have nothing: a state-of-the-art analysis on how to operationalize social capital.
In: Review of Managerial Science, ISSN 1863-6691,
DOI: 10.1007/s11846-018-0280-5,
[Online-Edition: https://doi.org/10.1007/s11846-018-0280-5],
[Article]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PPp. 1, DOI: 10.1109/COMST.2017.2748278,
[Article]

Daubert, Jörg and Fischer, Mathias and Grube, Tim and Schiffner, Stefan and Kikiras, Panayotis and Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76Elsevier, pp. 42-53, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

Book Section

Brendel, Jacqueline and Fischlin, Marc Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Strohbach, Martin and Daubert, Jörg and Ravkin, Herman and Lischka, Mario Curry, Edward and Wahlster, Wolfgang (eds.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, Springer, pp. 119-141, DOI: 10.1007/978-3-319-21569-3,
[Book Section]

Book

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Conference or Workshop Item

Büscher, Niklas and Demmler, Daniel and Karvelas, Nikolaos and Katzenbeisser, Stefan and Krämer, Juliane and Rathee, Deevashwer and Schneider, Thomas and Struck, Patrick (2020):
Secure two-party computation in a post-quantum world.
In: 18th International Conference on Applied Cryptography and Network Security (ACNS'20), Rome, Italy, 19.-22.10.2020, [Online-Edition: https://sites.google.com/di.uniroma1.it/ACNS2020/],
[Conference or Workshop Item]

Holz, Marco and Kiss, Ágnes and Rathee, Deevashwer and Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
In: 25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Online-Edition: https://www.surrey.ac.uk/esorics-2020],
[Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
In: 15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Online-Edition: https://www.ares-conference.eu/],
[Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, In: Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Online-Edition: https://irtf.org/anrw/2020/],
[Conference or Workshop Item]

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
In: 23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
In: 24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Online-Edition: https://encrypto.de/papers/TMWSK20.pdf],
[Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, In: 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Online-Edition: https://dsn2020.webs.upv.es/],
[Conference or Workshop Item]

Brandt, Markus and Orlandi, Claudio and Shrishak, Kris and Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
In: SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Online-Edition: http://www.secrypt.icete.org/],
[Conference or Workshop Item]

Dalskov, Anders and Keller, Marcel and Orlandi, Claudio and Shrishak, Kris and Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
In: ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference or Workshop Item]

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference or Workshop Item]

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference or Workshop Item]

Fischlin, Marc and Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, pp. 521-541, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference or Workshop Item]

Mantz, Dennis and Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]

Maass, Max and Schwär, Stephan and Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: LNCS, In: Privacy Technologies and Policy, In: Annual Privacy Forum 2019, Rome, Italy, June 7th and 8th, 2019, DOI: 10.1007/978-3-030-21752-5_2,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8725],
[Conference or Workshop Item]

Maass, Max and Schwär, Stephan and Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: Annual Privacy Forum (LNCS), In: Proceedings of the Annual Privacy Forum 2019, Rome, Italy, Rome, [Online-Edition: https://maass.xyz/publication/maass-2019-b/maass-2019-b.pdf],
[Conference or Workshop Item]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Maass, Max and Walter, Nicolas and Herrmann, Dominik and Hollick, Matthias (2019):
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
In: Wirtschaftsinformatik 2019, Siegen, Germany, 25-27.2.2019, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8515],
[Conference or Workshop Item]

Grube, Tim and Daubert, Jörg and Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, In: IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Online-Edition: https://ieeexplore.ieee.org/document/8647607],
[Conference or Workshop Item]

Weiler, Michael (2018):
Measuring Real-World Tie Strength with Digital Footprint Data: An Assessment of Convergent Validity.
San Francisco, CA, USA, December 13-16, 2018, [Online-Edition: https://aisel.aisnet.org/icis2018/social/Presentations/1],
[Conference or Workshop Item]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, pp. 1-6, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya and Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, pp. 2300-2302, DOI: 10.1145/3243734.3278521,
[Conference or Workshop Item]

Stute, Milan and Maass, Max and Schons, Tom and Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: Proceedings of MSWiM '17, 2. updated version,
In: The 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, November 21-25, 2017, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7682],
[Conference or Workshop Item]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, pp. 24-31, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference or Workshop Item]

Grube, Tim and Thummerer, Markus and Daubert, Jörg and Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
10547In: Lecture Notes in Computer Science, In: Security and Trust Management. STM 2017., Oslo, Norway, Springer, In: 13th International Workshop on Security and Trust Management, Oslo, Norway, pp. 213-223, DOI: 10.1007/978-3-319-68063-7_15,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...],
[Conference or Workshop Item]

Maass, Max and Laubach, Anne and Herrmann, Dominik (2017):
PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
In: Proceedings of INFORMATIK 2017, Leipzig, Deutschland, [Online-Edition: https://arxiv.org/abs/1705.08889],
[Conference or Workshop Item]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, pp. 1-10, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, pp. 118–134, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Funke, Sebastian Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, pp. 1-10, [Conference or Workshop Item]

Maass, Max and Wichmann, Pascal and Pridöhl, Henning and Herrmann, Dominik (2017):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
In: Proceedings of the Annual Privacy Forum 2017, Springer, Annual Privacy Forum 2017, Vienna, ISBN 978-3-319-67280-9,
DOI: 10.1007/978-3-319-67280-9_10,
[Online-Edition: https://arxiv.org/abs/1705.05139],
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, pp. 1-8, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), pp. 337-340, DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference or Workshop Item]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 15:1-15:8, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference or Workshop Item]

Brendel, J. and Demirel, D. (2016):
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 543-550, DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, pp. 738-744, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Report

Daubert, Jörg (2017):
GRK 2050: D.4 AlterEgo.
Schloß Dagstuhl, Germany, Schloß Dagstuhl, [Report]

Ph.D. Thesis

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität, DOI: 10.25534/tuprints-00009642,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9642],
[Ph.D. Thesis]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Ph.D. Thesis]

Schürmann, Tim (2019):
Evaluation bayesianischer kognitiver Modelle in der Vorhersage menschlichen Verhaltens.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8601],
[Ph.D. Thesis]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Ph.D. Thesis]

Grube, Tim (2018):
Efficient Anonymous Group Communication.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7704],
[Ph.D. Thesis]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],
[Ph.D. Thesis]

Master Thesis

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

Bachelor Thesis

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Other

Maass, Max (2017):
Web-Privacy: Lustwandeln im Trackergarten.
MRMCD 2017, [Online-Edition: https://media.ccc.de/v/DC9AG9],
[Other]

This list was generated on Thu Aug 6 01:54:09 2020 CEST.