TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z | Á | Č
Number of items at this level: 1875.

A

Ashihmin, Alexander and Piskunov, Maxim and Roisman, Ilia and Yanovsky, Vycheslav (2019):
Thermal stability control of the water-in-diesel microemulsion fuel produced by using a nonionic surfactant combined with aliphatic alcohols.
In: Journal of Dispersion Science and Technology, Taylor & Francis online, pp. 1-8, ISSN 0193-2691,
DOI: 10.1080/01932691.2019.1634583,
[Online-Edition: https://doi.org/10.1080/01932691.2019.1634583],
[Article]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien N. and Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: Proceedings of the 16th International Conference on Mining Software Repositories, k.A., IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, In: MSR, [Online-Edition: https://conf.researchr.org/home/msr-2019],
[Conference or Workshop Item]

Aschermann, Cornelius and Frassetto, Tommaso and Holz, Thorsten and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Antritter, Thomas and Hachmann, Peter and Gambaryan-Roisman, Tatiana and Buck, Bernhard and Stephan, Peter (2019):
Spreading of Micrometer-Sized Droplets under the Influence of Insoluble and Soluble Surfactants: A Numerical Study.
In: Colloids and Interfaces, Molecular Diversity Preservation International (MDPI), p. 56, 3, (3), ISSN 2504-5377,
DOI: 10.3390/colloids3030056,
[Online-Edition: https://doi.org/10.3390/colloids3030056],
[Article]

Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/larissaaldehoff/2019/1798_Lariss...],
[Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Kamp, Laurenz and Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
In: 2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: 28th Crypto-Day, München, Deutschland, In: GI, [Conference or Workshop Item]

Albrecht, Martin R. and Curtis, Benjamin R. and Deo, Amit and Davidson, Alex and Player, Rachel and Postlethwaite, Eamonn W. and Virdia, Fernando and Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: SCN 2018, In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, In: LNCS, [Online-Edition: http://scn.di.unisa.it/],
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, New York, NY, USA, ACM, Budapest, HU, 20-25 August 2018, [Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Chandy, John A. and Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, MDPI, Volume 2, (7), DOI: 10.3390/cryptography2020007,
[Article]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, MDPI, 2, (3), ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Article]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Alobaid, Falah and Al-Maliki, Wisam Abed Kattea and Lanz, Thomas and Haaf, Martin and Brachthäuser, Andreas and Epple, Bernd and Zorbach, Ingo (2018):
Dynamic simulation of a municipal solid waste incinerator.
In: Energy, pp. 230-249, 149, ISSN 03605442,
DOI: 10.1016/j.energy.2018.01.170,
[Online-Edition: https://doi.org/10.1016/j.energy.2018.01.170],
[Article]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: CoRR, abs/1801.05764, [Online-Edition: http://arxiv.org/abs/1801.05764],
[Article]

Aygüler, Meltem F. and Hufnagel, Alexander G. and Rieder, Philipp and Wussler, Michael and Jaegermann, Wolfram and Bein, Thomas and Dyakonov, Vladimir and Petrus, Michiel L. and Baumann, Andreas and Docampo, Pablo (2018):
Influence of Fermi Level Alignment with Tin Oxide on the Hysteresis of Perovskite Solar Cells.
In: ACS Applied Materials & Interfaces, pp. 11414-11419, 10, (14), ISSN 1944-8244,
DOI: 10.1021/acsami.8b00990,
[Online-Edition: https://doi.org/10.1021/acsami.8b00990],
[Article]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien and Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Article]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1, ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...],
[Article]

Anagnostopoulos, Nikolaos Athanasios and Gabmeyer, Sebastian and Arul, Tolga and Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference or Workshop Item]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
TU Darmstadt, [Master Thesis]

Albrecht, Martin and Göpfert, Florian and Vidria, Fernando and Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology, Springer, [Conference or Workshop Item]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, In: Lecture Notes in Computer Science, 10707, [Conference or Workshop Item]

Arias, Orlando and Gens, David and Jin, Yier and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Conference or Workshop Item]

Alexopoulos, Nikolaos and Daubert, Jörg and Mühlhäuser, Max and Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Kiayias, Aggelos and Talviste, Riivo and Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Online-Edition: https://www.usenix.org/conference/usenixsecurity17],
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Frieß, Tamara and Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session, Vancouver, Canada, [Other]

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, pp. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Online-Edition: https://encrypto.de/papers/ALSZ17.pdf],
[Article]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Alkeilani Alkadri, Nabil and Buchmann, Johannes and El Bansarkhani, Rachid and Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
[Other]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Eaton, Edward and Gutoski, Gus and Krämer, Juliane and Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Alam, Ehsanul and Yadav, S. and Schneider, J. and Gambaryan-Roisman, Tatiana (2017):
Imbibition of water into substrates prepared by thermal treatment of polydimethylsiloxane layers.
In: Colloids and Surfaces a-Physicochemical and Engineering Aspects, pp. 69-77, 521, ISSN 0927-7757,
[Online-Edition: https://doi.org/10.1016/j.colsurfa.2016.09.017],
[Article]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference or Workshop Item]

Ankele, Robin and Kucuk, Kubilay A. and Martin, Andrew and Simpson, Andrew and Paverd, Andrew (2017):
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
In: 13th IEEE International Conference on Advanced and Trusted Computing, ISBN 9781509027705,
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077,
[Conference or Workshop Item]

Avdic, Amer and Kuenne, Guido and di Mare, Francesca and Janicka, J. (2017):
LES combustion modeling using the Eulerian stochastic field method coupled with tabulated chemistry.
In: Combustion and Flame, pp. 201-219, 175, ISSN 0010-2180,
[Online-Edition: http://dx.doi.org/10.1016/j.combustflame.2016.06.015],
[Article]

Alobaid, Falah and Mertens, Nicolas and Starkloff, Ralf and Lanz, Thomas and Heinze, Christian and Epple, Bernd (2017):
Progress in dynamic simulation of thermal power plants.
In: Progress in Energy and Combustion Science, pp. 79-162, 59, ISSN 0360-1285,
[Online-Edition: http://dx.doi.org/10.1016/j.pecs.2016.11.001],
[Article]

Ariyanto, Teguh and Kern, Andreas M. and Etzold, Bastian J. M. and Zhang, Gui-Rong (2017):
Carbide-derived carbon with hollow core structure and its performance as catalyst support for methanol electro-oxidation.
In: Electrochemistry Communications, pp. 12-15, 82, ISSN 13882481,
DOI: 10.1016/j.elecom.2017.07.010,
[Online-Edition: https://doi.org/10.1016/j.elecom.2017.07.010],
[Article]

Angelberger, C. and Nicollet, Franck and Krüger, Christian and Schorr, Jürgen and Nicoud, Edouard and Colin, Olivier and Angelberger, Christian and Bode, Johannes and Böhm, Benjamin (2017):
A PIV-Guided Large-Eddy Simulation of In-Cylinder Flows.
In: Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles, p. 28, 72, (5), ISSN 1294-4475,
DOI: 10.2516/ogst/2017022,
[Online-Edition: https://doi.org/10.2516/ogst/2017022],
[Article]

Acosta, Matias and Detsch, Rainer and Grünewald, Alina and Rojas, Virginia and Schultheiß, Jan and Wajda, Aleksandra and Stark, Robert W. and Narayan, Suman and Sitarz, Maciej and Koruza, Jurij and Boccaccini, Aldo R. (2017):
Cytotoxicity, chemical stability, and surface properties of ferroelectric ceramics for biomaterials.
In: Journal of the American Ceramic Society, pp. 440-449, 101, (1), ISSN 00027820,
DOI: 10.1111/jace.15193,
[Online-Edition: https://doi.org/10.1111/jace.15193],
[Article]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Appel, Michael and Bossert, Andreas and Cooper, Steven and Kußmaul, Tobias and Löffler, Johannes and Pauer, Christof and Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Ali, Azmzt and Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2016):
StubDroid: automatic inference of precise data-flow summaries for the android framework.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884816,
[Conference or Workshop Item]

Alber, Gernot and Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, [Article]

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Akleylek, Sedat and Dagdelen, Özgür and Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: Cryptography and Information Security in the Balkans, Springer, Koper, Slovenia, In: LNCS, 9540, [Conference or Workshop Item]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Al-Maliki, Wisam Abed Kattea and Alobaid, Falah and Kez, Vitali and Epple, Bernd (2016):
Modelling and dynamic simulation of a parabolic trough power plant.
In: Journal of Process Control, pp. 123-138, 39, ISSN 0959-1524,
[Online-Edition: http://dx.doi.org/10.1016/j.jprocont.2016.01.002],
[Article]

Avdic, A. and Kuenne, G. and Janicka, J. (2016):
Flow Physics of a Bluff-Body Swirl Stabilized Flame and their Prediction by Means of a Joint Eulerian Stochastic Field and Tabulated Chemistry Approach.
In: Flow Turbulence and Combustion, pp. 1185-1210, 97, (4), ISSN 1386-6184,
[Online-Edition: http://dx.doi.org/10.1007/s10494-016-9781-y],
[Article]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Computational Security of Quantum Encryption - QCRYPT 2016, Springer, Wahington, D.C., USA, In: Lecture Notes in Computer Science - ICITS, [Other]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: OOPSLA Onward!, Piitsburgh, 25.10.2015, In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Askarov, Aslan and Chong, Stephen and Mantel, Heiko (2015):
Hybrid Monitors for Concurrent Noninterference.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society, Verona, Italy, ISBN 978-1-4673-7539-9,
DOI: 10.1109/CSF.2015.17,
[Conference or Workshop Item]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
[Other]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
TU Darmstadt, [Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt, [Master Thesis]

Acosta, Matias and Liu, Na and Deluca, Marco and Heidt, Sabrina and Ringl, Ines and Dietz, Christian and Stark, Robert W. and Jo, Wook (2015):
Tailoring ergodicity through selective A-site doping in the Bi1/2Na1/2TiO3–Bi1/2K1/2TiO3 system.
In: Journal of Applied Physics, AIP Publishing, pp. 134106(1-8), 117, (13), ISSN 0021-8979,
[Online-Edition: http://dx.doi.org/10.1063/1.4916719],
[Article]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Online-Edition: https://encrypto.de/papers/ARSTZ15.pdf],
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Online-Edition: https://encrypto.de/papers/ALSZ15.pdf],
[Conference or Workshop Item]

Alhamoud, Alaa and Xu, Pei and Englert, Frank and Scholl, Philipp and Nguyen, The An Binh and Böhnstedt, Doreen and Steinmetz, Ralf (2015):
Evaluation of User Feedback in Smart Home for Situational Context Identification.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8426-8,
DOI: 10.1109/PERCOMW.2015.7133987,
[Conference or Workshop Item]

Abele, Eberhard and Stoffregen, Hanns A. and Kniepkamp, Michael and Lang, Sebastian and Hampe, Manfred (2015):
Selective laser melting for manufacturing of thin-walled porous elements.
In: Journal of Materials Processing Technology, pp. 114-122, 215, ISSN 0924-0136,
[Online-Edition: http://dx.doi.org/10.1016/j.jmatprotec.2014.07.017],
[Article]

Alobaid, Falah and Starkloff, Ralf and Pfeiffer, Stefan and Karner, Karl and Epple, Bernd and Kim, Hyun-Gee (2015):
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part A: Part loads and off-design operation.
In: Fuel, pp. 692-706, 153, ISSN 0016-2361,
[Online-Edition: http://dx.doi.org/10.1016/j.fuel.2015.02.010],
[Article]

Alobaid, Falah and Starkloff, Ralf and Pfeiffer, Stefan and Karner, Karl and Epple, Bernd and Kim, Hyun-Gee (2015):
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part B: Start-up procedure.
In: Fuel, pp. 707-716, 153, ISSN 0016-2361,
[Online-Edition: http://dx.doi.org/10.1016/j.fuel.2015.02.011],
[Article]

Albert, C. and Kromer, Johannes and Robertson, A. M. and Bothe, D. (2015):
Dynamic behaviour of buoyant high viscosity droplets rising in a quiescent liquid.
In: Journal of Fluid Mech., Cambridge University Press, pp. 485-533, 778, [Article]

Aghajari, Nima and Schaefer, Michael (2015):
Efficient shape optimization for fluid-structure interaction problems.
In: Journal of Fluids and Structures, pp. 298-313, 57, ISSN 0889-9746,
[Online-Edition: http://dx.doi.org/10.1016/j.jfluidstructs.2015.06.011],
[Article]

Abe, Ken and Giga, Yoshikazu and Hieber, Matthias (2015):
STOKES RESOLVENT ESTIMATES IN SPACES OF BOUNDED FUNCTIONS.
In: Annales Scientifiques De L Ecole Normale Superieure, pp. 537-559, 48, (3), ISSN 0012-9593,
[Article]

Alobaid, Falah and Ohlemueller, Peter and Stroehle, Jochen and Epple, Bernd (2015):
Extended Euler-Euler model for the simulation of a 1 MWth chemical-looping pilot plant.
In: Energy, pp. 2395-2405, 93, ISSN 0360-5442,
[Online-Edition: http://dx.doi.org/10.1016/j.energy.2015.10.107],
[Article]

Albert, C. and Kromer, Johannes and Robertson, A. M. and Bothe, D. (2015):
Dynamic behaviour of buoyant high viscosity droplets rising in a quiescent liquid.
In: Journal of Fluid Mechanics, 778, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2015.393],
[Article]

Ardham, Vikram Reddy and Deichmann, Gregor and van der Vegt, Nico F. A. and Leroy, Frederic (2015):
Solid-liquid work of adhesion of coarse-grained models of n-hexane on graphene layers derived from the conditional reversible work method.
In: The Journal of chemical physics, p. 243135, 143, (24), ISSN 0021-9606,
[Online-Edition: http://dx.doi.org/10.1063/1.4936253],
[Article]

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, Scottsdale, AZ, USA, In: ACM, [Conference or Workshop Item]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias
Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, pp. 1189-1206, 102, (8), [Article]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Public-Key Cryptography PKC 2014, In: Lecture Notes in Computer Science, 8383, [Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Albrecht, Martin and Fitzpatrick, Robert and Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and El Bansarkhani, Rachid and Cayrel, Pierre-Louis and Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Alkassar, Ammar and Heuser, Stephan and Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, pp. 209-232, 67, (2), [Article]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), pp. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, [Conference or Workshop Item]

B

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
In: ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019, k.A., Springer, [Conference or Workshop Item]

Bindel, Nina and Braun, Johannes and Gladiator, Luca and Stöckert, Tobias and Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, The Open Journal, 4, (40), ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Bock, Carsten and Brasser, Ferdinand and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, In: ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: Proceeding of the INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2019, Springer, [Conference or Workshop Item]

Batina, Lejla and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Ph.D. Thesis]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, Springer, pp. 276-280, 43, (5), ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Baumli, Philipp and Teisala, Hannu and Bauer, Hoimar and Garcia‐Gonzalez, Diana and Damle, Viraj and Geyer, Florian and D'Acunzi, Maria and Kaltbeitzel, Anke and Butt, Hans‐Jürgen and Vollmer, Doris (2019):
Flow‐Induced Long‐Term Stable Slippery Surfaces.
In: Advanced Science, p. 1900019, ISSN 2198-3844,
DOI: 10.1002/advs.201900019,
[Online-Edition: https://doi.org/10.1002/advs.201900019],
[Article]

Brasser, Ferdinand and Gens, David and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Becker, Lukas G. and von Langenthal, Thomas and Pielsticker, Stefan and Böhm, Benjamin and Kneer, Reinhold and Dreizler, Andreas (2019):
Experimental investigation of particle-laden flows in an oxy-coal combustion chamber for non-reacting conditions.
In: Fuel, pp. 753-762, 235, ISSN 00162361,
DOI: 10.1016/j.fuel.2018.08.076,
[Online-Edition: https://doi.org/10.1016/j.fuel.2018.08.076],
[Article]

Bender, Achim and Stroh, Alexander and Frohnapfel, Bettina and Stephan, Peter and Gambaryan-Roisman, Tatiana (2019):
Combined direct numerical simulation and long-wave simulation of a liquid film sheared by a turbulent gas flow in a channel.
In: Physics of Fluids, pp. 022103, 31, (2), DOI: 10.1063/1.5064423,
[Online-Edition: https://doi.org/10.1063/1.5064423],
[Article]

Brumm, Pauline and Sauer, Hans Martin and Dörsam, Edgar (2019):
Scaling Behavior of Pattern Formation in the Flexographic Ink Splitting Process.
In: Colloids and Interfaces, p. 37, 3, (1), ISSN 2504-5377,
DOI: 10.3390/colloids3010037,
[Online-Edition: https://www.mdpi.com/2504-5377/3/1/37],
[Article]

Bürkle, Sebastian and Becker, Lukas G. and Agizza, Maria A. and Dreizler, Andreas and Wagner, Steven (2019):
Comparison of two measurement strategies to obtain the residence time distribution in combustion chambers using tunable diode laser absorption spectroscopy.
In: Applied Optics, pp. C36, 58, (10), ISSN 1559-128X,
DOI: 10.1364/ao.58.000c36,
[Online-Edition: https://doi.org/10.1364/ao.58.000c36],
[Article]

Bruce, Ellen E. and Bui, Pho T. and Rogers, Bradley A. and Cremer, Paul S. and van der Vegt, Nico F. A. (2019):
Nonadditive Ion Effects Drive Both Collapse and Swelling of Thermoresponsive Polymers in Water.
In: Journal of the American Chemical Society, pp. 6609-6616, 141, (16), ISSN 0002-7863,
DOI: 10.1021/jacs.9b00295,
[Online-Edition: https://doi.org/10.1021/jacs.9b00295],
[Article]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria:, 18.-19.2.2019, [Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Conference or Workshop Item]

Bock, Estuardo Alpirez and Brzuska, Chris and Fischlin, Marc and Janson, Christian and Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1014.pdf],
[Article]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Ph.D. Thesis]

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Calotoiu, Alexandru and Wunderer, Thomas and Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference or Workshop Item]

Baier, Tobias and Tiwari, Sudarshan and Shrestha, Samir and Klar, Axel and Hardt, Steffen (2018):
Thermophoresis of Janus particles at large Knudsen numbers.
In: Physical Review Fluids, 3, (094202), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.094202,
[Online-Edition: https://link.aps.org/doi/10.1103/PhysRevFluids.3.094202],
[Article]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference or Workshop Item]

Butt, Hans-Jürgen and Berger, Rüdiger and Steffen, Werner and Vollmer, Doris and Weber, Stefan A. L. (2018):
Adaptive Wetting – Adaptation in Wetting.
In: Langmuir, pp. 11292-11304, 34, (38), ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.8b01783,
[Online-Edition: https://doi.org/10.1021/acs.langmuir.8b01783],
[Article]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor Thesis]

Bindel, Nina and Buchmann, Johannes and Göpfert, Florian and Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Biondo, Andrea and Conti, Mauro and Davi, Lucas and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium, [Conference or Workshop Item]

Bielsa, Guillermo and Palacios, Joan and Loch, Adrian and Steinmetzer, Daniel and Cesari, Paolo and Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master Thesis]

Bender, Achim and Hänichen, Philipp and Stephan, Peter and Gambaryan-Roisman, Tatiana (2018):
Modeling Crystallization and Heat Transfer in an Evaporating Urea-Water Drop.
In: IHTC 16 - International Heat Transfer Conference 16 Digital Libary, August 10-15, Beijing, China, Begellhouse, ISSN 2377-424X,
DOI: 10.1615/IHTC16,
[Online-Edition: http://dx.doi.org/10.1615/IHTC16.mpf.022242],
[Article]

Backes, Sebastian and von Klitzing, Regine (2018):
Nanomechanics and Nanorheology of Microgels at Interfaces.
In: Polymers, p. 978, 10, (9), ISSN 2073-4360,
DOI: 10.3390/polym10090978,
[Online-Edition: https://doi.org/10.3390/polym10090978],
[Article]

Bakhshandeh Chamazkoti, Rohollah and Oberlack, Martin (2018):
Geometry of two-point velocity correlation tensor of homogeneous isotropic turbulence with helicity in sol-manifold coordinates.
In: Journal of Mathematical Physics, p. 103507, 59, (10), ISSN 0022-2488,
DOI: 10.1063/1.5048802,
[Online-Edition: https://doi.org/10.1063/1.5048802],
[Article]

Boyaciyan, D. and Krause, P. and von Klitzing, R. (2018):
Making strong polyelectrolyte brushes pH-sensitive by incorporation of gold nanoparticles.
In: Soft Matter, pp. 4029-4039, 14, (20), ISSN 1744-683X,
DOI: 10.1039/c8sm00411k,
[Online-Edition: https://doi.org/10.1039/c8sm00411k],
[Article]

Bürkle, Sebastian and Dreizler, Andreas and Ebert, Volker and Wagner, Steven (2018):
Experimental comparison of a 2D laminar diffusion flame under oxy-fuel and air atmosphere.
In: Fuel, pp. 302-308, 212, ISSN 00162361,
DOI: 10.1016/j.fuel.2017.10.067,
[Online-Edition: https://doi.org/10.1016/j.fuel.2017.10.067],
[Article]

Bender, Achim and Stephan, Peter and Gambaryan-Roisman, Tatiana (2018):
Numerical investigation of the evolution and breakup of an evaporating liquid film on a structured wall.
In: International Journal of Heat and Fluid Flow, pp. 104 - 113, 70, ISSN 0142-727X,
DOI: 10.1016/j.ijheatfluidflow.2018.01.013,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.01.013],
[Article]

Breitenbach, Jan and Roisman, Ilia V. and Tropea, Cameron (2018):
From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59, (3), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2514-3,
[Online-Edition: https://doi.org/10.1007/s00348-018-2514-3],
[Article]

Breitenbach, Jan and Roisman, Ilia V. and Tropea, Cameron (2018):
Publisher Correction: From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59, (5), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2535-y,
[Online-Edition: https://doi.org/10.1007/s00348-018-2535-y],
[Article]

Bruce, Ellen E. and van der Vegt, Nico F. A. (2018):
Does an electronic continuum correction improve effective short-range ion-ion interactions in aqueous solution?
In: The Journal of Chemical Physics, p. 222816, 148, (22), ISSN 0021-9606,
DOI: 10.1063/1.5017101,
[Online-Edition: https://doi.org/10.1063/1.5017101],
[Article]

Bürkle, Sebastian and Becker, Lukas Georg and Dreizler, Andreas and Wagner, Steven (2018):
Experimental investigation of the flue gas thermochemical composition of an oxy-fuel swirl burner.
In: Fuel, pp. 61-72, 231, ISSN 00162361,
DOI: 10.1016/j.fuel.2018.05.039,
[Online-Edition: https://doi.org/10.1016/j.fuel.2018.05.039],
[Article]

Bürkle, Sebastian and Biondo, Luigi and Ding, Carl-Philipp and Honza, Rene and Ebert, Volker and Böhm, Benjamin and Wagner, Steven (2018):
In-Cylinder Temperature Measurements in a Motored IC Engine using TDLAS.
In: Flow, Turbulence and Combustion, pp. 139-159, 101, (1), ISSN 1386-6184,
DOI: 10.1007/s10494-017-9886-y,
[Online-Edition: https://doi.org/10.1007/s10494-017-9886-y],
[Article]

Bürkle, Sebastian and Walter, Nicole and Wagner, Steven (2018):
Laser-based measurements of pressure broadening and pressure shift coefficients of combustion-relevant absorption lines in the near-infrared region.
In: Applied Physics B, 124, (6), ISSN 0946-2171,
DOI: 10.1007/s00340-018-6993-y,
[Online-Edition: https://doi.org/10.1007/s00340-018-6993-y],
[Article]

Benneckendorf, Frank S. and Hillebrandt, Sabina and Ullrich, Florian and Rohnacher, Valentina and Hietzschold, Sebastian and Jänsch, Daniel and Freudenberg, Jan and Beck, Sebastian and Mankel, Eric and Jaegermann, Wolfram and Pucci, Annemarie and Bunz, Uwe H. F. and Müllen, Klaus (2018):
Structure–Property Relationship of Phenylene-Based Self-Assembled Monolayers for Record Low Work Function of Indium Tin Oxide.
In: The Journal of Physical Chemistry Letters, pp. 3731-3737, 9, (13), ISSN 1948-7185,
DOI: 10.1021/acs.jpclett.8b01242,
[Online-Edition: https://doi.org/10.1021/acs.jpclett.8b01242],
[Article]

Bibouche, Bachir and Peral, Daniel and Stehl, Dmitrij and Söderholm, Viktor and Schomäcker, Reinhard and von Klitzing, Regine and Vogt, Dieter (2018):
Multiphasic aqueous hydroformylation of 1-alkenes with micelle-like polymer particles as phase transfer agents.
In: RSC Advances, pp. 23332-23338, 8, (41), ISSN 2046-2069,
DOI: 10.1039/c8ra04022b,
[Online-Edition: https://doi.org/10.1039/c8ra04022b],
[Article]

Barz, Dominik P. J. and Scholz, Mathias and Hardt, Steffen (2018):
Electrokinetic manipulation of the von Kármán vortex street in the wake of a confined cylinder. I. DC electric field.
In: Physics of Fluids, pp. 082004, 30, (8), ISSN 1070-6631,
DOI: 10.1063/1.5037595,
[Online-Edition: https://doi.org/10.1063/1.5037595],
[Article]

Boyaciyan, Dikran and Braun, Larissa and Löhmann, Oliver and Silvi, Luca and Schneck, Emanuel and von Klitzing, Regine (2018):
Gold nanoparticle distribution in polyelectrolyte brushes loaded at different pH conditions.
In: The Journal of Chemical Physics, p. 163322, 149, (16), ISSN 0021-9606,
DOI: 10.1063/1.5035554,
[Online-Edition: https://doi.org/10.1063/1.5035554],
[Article]

Brasser, Ferdinand and Davi, Lucas and Dhavlle, Abhijitt and Frassetto, Tommaso and Dinakarrao, Sai Manoj Pudukotai and Rafatirad, Setareh and Sadeghi, Ahmad-Reza and Sasan, Avesta and Sayadi, Hossein and Zeitouni, Shaza and Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Piscataway, NJ, USA, IEEE Press, In: Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, In: CASES '18, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283552.3283567],
[Conference or Workshop Item]

Batzdorf, Stefan and Gambaryan-Roisman, Tatiana and Stephan, Peter (2018):
Direct Numerical Simulation of the Microscale Fluid Flow and Heat Transfer in the Three-Phase Contact Line Region During Evaporation.
In: Journal of Heat Transfer, pp. 032401-1, 140, (3), ISSN 00221481,
DOI: 10.1115/1.4038191,
[Online-Edition: http://dx.doi.org/10.1115/1.4038191],
[Article]

Buchmann, Johannes and Holzer, Patrick and Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
TU Darmstadt, [Master Thesis]

Bindel, Nina and Krämer, Juliane and Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion, Springer, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc
Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Bender, Achim and Stephan, Peter and Gambaryan-Roisman, Tatiana (2017):
Thin liquid films with time-dependent chemical reactions sheared by an ambient gas flow.
In: Physical Review Fluids, pp. 084002-1, 2, (8), ISSN 2469-990X,
[Online-Edition: https://doi.org/10.1103/PhysRevFluids.2.084002],
[Article]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium, In: USENIX Security '17, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian
Katz, Jonathan and Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Buchmann, Johannes and Lauter, Kristin and Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, pp. 12-13, 15, [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, pp. 37-43, 15, (4), DOI: 10.1109/MSP.2017.3151334,
[Article]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt, [Master Thesis]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, 2017, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Billes, Marina and Møller, Anders and Pradel, Michael (2017):
Systematic Black-Box Analysis of Collaborative Web Applications.
In: PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM New York, NY, USA, Barcelona, Spain, ISBN 978-1-4503-4988-8,
DOI: 10.1145/3062341.3062363,
[Conference or Workshop Item]

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Conference or Workshop Item]

Bindel, Nina and Herath, Udyani and McKague, Matthew and Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Demirel, Denise and Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2, (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, [Conference or Workshop Item]

Böhm, A. and Biesalski, M. (2017):
Paper-based microfluidic devices: A complex low-cost material in high-tech applications.
In: MRS Bulletin, pp. 356-364, 42, (05), ISSN 0883-7694,
DOI: 10.1557/mrs.2017.92,
[Online-Edition: https://doi.org/10.1557/mrs.2017.92],
[Article]

Baier, Tobias and Hardt, Steffen and Shahabi, Vahid and Roohi, Ehsan (2017):
Knudsen pump inspired by Crookes radiometer with a specular wall.
In: Physical Review Fluids, pp. 033401, 2, (3), ISSN 2469-990X,
[Online-Edition: http://dx.doi.org/10.1103/PhysRevFluids.2.033401],
[Article]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIACCS 2017 - ACM Asia Conference on Computer and Communications Security, Springer, Abu Dhabi, UAE, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas and Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, In: LNCS, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Bork, B. and Preusche, A. and Weckenmann, F. and Lamanna, G. and Dreizler, A. (2017):
Measurement of species concentration and estimation of temperature in the wake of evaporating n-heptane droplets at trans-critical conditions.
In: Proceedings of the Combustion Institute, pp. 2433-2440, 36, (2), ISSN 1540-7489,
[Online-Edition: http://dx.doi.org/10.1016/j.proci.2016.07.037],
[Article]

Becker, Lukas G. and Kosaka, Hidemasa and Böhm, Benjamin and Doost, Samim and Knappstein, Robert and Habermehl, Martin and Kneer, Reinhold and Janicka, J. and Dreizler, Andreas (2017):
Experimental investigation of flame stabilization inside the quarl of an oxyfuel swirl burner.
In: Fuel, pp. 124-135, 201, ISSN 00162361,
[Online-Edition: https://doi.org/10.1016/j.fuel.2016.09.002],
[Article]

Breitenbach, Jan and Roisman, Ilia V. and Tropea, Cameron (2017):
Heat transfer in the film boiling regime: Single drop impact and spray cooling.
In: International Journal of Heat and Mass Transfer, pp. 34-42, 110, ISSN 00179310,
[Online-Edition: https://doi.org/10.1016/j.ijheatmasstransfer.2017.03.004],
[Article]

Breitenbach, Jan and Roisman, Ilia V. and Tropea, Cameron (2017):
Drop collision with a hot, dry solid substrate: Heat transfer during nucleate boiling.
In: Physical Review Fluids, 2, (7), ISSN 2469-990X,
[Online-Edition: https://doi.org/10.1103/PhysRevFluids.2.074301],
[Article]

Bürkle, Sebastian and Becker, Lukas G. and Agizza, Maria Angela and Dreizler, Andreas and Ebert, Volker and Wagner, Steven (2017):
In-situ measurement of residence time distributions in a turbulent oxy-fuel gas-flame combustor.
In: Experiments in Fluids, 58, (7), ISSN 0723-4864,
[Online-Edition: https://doi.org/10.1007/s00348-017-2366-2],
[Article]

Braun, Larissa and Uhlig, Martin and von Klitzing, Regine and Campbell, Richard A. (2017):
Polymers and surfactants at fluid interfaces studied with specular neutron reflectometry.
In: Advances in Colloid and Interface Science, pp. 130-148, 247, ISSN 00018686,
DOI: 10.1016/j.cis.2017.07.005,
[Online-Edition: https://doi.org/10.1016/j.cis.2017.07.005],
[Article]

Backes, Sebastian and Krause, Patrick and Tabaka, Weronika and Witt, Marcus U. and Mukherji, Debashish and Kremer, Kurt and von Klitzing, Regine (2017):
Poly(N-isopropylacrylamide) Microgels under Alcoholic Intoxication: When a LCST Polymer Shows Swelling with Increasing Temperature.
In: ACS Macro Letters, pp. 1042-1046, 6, (10), ISSN 2161-1653,
DOI: 10.1021/acsmacrolett.7b00557,
[Online-Edition: https://doi.org/10.1021/acsmacrolett.7b00557],
[Article]

Bothe, Dieter and Denk, Robert and Hieber, Matthias and Schnaubelt, Roland and Simonett, Gieri and Wilke, Mathias and Zacher, Rico (2017):
Special Issue: Parabolic Evolution Equations, Maximal Regularity, and Applications - Dedicated to Jan Pruss Preface.
In: Journal of Evolution Equations, pp. 1-15, 17, (1), ISSN 1424-3199,
[Online-Edition: http://dx.doi.org/10.1007/s00028-017-0387-1],
[Article]

Bothe, D. and Fischer, A. and Pierre, M. and Rolland, G. (2017):
Global wellposedness for a class of reaction-advection-anisotropic-diffusion systems.
In: Journal of Evolution Equations, pp. 101-130, 17, (1), ISSN 1424-3199,
[Online-Edition: http://dx.doi.org/10.1007/s00028-016-0348-0],
[Article]

Bothe, D. and Kashiwabara, T. and Koehne, M. (2017):
Strong well-posedness for a class of dynamic outflow boundary conditions for incompressible Newtonian flows.
In: Journal of Evolution Equations, pp. 131-171, 17, (1), ISSN 1424-3199,
[Online-Edition: http://dx.doi.org/10.1007/s00028-016-0352-4],
[Article]

Batzdorf, Stefan and Breitenbach, Jan and Schlawitschek, Christiane and Roisman, Ilia V. and Tropea, Cameron and Stephan, Peter and Gambaryan-Roisman, Tatiana (2017):
Heat transfer during simultaneous impact of two drops onto a hot solid substrate.
In: International Journal of Heat and Mass Transfer, pp. 898-907, 113, ISSN 0017-9310,
[Online-Edition: https://doi.org/10.1016/j.ijheatmasstransfer.2017.05.091],
[Article]

Bothe, D. and Koehne, M. and Maier, S. and Saal, J. (2017):
Global strong solutions for a class of heterogeneous catalysis models.
In: Journal of Mathematical Analysis and Applications, pp. 677-709, 445, (1), ISSN 0022-247X,
[Online-Edition: http://dx.doi.org/10.1016/j.jmaa.2016.08.016],
[Article]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference or Workshop Item]

Brendel, Jacqueline and Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Conference or Workshop Item]

Baumann, Peter and Katzenbeisser, Stefan and Stopczynski, Martin and Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Bekheet, Maged F. and Svoboda, Ingrid and Liu, Na and Bayarjargal, Lkhamsuren and Irran, Elisabeth and Dietz, Christian and Stark, Robert W. and Riedel, Ralf and Gurlo, Aleksander (2016):
Ferroelectric InMnO3: Growth of single crystals, structure and high-temperature phase transitions.
In: Journal of Solid State Chemistry, Elsevier, pp. 54-63, 241, ISSN 0022-4596,
[Online-Edition: http://dx.doi.org/10.1016/j.jssc.2016.05.031],
[Article]

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Bossert, Andreas and Cooper, Steven and Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis and Demirel, Denise and Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
[Other]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Buchmann, Johannes and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference or Workshop Item]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, pp. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, pp. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Buchmann, Johannes and Göpfert, Florian and Player, Rachel and Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Bernhard, David and Fischlin, Marc and Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, In: LNCS, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
TU Darmstadt, [Master Thesis]

Bruschewski, Martin and Scherhag, Christian and Schiffer, Heinz-Peter and Grundmann, Sven (2016):
Influence of Channel Geometry and Flow Variables on Cyclone Cooling of Turbine Blades.
In: ASME Journal of Turbomachinery, pp. 061005-061005, 138, (6), ISSN 0889-504X,
[Online-Edition: http://dx.doi.org/10.1115/1.4032363],
[Article]

Babu, Deepu J. and Kuehl, Frank G. and Yadav, Sandeep and Markert, Daniel and Bruns, Michael and Hampe, Manfred J. and Schneider, Joerg J. (2016):
Adsorption of pure SO2 on nanoscaled graphene oxide.
In: Rsc Advances, pp. 36834-36839, 6, (43), ISSN 2046-2069,
[Online-Edition: http://dx.doi.org/10.1039/c6ra07518e],
[Article]

Bachmann, Svenja and Schulze, Marcus and Morasch, Jan and Hesse, Sabine and Hussein, Laith and Krell, Lisa and Schnagl, Johann and Stark, Robert W. and Narayan, Suman (2016):
Aging of oxygen and hydrogen plasma discharge treated a-C:H and ta-C coatings.
In: Applied Surface Science, pp. 613-623, 371, ISSN 0169-4332,
[Online-Edition: http://dx.doi.org/10.1016/j.apsusc.2016.02.192],
[Article]

Bruschewski, Martin and Freudenhammer, Daniel and Buchenberg, Waltraud B. and Schiffer, Heinz-Peter and Grundmann, Sven (2016):
Estimation of the measurement uncertainty in magnetic resonance velocimetry based on statistical models.
In: Experiments in Fluids, 57, (5), ISSN 0723-4864,
[Online-Edition: http://dx.doi.org/10.1007/s00348-016-2163-3],
[Article]

Buchenberg, Waltraud B. and Wassermann, Florian and Grundmann, Sven and Jung, Bernd and Simpson, Robin (2016):
Acquisition of 3D Temperature Distributions in Fluid Flow Using Proton Resonance Frequency Thermometry.
In: Magnetic Resonance in Medicine, pp. 145-155, 76, (1), ISSN 0740-3194,
[Online-Edition: http://dx.doi.org/10.1002/mrm.25874],
[Article]

Blume, Niels Goeran and Ebert, Volker and Dreizler, Andreas and Wagner, Steven (2016):
Broadband fitting approach for the application of supercontinuum broadband laser absorption spectroscopy to combustion environments.
In: Measurement Science and Technology, 27, (1), ISSN 0957-0233,
[Online-Edition: http://dx.doi.org/10.1088/0957-0233/27/1/015501],
[Article]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference, ACM, In: DAC '16, [Conference or Workshop Item]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Bagci, Ibrahim Ethem and Roedig, Utz and Martinovic, Ivan and Schulz, Matthias and Hollick, Matthias (2015):
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: Using Channel State Information for Tamper Detection in the Internet of Things, ACM, Los Angeles, CA, USA, In: ACSAC 2015, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818028,
[Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Buescher, Niklas and Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag, TU Darmstadt, In: Tagungsband zum Deutschen IT-Sicherheitskonkress, 14, [Master Thesis]

Bucicoiu, Mihai and Davi, Lucas and Deaconescu, Razvan and Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Brzuska, Christina and Farshim, Pooya and Mittelbach, Arno
Dodis, Yevgeniy and Nielsen, Arno Buus (eds.) (2015):
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Theory of Cryptography. TCC 2015., Springer, Warsaw, Poland, In: Lecture Notes in Computer Science 9015, ISBN 978-3-662-46497-7,
DOI: 10.1007/978-3-662-46497-7_17,
[Conference or Workshop Item]

Burgstahler, D. and Pelzer, Matthias and Lotz, Andreas and Knapp, Fabian and Pu, Hongjun and Rueckelt, Tobias and Steinmetz, Ralf (2015):
A Concept for a C2X-based Crossroad Assistant.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8425-1,
DOI: 10.1109/PERCOMW.2015.7134063,
[Conference or Workshop Item]

Busold, Christoph and Heuser, Stephan and Rios, Jon and Sadeghi, Ahmad-Reza and Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13, [Article]

Barckmann, K. and Tropea, Cameron and Grundmann, S. (2015):
Attenuation of Tollmien-Schlichting Waves Using Plasma Actuator Vortex Generators.
In: Aiaa Journal, pp. 1384-U290, 53, (5), ISSN 0001-1452,
[Online-Edition: http://dx.doi.org/10.2514/1.j053043],
[Article]

Bohlin, Alexis and Mann, Markus and Patterson, Brian D. and Dreizler, Andreas and Kliewer, Christopher J. (2015):
Development of two-beam femtosecond/picosecond one-dimensional rotational coherent anti-Stokes Raman spectroscopy: Time-resolved probing of flame wall interactions.
In: Proceedings of the Combustion Institute, pp. 3723-3730, 35, ISSN 1540-7489,
[Article]

Bolkart, Martin and Hieber, Matthias (2015):
Pointwise upper bounds for the solution of the Stokes equation on L-sigma(infinity)(Omega) and applications.
In: Journal of Functional Analysis, pp. 1678-1710, 268, (7), ISSN 0022-1236,
[Article]

Bogris, A. and Juretzka, C. and Simos, H. and Syvridis, D. and Roditi, E. and Elsasser, W. and Carras, M. (2015):
Experimental investigation of intensity noise in injection locked mid-infrared quantum cascade lasers.
In: Proceedings of the SPIE, pp. 938210 (10 pp.)-938210 (10 pp.), 9382, ISSN 0277-786X,
[Article]

Bothe, D. and Dreyer, W. (2015):
Continuum thermodynamics of chemically reacting fluid mixtures.
In: Acta Mechanica, pp. 1757-1805, 226, (6), ISSN 0001-5970,
[Article]

Bernardin, John and Chiaramonte, Francis and Dhir, Vijay and Galloway, Jesse and Goodson, Ken and Incropera, Frank and Kabov, Oleg and Kaviany, Massoud and Kazimi, Mujid and Khusid, Boris and Kim, Jungho and Kim, Sung-Min and Lee, Jaeseon and Minkowycz, W. J. and Qu, Weilin and Rose, John and Sammakia, Bahgat and Stephan, Peter and Vafai, Kambiz and Wen, Chang-Da (2015):
Professor Issam Mudawar on his 60th birthday.
In: International Journal of Heat and Mass Transfer, pp. A1-A3, 89, ISSN 0017-9310,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatmasstransfer.2015.05.059],
[Article]

Bothe, Dieter and Rolland, Guillaume (2015):
Global Existence for a Class of Reaction-Diffusion Systems with Mass Action Kinetics and Concentration-Dependent Diffusivities.
In: Acta Applicandae Mathematicae, pp. 25-57, 139, (1), ISSN 0167-8019,
DOI: 10.1007/s10440-014-9968-y,
[Online-Edition: https://doi.org/10.1007/s10440-014-9968-y],
[Article]

Butin, Denis and Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Bollmann, Dominik and Lortz, Steffen and Mantel, Heiko and Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS), [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: Proceedings of the 30th Annual Computer Security Applications Conference, ACM, New Orleans, Louisiana, USA, In: ACSAC '14, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference or Workshop Item]

Brzuska, Christina and Mittelbach, Arno
Sarkar, Palash and Iwata, Tetsu (eds.) (2014):
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., Berlin, Heidelberg, Springer, pp. 142-161, DOI: 10.1007/978-3-662-45608-8_8,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-662-45608-8_...],
[Book Section]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha
Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Brzuska, Christina and Farshim, Pooya and Mittelbach, Arno
Garay, Arno A. and Gennaro, Rosario (eds.) (2014):
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., Springer, Santa Barbara, CA, USA, In: Lecture Notes in Computer Science 8616, 1, ISBN 978-3-662-44370-5,
DOI: 10.1007/978-3-662-44371-2_11,
[Conference or Workshop Item]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Online-Edition: https://encrypto.de/papers/BCFPSZ14.pdf],
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference or Workshop Item]

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Brzuska, Christina and Mittelbach, Arno (2014):
Using Indistinguishability Obfuscation via UCEs.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., Berlin, Heidelberg, Springer, pp. 22-141, DOI: 10.1007/978-3-662-45608-8,
[Book Section]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, pp. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, pp. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Buchner, Karolina and Lissermann, Roman and Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, ACM, [Conference or Workshop Item]

Biedermann, Sebastian and Karvelas, Nikolaos and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, pp. 114-125, 8327, [Article]

Biedermann, Sebastian and Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Bodden, Eric and Rasthofer, Siegfried and Richter, Philipp and Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, pp. 720 - 725, 11/2013, DOI: 10.1007/s11623-013-0300-1,
[Article]

Baumann, Paul and Kleiminger, Wilhelm and Santini, Silvia (2013):
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
In: The 19th Annual International Conference on Mobile Computing and Networking, ACM, Miami, FL, USA, In: MobiCom'13, ISBN 978-1-4503-1999-7/13/09,
DOI: 10.1145/2500423.2504583,
[Conference or Workshop Item]

Braun, Johannes and Kiefer, Franziskus and Hülsing, Andreas
Katsikas, Sokratis and Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, In: LNCS, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Bartsch, Steffen and Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt, [Master Thesis]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Baumöller, Claas and Schaaf, Joachim and Horsch, Moritz and Wiesmaier, Alexander and Braun, Johannes (2013):
EP 2600270 Identification element-based authentication and identification with decentralised service use.
[Standards, patents]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Bauer, Gerald and Blanke, Ulf and Lukowicz, Paul and Schiele, Bernt (2013):
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE Computer Society, San Diego, CA, USA, ISBN 978-1-4673-5075-4,
DOI: 10.1109/PerComW.2013.6529448,
[Conference or Workshop Item]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, pp. 84-96, 3, (1), [Article]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Braun, Johannes and Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander
Ryan, Mark and Smyth, Ben and Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012, Birmingham, UK, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes
Levi, Albert and Badra, Mohamad and Cesana, Matteo and Ghassemian, Mona and Jabeur, Nafaa and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bessani, Alysson and Abbadi, Imad M. and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marcelo and Schirmer, Norbert (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing, [Book]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013), London, UK, [Conference or Workshop Item]

Bartsch, Steffen and Sohr, Karsten and Bunke, Michaela and Hofrichter, Oliver and Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen, [Ph.D. Thesis]

Bartsch, Steffen and Sasse, Angela
Ossowski, Sascha and Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, ACM, Trento, Italy, In: SAC '12, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), ACM, DOI: 10.1145/2046707.2046753,
[Online-Edition: https://encrypto.de/papers/BNPSS11.pdf],
[Conference or Workshop Item]

Bothe, Dieter (1997):
Reaction-diffusion systems with discontinuities. A viability approach.
In: Nonlinear Analysis: Theory, Methods & Applications, pp. 677-686, 30, (2), ISSN 0362546X,
DOI: 10.1016/S0362-546X(97)00247-2,
[Online-Edition: https://doi.org/10.1016/S0362-546X(97)00247-2],
[Article]

C

Classen, Jiska and Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon, [Other]

Carpent, Xavier and Eldefrawy, Karim and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, In: Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Classen, Jiska and Wegemer, Daniel and Patras, Paul and Spink, Tom and Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Conference or Workshop Item]

Chen, Longquan and Bonaccurso, Elmar and Gambaryan-Roisman, Tatiana and Starov, Victor and Koursari, Nektaria and Zhao, Yapu (2018):
Static and dynamic wetting of soft substrates.
In: Current Opinion in Colloid & Interface Science, pp. 46 - 57, 36, ISSN 1359-0294,
DOI: 10.1016/j.cocis.2017.12.001,
[Online-Edition: https://doi.org/10.1016/j.cocis.2017.12.001],
[Article]

Cherkashinin, Gennady and Eilhardt, Robert and Lebedev, Mikhail V. and Nappini, Silvia and Magnano, Elena and Jaegermann, Wolfram (2018):
Olivine-LiNiPO 4 Thin Films: Chemical Compatibility with Liquid Electrolyte and Interface Stability at High Potential.
In: Journal of The Electrochemical Society, pp. H3143-H3147, 165, (4), ISSN 0013-4651,
DOI: 10.1149/2.0211804jes,
[Online-Edition: https://doi.org/10.1149/2.0211804jes],
[Article]

Cordes, U. and Lambie, B. and Hufnagel, K. and Spiegelberg, H. and Kampers, G. and Tropea, C. (2018):
The Adaptive Camber Concept - A passive approach for gust load alleviation on wind turbines.
In: Wind Energy, pp. 732-744, 21, (9), ISSN 10954244,
DOI: 10.1002/we.2190,
[Online-Edition: https://doi.org/10.1002/we.2190],
[Article]

Chilukoti, Hari Krishna and Müller-Plathe, Florian and Yang, Hua (2018):
Application of Reverse Nonequilibrium Molecular Dynamics to the Calculation of the Mutual Diffusion Coefficient of Alkane Mixtures.
In: The Journal of Physical Chemistry B, pp. 9210-9217, 122, (39), ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.8b06886,
[Online-Edition: https://doi.org/10.1021/acs.jpcb.8b06886],
[Article]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
London, UK, [Online-Edition: https://www.blackhat.com/eu-17/],
[Other]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Conference or Workshop Item]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
TU Darmstadt, [Master Thesis]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor Thesis]

Cohen, Avichai and Gilad, Yossi and Herzberg, Amir and Schapira, Michael and Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS), San Diego, CA, USA, [Conference or Workshop Item]

Cloos, F.-J. and Zimmermann, Anna- L. and Pelz, P. F. (2017):
Two turbulent flow regimes at the inlet of a rotating pipe.
In: European Journal of Mechanics B-Fluids, Elsevier, pp. 330-335, 61,2, (1/2), ISSN 0997-7546,
[Online-Edition: http://dx.doi.org/10.1016/j.euromechflu.2016.09.003],
[Article]

Cordes, Ulrike and Kampers, G. and Meissner, T. and Tropea, C. and Peinke, J. and Hoelling, M. (2017):
Note on the limitations of the Theodorsen and Sears functions.
In: Journal of Fluid Mechanics, 811, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2016.780],
[Article]

Cloos, F.-J. and Stapp, D. and Pelz, P. F. (2017):
Swirl boundary layer and flow separation at the inlet of a rotating pipe.
In: Journal of Fluid Mechanics, pp. 350-371, 811, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2016.734],
[Article]

Cavalcanti Miranda, Flavia and di Mare, F. and Sadiki, Amsini and Janicka, J. (2017):
Performance Analysis of Different Solvers for Computing the Radiative Transfer Equation in Complex Geometries Using Finite Volume Method and Block Structured Grids.
In: Computational Thermal Sciences: An International Journal, pp. 269-282, 9, (3), ISSN 1940-2503,
[Online-Edition: https://doi.org/10.1615/ComputThermalScien.2017019001],
[Article]

Christau, Stephanie and Moeller, Tim and Genzer, Jan and Koehler, Ralf and von Klitzing, Regine (2017):
Salt-Induced Aggregation of Negatively Charged Gold Nanoparticles Confined in a Polymer Brush Matrix.
In: Macromolecules, pp. 7333-7343, 50, (18), ISSN 0024-9297,
DOI: 10.1021/acs.macromol.7b00866,
[Online-Edition: https://doi.org/10.1021/acs.macromol.7b00866],
[Article]

Cai, Xuan and Wörner, Martin and Marschall, Holger and Deutschmann, Olaf (2017):
CFD Simulation of Liquid Back Suction and Gas Bubble Formation in a Circular Tube with Sudden or Gradual Expansion.
In: Emission Control Science and Technology, pp. 289-301, 3, (4), ISSN 2199-3629,
DOI: 10.1007/s40825-017-0073-3,
[Online-Edition: https://doi.org/10.1007/s40825-017-0073-3],
[Article]

Cordero, Carlos Garcia and Hauke, Sascha and Mühlhäuser, Max and Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Classen, Jiska and Steinmetzer, Daniel and Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Article]

Chagelishvili, George and Hau, Jan-Niklas and Khujadze, George and Oberlack, Martin (2016):
Mechanical picture of the linear transient growth of vortical perturbations in incompressible smooth shear flows.
In: Physical Review Fluids, American Physical Society, pp. 043603, 1, (4), ISSN 2469-990X,
[Online-Edition: http://link.aps.org/doi/10.1103/PhysRevFluids.1.043603],
[Article]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), ACM, DOI: 10.1145/2959424.2959427,
[Online-Edition: https://encrypto.de/papers/CDCSS16.pdf],
[Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Frassetto, Tommaso and Homescu, Andrei and Koppen, Georg and Larsen, Per and Liebchen, Christopher and Perry, Mike and Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference or Workshop Item]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Other]

Correia, Fabio and Mariano, Artur and Proença, Alberto and Bischof, Christian and Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Heraklion, Crete, Greece, [Conference or Workshop Item]

Chen, X. and Focke, C. and Marschall, H. and Bothe, D.
Fritsching, Udo (ed.) (2016):
Investigation of Elementary Processes of Non-Newtonian Droplets Inside Spray Processes by Means of Direct Numerical Simulation.
In: Process-Spray, Springer, pp. 3-51, [Book Section]

Chen, Jian and Dörsam, Edgar and Spiehl, Dieter and Hakimi Tehrani, Arash (2016):
Elastic model of paper stacks by considering the paper structure.
In: Nordic Pulp & Paper Research Journal (NPPRJ), Mid Sweden University, pp. 648-658, 31, (4), ISSN 0283-2631,
[Online-Edition: http://www.npprj.se/html/np-viewarticleabstract.asp?m=10170&...],
[Article]

Christau, S. and Moller, T. and Brose, F. and Genzer, J. and Soltwedel, O. and von Klitzing, R. (2016):
Effect of gold nanoparticle hydrophobicity on thermally induced color change of PNIPAM brush/gold nanoparticle hybrids.
In: Polymer, pp. 454-463, 98, ISSN 0032-3861,
[Online-Edition: http://dx.doi.org/10.1016/j.polymer.2016.03.088],
[Article]

Cai, Xuan and Wörner, Martin and Marschall, Holger and Deutschmann, Olaf (2016):
Numerical study on the wettability dependent interaction of a rising bubble with a periodic open cellular structure.
In: Catalysis Today, pp. 151-160, 273, ISSN 09205861,
DOI: 10.1016/j.cattod.2016.03.053,
[Online-Edition: https://doi.org/10.1016/j.cattod.2016.03.053],
[Article]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Other]

Coudert, Fanny and Butin, Denis and Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), pp. 749-762, 31, (6), [Article]

Crane, Stephen and Volckaert, Stijn and Schuster, Felix and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Sutter, Bjorn De and Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Negro, Marco and Qunaibit, Mohaned and Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Classen, Jiska and Chen, Joe and Steinmetzer, Daniel and Hollick, Matthias and Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, Paris, France, [Conference or Workshop Item]

Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), Florence, Italy, [Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference or Workshop Item]

Cabarcas, Daniel and Demirel, Denise and Göpfert, Florian and Lancrenon, Jean and Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, In: IFIP Advances in Information and Communication Technology, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015, Internet Society, San Diego, [Conference or Workshop Item]

Criscione, A. and Roisman, Ilia V. and Jakirlić, Suad and Tropea, Cameron (2015):
Towards modelling of initial and final stages of supercooled water solidification.
In: International Journal of Thermal Sciences, pp. 150-161, 92, ISSN 1290-0729,
[Online-Edition: http://dx.doi.org/10.1016/j.ijthermalsci.2015.01.021],
[Article]

Chen, Xingyuan and Schäfer, Michael and Bothe, Dieter (2015):
Numerical modeling and investigation of viscoelastic fluid-structure interaction applying an implicit partitioned coupling algorithm.
In: Journal of Fluids and Structures, Elsevier, pp. 390-421, 54, ISSN 0889-9746,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S088997461...],
[Article]

Classen, Jiska and Braun, Johannes and Volk, Florian and Hollick, Matthias and Buchmann, Johannes and Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Conference or Workshop Item]

Culhane, William and Jayaram, K. R. and Eugster, Patrick (2014):
Fast, Expressive Top-k Matching.
In: Proceedings of the 15th International Middleware Conference, ACM, Bordeaux, France, In: Middleware '14, ISBN 978-1-4503-2785-5,
DOI: 10.1145/2663165.2663326,
[Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt, [Master Thesis]

Canova, Gamze and Volkamer, Melanie and Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
Scottsdale, Arizona, [Other]

Conrad, Bernd and Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, UK, [Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland
Mauw, Sjouke and Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, Springer International Publishing, Wroclaw, Poland, In: Lecture Notes in Computer Science, 8743, [Conference or Workshop Item]

Conrad, Bernd and Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014), Paris, France, [Conference or Workshop Item]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

Christin, Delphine and Pons-Sorolla, Daniel Rodriguez and Hollick, Matthias and Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt, [Master Thesis]

Christin, Delphine and Engelmann, Franziska and Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107, [Article]

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications, 38, [Conference or Workshop Item]

Clauß, Sebastian and Schiffner, Stefan and Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Cabarcas, Daniel and Göpfert, Florian and Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
[Other]

Cuong, N. and Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), Springer, [Conference or Workshop Item]

D

Dessouky, Ghada and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security, k.A., USENIX Association, In: 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Degabriele, Jean Paul and Janson, Christian and Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December, 8-12, [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Conference or Workshop Item]

Dessouky, Ghada and Zeitouni, Shaza and Ibrahim, Ahmad and Davi, Lucas and Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, In: 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Das, Poulami and Faust, Sebastian and Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
In: ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Dillen, Sebastian and Oberlack, Martin and Wang, Yongqi (2019):
Analytical investigation of rotationally symmetrical oscillating flows of viscoelastic fluids.
In: Journal of Non-Newtonian Fluid Mechanics, Elsevier, p. 104168, 272, ISSN 03770257,
DOI: 10.1016/j.jnnfm.2019.104168,
[Online-Edition: https://doi.org/10.1016/j.jnnfm.2019.104168],
[Article]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostáková, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Hesse, Julia and Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019, Darmstadt, IACR, In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Online-Edition: https://eurocrypt.iacr.org/2019/],
[Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostakova, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Online-Edition: https://eprint.iacr.org/2019/154],
[Report]

Dimesso, Lucangelo and Wittich, Carolin and Mayer, Thomas and Jaegermann, Wolfram (2019):
Phase-change behavior of hot-pressed methylammonium lead bromide hybrid perovskites.
In: Journal of Materials Science, Springer, pp. 2001-2015, 54, (3), ISSN 0022-2461,
DOI: 10.1007/s10853-018-3009-6,
[Online-Edition: https://doi.org/10.1007/s10853-018-3009-6],
[Article]

Dammel, Frank and Oltmanns, Johannes and Stephan, Peter (2019):
Nutzung der Abwärme des Hochleistungsrechners am Campus Lichtwiese.
In: Euro Heat & Power, EW Medien und Kongresse GmbH, pp. 28-31, ISSN 0949-166X,
[Online-Edition: https://bc.pressmatrix.com/de/profiles/3710b1d1bc07/editions...],
[Article]

Deichmann, Gregor and Dallavalle, Marco and Rosenberger, David and van der Vegt, Nico F. A. (2019):
Phase Equilibria Modeling with Systematically Coarse-Grained Models—A Comparative Study on State Point Transferability.
In: The Journal of Physical Chemistry B, pp. 504-515, 123, (2), ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.8b07320,
[Online-Edition: https://doi.org/10.1021/acs.jpcb.8b07320],
[Article]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
IEEE Computer Society, In: 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Online-Edition: https://www.ieee-security.org/TC/SP2018/],
[Conference or Workshop Item]

Dalgicdir, Cahit and van der Vegt, Nico F. A. (2019):
Improved Temperature Behavior of PNIPAM in Water with a Modified OPLS Model.
In: The Journal of Physical Chemistry B, pp. 3875-3883, 123, (17), ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.9b01644,
[Online-Edition: https://doi.org/10.1021/acs.jpcb.9b01644],
[Article]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8605],
[Ph.D. Thesis]

De Oliveira Nunes, Ivan and Dessouky, Ghada and Ibrahim, Ahmad and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
In: The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference or Workshop Item]

Dziembowski, Stefan and Faust, Sebastian and Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, In: The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, In: LNCS, [Online-Edition: http://fps2018.encs.concordia.ca/],
[Conference or Workshop Item]

Degabriele, Jean Paul and Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: Advances in Cryptology – ASIACRYPT 2018, Springer, In: Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, In: LNCS, [Online-Edition: https://asiacrypt.iacr.org/2018/index.html],
[Conference or Workshop Item]

De Maleprade, Helene and Soto, Dan and Quéré, David and Hinch, E. John and Baier, Tobias and Schür, Maximilian T. and Hardt, Steffen (2018):
Air-propelled, herringbone-textured platelets.
In: Physical Review Fluids, 3, (104101), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.104101,
[Online-Edition: https://link.aps.org/doi/10.1103/PhysRevFluids.3.104101],
[Article]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master Thesis]

Dziembowski, Stefan and Faust, Sebastian and Hostakova, Kristina (2018):
General State Channel Networks.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Deising, D. and Bothe, D. and Marschall, H. (2018):
Direct Numerical Simulation of Mass Transfer in Bubbly Flows.
In: Computers & Fluids, pp. 524-538, (172), ISSN 00457930,
DOI: 10.1016/j.compfluid.2018.03.041,
[Online-Edition: https://doi.org/10.1016/j.compfluid.2018.03.041],
[Article]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master Thesis]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Master Thesis]

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Dessouky, Ghada and Abera, Tigist and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 159-178, DOI: 10.1515/popets-2018-0037,
[Article]

Deaconescu, Razvan and Carabas, Costin and Manda, Iulia and Enck, William and Chiroiu, Mihai and Li, Ninghui and Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: 13th ASIA Conference on Information, Computer and Communications Security, In: AsiaCCS, [Conference or Workshop Item]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master Thesis]

Deichmann, Gregor and van der Vegt, Nico F. A. (2018):
Bottom-up approach to represent dynamic properties in coarse-grained molecular simulations.
In: The Journal of Chemical Physics, p. 244114, 149, (24), ISSN 0021-9606,
DOI: 10.1063/1.5064369,
[Online-Edition: https://doi.org/10.1063/1.5064369],
[Article]

Dimesso, Lucangelo and Das, Chittaranjan and Mayer, Thomas and Jaegermann, Wolfram (2018):
Investigation of earth-alkaline (EA = Mg, Ca, Sr) containing methylammonium tin iodide perovskite systems.
In: Journal of Materials Science, pp. 356-368, 53, (1), ISSN 0022-2461,
DOI: 10.1007/s10853-017-1545-0,
[Online-Edition: https://doi.org/10.1007/s10853-017-1545-0],
[Article]

Dimesso, L. and Mayer, T. and Jaegermann, W. (2018):
Investigation of Methylammonium Tin Strontium Bromide Perovskite Systems.
In: ECS Journal of Solid State Science and Technology, pp. R27-R33, 7, (3), ISSN 2162-8769,
DOI: 10.1149/2.0181803jss,
[Online-Edition: https://doi.org/10.1149/2.0181803jss],
[Article]

Ding, Carl-Philipp and Sjöberg, Magnus and Vuilleumier, David and Reuss, David L. and He, Xu and Böhm, Benjamin (2018):
Fuel film thickness measurements using refractive index matching in a stratified-charge SI engine operated on E30 and alkylate fuels.
In: Experiments in Fluids, 59, (3), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2512-5,
[Online-Edition: https://doi.org/10.1007/s00348-018-2512-5],
[Article]

Daikeler, Alexander and Ströhle, Jochen and Epple, Bernd (2018):
Experimental Flow Structure Analysis in a 1 MWth Circulating Fluidized Bed Pilot Plant.
In: Chemical Engineering Science, ISSN 00092509,
DOI: 10.1016/j.ces.2018.10.037,
[Online-Edition: https://doi.org/10.1016/j.ces.2018.10.037],
[Article]

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Online-Edition: http://arxiv.org/abs/1812.00197],
[Article]

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelor Thesis]

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Online-Edition: https://encrypto.de/papers/DHSS17.pdf],
[Conference or Workshop Item]

Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson (2017):
Just-in-Time Static Analysis.
In: Proceedings of ISSTA ’17, ACM, Santa Barbara, California, United States, ISBN 978-1-4503-5076-1,
DOI: 10.1145/3092703.3092705,
[Conference or Workshop Item]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Conference or Workshop Item]

Dessouky, Ghada and Zeitouni, Shaza and Nyman, Thomas and Paverd, Andrew and Davi, Lucas and Koeberl, Patrick and Asokan, N. and Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson (2017):
Cheetah: Just-in-Time Taint Analysis for Android Apps.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Curran Associates, Inc., Buenos Aires, Argentina, ISBN 978-1-5386-1589-8,
DOI: 10.1109/ICSE-C.2017.20,
[Conference or Workshop Item]

Dayal, Ram and Gambaryan-Roisman, Tatiana (2017):
Heat transfer in granular medium for application to selective laser melting: A numerical study.
In: International Journal of Thermal Sciences, pp. 38-50, 113, ISSN 12900729,
[Online-Edition: https://doi.org/10.1016/j.ijthermalsci.2016.11.014],
[Article]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems, Uppsala, Sweden, [Conference or Workshop Item]

Dietzel, Mathias and Hardt, Steffen (2017):
Flow and streaming potential of an electrolyte in a channel with an axial temperature gradient.
In: Journal of Fluid Mechanics, pp. 1060-1111, 813, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2016.844],
[Article]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Conference or Workshop Item]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
TU Darmstadt, [Master Thesis]

Dierkes, Dominik and Oberlack, Martin (2017):
Euler and Navier-Stocks equations in a new time-dependent helically symmetric system: derivation of the fundamental system and new conservation laws.
In: Journal of Fluid Mechanics, pp. 344-365, 818, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2017.74],
[Article]

Diemel, O. and Pareja, J. and Dreizler, A. and Wagner, S. (2017):
An interband cascade laser-based in situ absorption sensor for nitric oxide in combustion exhaust gases.
In: Applied Physics B, 123, (5), ISSN 0946-2171,
[Online-Edition: https://doi.org/10.1007/s00340-017-6741-8],
[Article]

Ding, Carl-Philipp and Honza, Rene and Böhm, Benjamin and Dreizler, Andreas (2017):
“Simultaneous measurement of flame impingement and piston surface temperatures in an optically accessible spark ignition engine”.
In: Applied Physics B, 123, (4), ISSN 0946-2171,
[Online-Edition: https://doi.org/10.1007/s00340-017-6694-y],
[Article]

Dimesso, L. and Fasel, C. and Lakus-Wollny, K. and Mayer, T. and Jaegermann, W. (2017):
Thermal stability of lead-free CH 3 NH 3 Sn x I 3 systems (0.9 ≤ x ≤ 1.1) for photovoltaics.
In: Materials Science in Semiconductor Processing, pp. 152-158, 68, ISSN 13698001,
[Online-Edition: https://doi.org/10.1016/j.mssp.2017.06.012],
[Article]

Dalgicdir, Cahit and Rodríguez-Ropero, Francisco and van der Vegt, Nico F. A. (2017):
Computational Calorimetry of PNIPAM Cononsolvency in Water/Methanol Mixtures.
In: The Journal of Physical Chemistry B, pp. 7741-7748, 121, (32), ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.7b05960,
[Online-Edition: https://doi.org/10.1021/acs.jpcb.7b05960],
[Article]

Dallavalle, Marco and van der Vegt, Nico F. A. (2017):
Evaluation of mapping schemes for systematic coarse graining of higher alkanes.
In: Phys. Chem. Chem. Phys., pp. 23034-23042, 19, (34), ISSN 1463-9076,
DOI: 10.1039/c7cp03926c,
[Online-Edition: https://doi.org/10.1039/c7cp03926c],
[Article]

Dimesso, Lucangelo and Stöhr, Maximilian and Das, Chittaranjan and Mayer, Thomas and Jaegermann, Wolfram (2017):
Investigation on the properties of hybrid CH3NH3SnxI3 (0.9 ≤ x ≤ 1.4) perovskite systems.
In: Journal of Materials Research, pp. 4132-4141, 32, (22), ISSN 0884-2914,
DOI: 10.1557/jmr.2017.418,
[Online-Edition: https://doi.org/10.1557/jmr.2017.418],
[Article]

Dewald, Florian and Mantel, Heiko and Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Dai, Tianxiang and Shulman, Haya and Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: Cryptology and Network Security. CANS 2016, Springer, Cham, Milano, Italy, In: vol 10052, [Conference or Workshop Item]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Dowling, Benjamin and Günther, Felix and Herath, Udyani and Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Demirel, Denise and Krenn, Stephan and Loruenser, Thomas and Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, Austria, [Conference or Workshop Item]

Diedrich, Lennart and Jattke, Patrick and Murati, Lulzim and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Demirel, Denise and Traverso, Giulia and Krenn, Stephan and Loruenser, Thomas (2016):
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
In: 2016 11th International Conference on Availability, Reliability and Security (ARES), IEEE, Salzburg, Austria, ISBN 978-1-5090-0990-9/16,
DOI: 10.1109/ARES.2016.88,
[Conference or Workshop Item]

Dietzel, Mathias and Hardt, Steffen (2016):
Thermoelectricity in confined liquid electrolytes.
In: Physical Review Letters, p. 225901, 116, (22), ISSN 0031-9007,
[Online-Edition: http://dx.doi.org/10.1103/PhysRevLett.116.225901],
[Article]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt, [Master Thesis]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, Springer, pp. 637-657, 15, (6), ISSN 1615-5270,
[Article]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
[Other]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Dietrich, Axel and Dammel, Frank and Stephan, Peter (2016):
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: International Journal of Thermodynamics, pp. 43-51, 19, (1), ISSN 1301-9724,
[Online-Edition: http://doi.org/10.5541/ijot.5000156078],
[Article]

Doerr, Aaron and Hardt, Steffen and Masoud, Hassan and Stone, Howard A. (2016):
Drag and diffusion coefficients of a spherical particle attached to a fluid-fluid interface.
In: Journal of Fluid Mechanics, pp. 607-618, 790, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2016.41],
[Article]

Dayal, Ram and Gambaryan-Roisman, Tatiana (2016):
A novel numerical method for radiation exchange in granular medium.
In: Heat and Mass Transfer, pp. 2587-2591, 52, (11), ISSN 0947-7411,
[Online-Edition: https://doi.org//10.1007/s00231-015-1738-5],
[Article]

De Nicola, Antonio and Kawakatsu, Toshihiro and Mueller-Plathe, Florian and Milano, Giuseppe (2016):
Fast relaxation of coarse-grained models of polymer interphases by hybrid particle-field molecular dynamics: Polystyrene-silica nanocomposites as an example.
In: European Physical Journal-Special Topics, pp. 1817-1841, 225, (8-9), ISSN 1951-6355,
[Online-Edition: http://dx.doi.org/10.1140/epjst/e2016-60127-0],
[Article]

Doost, A. S. and Ries, E. and Becker, L. G. and Buerkle, S. and Wagner, S. and Ebert, V. and Dreizler, A. and di Mare, F. and Sadiki, A. and Janicka, J. (2016):
Residence time calculations for complex swirling flow in a combustion chamber using large-eddy simulations.
In: Chemical Engineering Science, pp. 97-114, 156, ISSN 0009-2509,
[Online-Edition: http://dx.doi.org/10.1016/j.ces.2016.09.001],
[Article]

Dietrich, Axel and Fraunholz, Christoph and Dammel, Frank and Stephan, Peter (2016):
Exergoeconomic Analysis of Concepts for Pumped Heat Electricity Storage Systems.
In: Joint Conference “Thermal Energy Storage – Perspectives and Applications in an Industrial Environment”, Frankfurt, 2016, [Conference or Workshop Item]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],
[Ph.D. Thesis]

Davi, Lucas and Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

De, Simanta and Bhattacharyya, Somnath and Hardt, Steffen (2015):
Electroosmotic flow in a slit nanochannel with superhydrophobic walls.
In: Microfluidics and Nanofluidics, pp. 1465-1476, 19, (6), [Online-Edition: http://dx.doi.org/10.1007/s10404-015-1660-7],
[Article]

Dagdelen, Özgür and Gajek, Sebastian and Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, In: LNCS, [Conference or Workshop Item]

Demmler, Daniel and Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), ACM, DOI: 10.1145/2810103.2813678,
[Online-Edition: https://encrypto.de/papers/DDKSSZ15.pdf],
[Conference or Workshop Item]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), ACM, Denver, Colorado, USA, [Conference or Workshop Item]

Della Toffola, Luca and Pradel, Michael and Gross, Thomas R.
Andy, Gill (ed.) (2015):
Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, ACM, Pittsburgh, PA, USA, In: OOPSLA 2015, 50, ISBN 978-1-4503-3689-5,
DOI: 10.1145/2814270.2814290,
[Conference or Workshop Item]

Do, Trinh Minh Tri and Dousse, Olivier and Miettinen, Markus and Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, pp. 13-28, 20, DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Diedrich, Lennart and Murati, Lulzim and Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Do, Lisa Nguyen Quang and Ali, Karim and Bodden, Eric and Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE, In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Demirel, Denise and Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Dörr, A. and Hardt, Steffen (2015):
Driven particles at fluid interfaces acting as capillary dipoles.
In: Journal of Fluid Mechanics, pp. 5-26, 770, ISSN 0022-1120,
[Online-Edition: http://journals.cambridge.org/action/displayAbstract?fromPag...],
[Article]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt, [Master Thesis]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Online-Edition: https://encrypto.de/papers/DSZ15.pdf],
[Conference or Workshop Item]

Davi, Lucas and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Snow, Kevin and Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Dmitrienko, Alexandra and Heuser, Stephan and Nguyen, Thien Duc and da Silva Ramos, Marcos and Rein, Andre and Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Dreizler, A. and Boehm, B. (2015):
Advanced laser diagnostics for an improved understanding of premixed flame-wall interactions.
In: Proceedings of the Combustion Institute, pp. 37-64, 35, ISSN 1540-7489,
[Article]

Dietrich, Axel and Dammel, Frank and Stephan, Peter (2015):
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: Proceedings of ECOS 2015 - The 28th International Conference on Efficiency, COST, Optimization, Simulation and Environmental Impact of Energy Systems, June 30 - July 3, 2015, Pau, France, [Online-Edition: https://ecos2015.sciencesconf.org/],
[Article]

Debrabant, Kristian and Lang, Jens (2015):
On asymptotic global error estimation and control of finite difference solutions for semilinear parabolic equations.
In: Computer Methods in Applied Mechanics and Engineering, pp. 110-126, 288, ISSN 0045-7825,
[Article]

Dietz, Christian and Schulze, Marcus and Voss, Agnieszka and Riesch, Christian and Stark, Robert W. (2015):
Bimodal frequency-modulated atomic force microscopy with small cantilevers.
In: Nanoscale, ROYAL SOC CHEMISTRY, CAMBRIDGE, ENGLAND, pp. 1849-1856, 7, (5), ISSN 2040-3364,
[Online-Edition: http://dx.doi.org/10.1039/C4NR05907G],
[Article]

Domschke, Pia and Kolb, Oliver and Lang, Jens (2015):
Adjoint-based error control for the simulation and optimization of gas and water supply networks.
In: Applied Mathematics and Computation, pp. 1003-1018, 259, ISSN 0096-3003,
DOI: 10.1016/j.amc.2015.03.029,
[Online-Edition: https://doi.org/10.1016/j.amc.2015.03.029],
[Article]

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
ACM, In: 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Online-Edition: https://encrypto.de/papers/DHS14.pdf],
[Conference or Workshop Item]

Dessouky, Ghada and Klaiber, Michael J. and Bailey, Donald G. and Simon, Svenja (2014):
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
In: 24th International Conference on Field Programmable Logic and Applications (FPL), München, Deutschland, 2014, [Conference or Workshop Item]

Ding, Jintai and Petzoldt, Albrecht and Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: PQCrypto 2014, Springer, Waterloo, Canada, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, Springer, Istanbul, Turkey, In: LNCS, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Dagdelen, Özgür and El Bansarkhani, Rachid and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas and Sanchez, Ana Helena and Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014, Florianópolis, Brazil, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/DSZ14.pdf],
[Conference or Workshop Item]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, (4), [Article]

Davi, Lucas and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Diaconita, Irina and Reinhardt, Andreas and Englert, Frank and Christin, Delphine and Steinmetz, Ralf (2014):
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), IEEE, Budapest, Hungary, In: PerCom Workshops 2014, ISBN 978-1-4799-2737-1,
DOI: 10.1109/PerComW.2014.6815157,
[Conference or Workshop Item]

Dmitrienko, Alexandra and Noack, David and Sadeghi, Ahmad-Reza and Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference or Workshop Item]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G.
Chen, Liqun and Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), Cham, Springer, pp. 1-25, [Book Section]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014, Marrakech, Morocco, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu HI USA, [Conference or Workshop Item]

Dobre, Dan and Karame, Ghassan O. and Li, Wenting and Majuntke, Matthias and Suri, Neeraj and Vukolic, Marko (2013):
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM, Berlin, Germany, In: CCS '13, ISBN 978-1-4503-2477-9,
DOI: 10.1145/2508859.2516750,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and van de Graaf, Jeroen and Ryan, Peter Y. A. and Buchmann, Johannes
Heather, James and Schneider, Steve and Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Online-Edition: https://jusletter-it.weblaw.ch/redaktion.html],
[Article]

Demirel, Denise and van de Graaf, Jeroen and Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012, Bellevue, WA, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, In: Lecture Notes in Computer Science (LNCS), 7344, [Conference or Workshop Item]

Dezfuli, Niloofar and Khalilbeigi, Mohammadreza and Huber, Jochen and Müller, Florian and Mühlhäuser, Max (2012):
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223823,
[Conference or Workshop Item]

Das, Amitabh and Kocabaş, Ünal and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

E

El Bansarkhani, Rachid (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor Thesis]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor Thesis]

Eichberg, Michael and Kübler, Florian and Helm, Dominik and Reif, Michael and Salvaneschi, Guido and Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509],
[Conference or Workshop Item]

Etzold, Bastian J. M. and Begin, Dominique (2018):
Editoral special issue CarboCat-VII.
In: Catalysis Today, p. 1, 301, ISSN 09205861,
DOI: 10.1016/j.cattod.2017.11.001,
[Online-Edition: https://doi.org/10.1016/j.cattod.2017.11.001],
[Article]

Endoh, Kenkoh S. and Kawakatsu, Toshihiro and Müller-Plathe, Florian (2018):
Coarse-Grained Molecular Simulation Model for Gecko Feet Keratin.
In: The Journal of Physical Chemistry B, pp. 2203-2212, 122, (8), ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.7b10481,
[Online-Edition: https://doi.org/10.1021/acs.jpcb.7b10481],
[Article]

Eslami, Hossein and Bahri, Kheiri and Müller-Plathe, Florian (2018):
Solid–Liquid and Solid–Solid Phase Diagrams of Self-Assembled Triblock Janus Nanoparticles from Solution.
In: The Journal of Physical Chemistry C, pp. 9235-9244, 122, (16), ISSN 1932-7447,
DOI: 10.1021/acs.jpcc.8b02043,
[Online-Edition: https://doi.org/10.1021/acs.jpcc.8b02043],
[Article]

Emmert, Johannes and Blume, Niels Göran and Dreizler, Andreas and Wagner, Steven (2018):
Data analysis and uncertainty estimation in supercontinuum laser absorption spectroscopy.
In: Scientific Reports, 8, (1), ISSN 2045-2322,
DOI: 10.1038/s41598-018-28705-2,
[Online-Edition: https://doi.org/10.1038/s41598-018-28705-2],
[Article]

Eigenbrod, Michael and Bihler, Florian and Hardt, Steffen (2018):
Electrokinetics of a particle attached to a fluid interface: Electrophoretic mobility and interfacial deformation.
In: Physical Review Fluids, 3, (10), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.103701,
[Online-Edition: https://doi.org/10.1103/PhysRevFluids.3.103701],
[Article]

Eslami, Hossein and Sedaghat, Parvin and Müller-Plathe, Florian (2018):
Local bond order parameters for accurate determination of crystal structures in two and three dimensions.
In: Physical Chemistry Chemical Physics, pp. 27059-27068, 20, (42), ISSN 1463-9076,
DOI: 10.1039/c8cp05248d,
[Online-Edition: https://doi.org/10.1039/c8cp05248d],
[Article]

Erwig, Andreas and Fischlin, Marc and Hald, Martin and Helm, Dominik and Kiel, Robert and Kübler, Florian and Kümmerlin, Michael and Laenge, Jakob and Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017, [Conference or Workshop Item]

Egger, H. and Seitz, T. and Tropea, C. (2017):
Enhancement of flow measurements using fluid-dynamic constraints.
In: Journal of Computational Physics, pp. 558-574, 344, ISSN 00219991,
[Online-Edition: https://doi.org/10.1016/j.jcp.2017.04.080],
[Article]

Eslami, Hossein and Khanjari, Neda and Mueller-Plathe, Florian (2017):
A Local Order Parameter-Based Method for Simulation of Free Energy Barriers in Crystal Nucleation.
In: Journal of chemical theory and computation, pp. 1307-1316, 13, (3), ISSN 1549-9618,
[Online-Edition: http://dx.doi.org/10.1021/acs.jctc.6b01034],
[Article]

Eitel, Felix and Pareja, Jhon and Johchi, Ayane and Boehm, Benjamin and Geyer, Dirk and Dreizler, Andreas (2017):
Temporal evolution of auto-ignition of ethylene and methane jets propagating into a turbulent hot air co-flow vitiated with NOx.
In: Combustion and Flame, pp. 193-206, 177, ISSN 0010-2180,
[Online-Edition: http://dx.doi.org/10.1016/j.combustflame.2016.12.009],
[Article]

El Bansarkhani, Rachid and Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016, Milan, Italy, [Conference or Workshop Item]

El Bansarkhani, Rachid and El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
[Other]

Ermuth, Markus and Pradel, Michael (2016):
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931053,
[Conference or Workshop Item]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt, [Master Thesis]

Eifert, Alexander and Petit, Julien and Baier, Tobias and Bonaccurso, Elmar and Hardt, Steffen (2015):
Inscribing wettability gradients onto polymer substrates with different stiffness using corona discharge in point-to-plane geometry.
In: Applied Surface Science, pp. 104-110, 330, ISSN 0169-4332,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0169433214...],
[Article]

El Bansarkhani, Rachid and Dagdelen, Özgür and Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20, [Article]

Eitel, Felix and Pareja, Jhon and Geyer, Dirk and Johchi, Ayane and Michel, Florian and Elsaesser, Wolfgang and Dreizler, Andreas (2015):
A novel plasma heater for auto-ignition studies of turbulent non-premixed flows.
In: Experiments in Fluids, 56, (10), ISSN 0723-4864,
[Online-Edition: http://dx.doi.org/10.1007/s00348-015-2059-7],
[Article]

Ekberg, Jan-Erik and Kostiainen, Kari and Asokan, N. (2014):
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, pp. 29-37, 12, (4), DOI: 10.1109/MSP.2014.38,
[Article]

El Bansarkhani, Rachid and Buchmann, Johannes
Pointcheval, David and Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Springer, Marrakesh, Morocco, In: LNCS, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: Selected Areas in Cryptography 2013 (SAC'13), Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid and Cabarcas, Daniel and Kuo, Po-Chun and Schmidt, Patrick and Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, pp. 81-102, 53, [Article]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid and Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: WISTP - Workshop in Information Security Theory and Practice 2012, Springer, London, UK, In: LNCS, [Conference or Workshop Item]

F

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference or Workshop Item]

Fischlin, Marc and Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Fricke, Mathis and Maric, T. and Bothe, D. (2019):
Contact line advection using the Level Set method.
In: Proc. Appl. Math. Mech., Wiley-VCH Verlag GmbH & Co. KGaA, ISSN 16177061,
DOI: 10.1002/pamm.201900476,
[Online-Edition: https://doi.org/10.1002/pamm.201900476],
[Article]

Fricke, Mathis and Maric, Tomislav and Bothe, Dieter (2019):
Contact Line Advection using the Level Set Method : Data and C++ Implementations.
DOI: 10.25534/tudatalib-58,
[Data]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Fricke, Mathis and Köhne, Matthias and Bothe, Dieter (2019):
A kinematic evolution equation for the dynamic contact angle and some consequences.
In: Physica D: Nonlinear Phenomena, ISSN 01672789,
DOI: 10.1016/j.physd.2019.01.008,
[Online-Edition: https://doi.org/10.1016/j.physd.2019.01.008],
[Article]

Fischlin, Marc and Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1053.pdf],
[Article]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Master Thesis]

Fischlin, Marc and Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Frassetto, Tommaso and Jauernig, Patrick and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, In: 27th USENIX Security Symposium, Baltimore, MD, USA, 15.-17.08.2018, [Conference or Workshop Item]

Fischlin, Marc and Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Applied Cryptography and Network Security - ACNS 2018, In: 16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, In: Springer International Publishing, LNCS 10892, [Online-Edition: https://www.springer.com/us/book/9783319933863],
[Conference or Workshop Item]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Fink, V. and Cai, X. and Stroh, A. and Bernard, R. and Kriegseis, J. and Frohnapfel, B. and Marschall, H. and Wörner, M. (2018):
Drop bouncing by micro-grooves.
In: International Journal of Heat and Fluid Flow, pp. 271-278, 70, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.02.014,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.02.014],
[Article]

Forooghi, Pourya and Weidenlener, Alex and Magagnato, Franco and Böhm, Benjamin and Kubach, Heiko and Koch, Thomas and Frohnapfel, Bettina (2018):
DNS of momentum and heat transfer over rough surfaces based on realistic combustion chamber deposit geometries.
In: International Journal of Heat and Fluid Flow, pp. 83-94, 69, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2017.12.002,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2017.12.002],
[Article]

Fräbel, Sabine and Wagner, Bastian and Krischke, Markus and Schmidts, Volker and Thiele, Christina M. and Staniek, Agata and Warzecha, Heribert (2018):
Engineering of new-to-nature halogenated indigo precursors in plants.
In: Metabolic Engineering, pp. 20-27, 46, ISSN 10967176,
DOI: 10.1016/j.ymben.2018.02.003,
[Online-Edition: https://doi.org/10.1016/j.ymben.2018.02.003],
[Article]

Falcone, M. and Bothe, D. and Marschall, H. (2018):
3D direct numerical simulations of reactive mass transfer from deformable single bubbles: An analysis of mass transfer coefficients and reaction selectivities.
In: Chemical Engineering Science, pp. 523-536, 177, ISSN 00092509,
DOI: 10.1016/j.ces.2017.11.024,
[Online-Edition: https://doi.org/10.1016/j.ces.2017.11.024],
[Article]

Fegan, Sarah K. and Kirsch, Peer and Müller-Plathe, Florian (2018):
The alignment of dichroic dyes in a nematic liquid crystal: a molecular dynamics investigation.
In: Liquid Crystals, pp. 1377-1384, 45, (9), ISSN 0267-8292,
DOI: 10.1080/02678292.2018.1441456,
[Online-Edition: https://doi.org/10.1080/02678292.2018.1441456],
[Article]

Fricke, Mathis and Köhne, Matthias and Bothe, Dieter (2018):
On the Kinematics of Contact Line Motion.
In: PAMM, pp. e201800451, 18, (1), ISSN 16177061,
DOI: 10.1002/pamm.201800451,
[Online-Edition: https://doi.org/10.1002/pamm.201800451],
[Article]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelor Thesis]

Frassetto, Tommaso and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference or Workshop Item]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Fereidooni, Hossein and Classen, Jiska and Spink, Tom and Patras, Paul and Miettinen, Markus and Sadeghi, Ahmad-Reza and Hollick, Matthias and Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Conference or Workshop Item]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, p. 1, PP, DOI: 10.1109/COMST.2017.2748278,
[Article]

Fuhry, Benny and Bahmani, Raad and Brasser, Ferdinand and Hahn, Florian and Kerschbaum, Florian and Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference or Workshop Item]

Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, [Conference or Workshop Item]

Fenner, Andreas and Stephan, Peter (2017):
Two dye combinations suitable for two‐color/two‐dye laser‐induced fluorescence thermography for ethanol.
In: Experiments in Fluids, Springer, p. 65, 58, (6), ISSN 1432-1114,
[Online-Edition: http://dx.doi.org/10.1007/s00348-017-2349-3],
[Article]

Fischlin, Marc and Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), IEEE, Paris, France, [Conference or Workshop Item]

Franz, Benjamin and Stephan, Peter (2017):
Numerical simulation of nucleate boiling in microgravity in presence of a shear flow.
Napoli (Italy), May 28-June 1, 2017, DOI: 10.1615/ICHMT.2017.CHT-7.810,
[Online-Edition: http://dx.doi.org/10.1615/ICHMT.2017.CHT-7.810],
[Conference or Workshop Item]

Farwig, Reinhard and Kozono, Hideo and Wegmann, David (2017):
Existence of strong solutions and decay of turbulent solutions of Navier–Stokes flow with nonzero Dirichlet boundary data.
In: Journal of Mathematical Analysis and Applications, pp. 271-286, 453, (1), ISSN 0022247X,
[Online-Edition: https://doi.org/10.1016/j.jmaa.2017.03.086],
[Article]

Falcone, Manuel and Marschall, Holger (2017):
Explicit Radial-Basis-Function-Based Finite-Difference Method for Interfacial Mass-Transfer Problems.
In: Chemical Engineering & Technology, pp. 1385-1390, 40, (8), ISSN 09307516,
[Online-Edition: https://doi.org/10.1002/ceat.201600536],
[Article]

Forooghi, Pourya and Stroh, Alexander and Magagnato, Franco and Jakirlić, Suad and Frohnapfel, Bettina (2017):
Toward a Universal Roughness Correlation.
In: Journal of Fluids Engineering, p. 121201, 139, (12), ISSN 0098-2202,
DOI: 10.1115/1.4037280,
[Online-Edition: https://doi.org/10.1115/1.4037280],
[Article]

Freudigmann, H.-A. and Dörr, Aaron and Iben, Uwe and Pelz, P. F. (2017):
Modeling of Cavitation-Induced Air Release Phenomena in Micro-Orifice Flows.
In: Journal of Fluids Engineering, p. 111301, 139, (11), ISSN 0098-2202,
DOI: 10.1115/1.4037048,
[Online-Edition: https://doi.org/10.1115/1.4037048],
[Article]

Fischer, Michael and Lindemann, Florian and Ulbrich, Michael and Ulbrich, Stefan (2017):
Fréchet Differentiability of Unsteady Incompressible Navier--Stokes Flow with Respect to Domain Variations of Low Regularity by Using a General Analytical Framework.
In: SIAM Journal on Control and Optimization, pp. 3226-3257, 55, (5), ISSN 0363-0129,
DOI: 10.1137/16m1089563,
[Online-Edition: https://doi.org/10.1137/16M1089563],
[Article]

Frigge, Lorenz and Ströhle, Jochen and Epple, Bernd (2017):
Release of sulfur and chlorine gas species during coal combustion and pyrolysis in an entrained flow reactor.
In: Fuel, pp. 105-110, 201, ISSN 00162361,
[Online-Edition: https://doi.org/10.1016/j.fuel.2016.11.037],
[Article]

Fojtik, Roman (2016):
Salt Synchronization Service.
TU Darmstadt, [Master Thesis]

Frömmgen, Alexander and Stohr, Denny and Fornoff, Jan and Effelsberg, Wolfgang and Buchmann, Alejandro (2016):
Capture and Replay: Reproducible Network Experiments in Mininet.
In: SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, ACM, Florianopolis, Brazil, ISBN 978-1-4503-4193-6,
DOI: 10.1145/2934872.2959076,
[Conference or Workshop Item]

Fischlin, Marc and Herzberg, Amir and Noon, Hon Bin and Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, [Conference or Workshop Item]

Feldmann, Anja and Heyder, Philipp and Kreutzer, Michael and Schmid, Stefan and Seifert, Jean-Pierre and Shulman, Haya and Thimmaraju, Kashyap and Waidner, Michael and Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops, Toulouse, France, [Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Schmidt, Benedikt and Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, San Jose, California, USA, [Conference or Workshop Item]

Falk, Paul Michael and Meggers, F. and Stephan, Peter and Dammel, Frank (2016):
Comparison of District Heating Systems and Distributed Geothermal Network for Optimal Exergetic Performance.
In: Expanding Boundaries: Systems Thinking for the Built Environment, In: Sustainable Built Environment (SBE) Regional Conference, [Online-Edition: http://vdf.ch/expanding-boundaries.html],
[Conference or Workshop Item]

Farwig, Reinhard and Rosteck, Veronika (2016):
Note on Friedrichs' inequality in N-star-shaped domains.
In: Journal of Mathematical Analysis and Applications, pp. 1514-1524, 435, (2), ISSN 0022-247X,
[Online-Edition: http://dx.doi.org/10.1016/j.jmaa.2015.10.046],
[Article]

Farwig, Reinhard and Riechwald, Paul Felix (2016):
REGULARITY CRITERIA FOR WEAK SOLUTIONS OF THE NAVIER-STOKES SYSTEM IN GENERAL UNBOUNDED DOMAINS.
In: Discrete and Continuous Dynamical Systems-Series S, pp. 157-172, 9, (1), ISSN 1937-1632,
[Online-Edition: http://dx.doi.org/10.3934/dcdss.2016.9.157],
[Article]

Farwig, Reinhard and Rosteck, Veronika (2016):
RESOLVENT ESTIMATES OF THE STOKES SYSTEM WITH NAVIER BOUNDARY CONDITIONS IN GENERAL UNBOUNDED DOMAINS.
In: Advances in Differential Equations, pp. 401-428, 21, (5-6), ISSN 1079-9389,
[Article]

Farwig, Reinhard and Giga, Yoshikazu and Hsu, Pen-Yuan (2016):
Initial Values for the Navier-Stokes Equations in Spaces with Weights in Time.
In: Funkcialaj Ekvacioj-Serio Internacia, pp. 199-216, 59, (2), ISSN 0532-8721,
[Article]

Falconi, C. J. and Lehrenfeld, C. and Marschall, H. and Meyer, C. and Abiev, R. and Bothe, D. and Reusken, A. and Schlueter, M. and Woerner, M. (2016):
Numerical and experimental analysis of local flow phenomena in laminar Taylor flow in a square mini-channel.
In: Physics of Fluids, 28, (1), ISSN 1070-6631,
[Online-Edition: http://dx.doi.org/10.1063/1.4939498],
[Article]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
TU Darmstadt, [Master Thesis]

Freystein, Martin and Kolberg, Felix and Spiegel, Lucas and Sinha-Ray, Sumit and Sahu, Rakesh P. and Yarin, Alexander L. and Gambaryan-Roisman, Tatiana and Stephan, Peter (2016):
Trains of Taylor bubbles over hot nano-textured mini-channel surface.
In: International Journal of Heat and Mass Transfer, pp. 827-833, 93, ISSN 0017-9310,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatmasstransfer.2015.10.054],
[Article]

Fath, Anja and Bothe, Dieter (2015):
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, pp. 209-221, 77, ISSN 0301-9322,
[Online-Edition: http://dx.doi.org/10.1016/j.ijmultiphaseflow.2015.08.018],
[Article]

Fath, Anja and Bothe, Dieter (2015):
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, pp. 209-221, 77, ISSN 0301-9322,
[Online-Edition: http://dx.doi.org/10.1016/j.ijmultiphaseflow.2015.08.018],
[Article]

Frydrych, Holger and Marthaler, Michael and Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society, p. 10, (92), [Article]

Fischlin, Marc and Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, ACM, Denver, Colorado, USA, In: WPES '15, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Conference or Workshop Item]

Funke, Sebastian and Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis and Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), poster proceedings, IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Marson, Giorgia Azzurra and Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Frydrych, H. and Hoskovec, A. and Jex, I. and Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, pp. 025501, IOP Publishing, [Article]

Fischer, Sebastian and Gambaryan-Roisman, Tatiana and Stephan, Peter (2015):
On the development of a thin evaporating liquid film at a receding liquid/vapour-interface.
In: International Journal of Heat and Mass Transfer, pp. 346-356, 88, ISSN 0017-9310,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatmasstransfer.2015.04.055],
[Article]

Fabbiane, Nicolo and Simon, Bernhard and Fischer, Felix and Grundmann, Sven and Bagheri, Shervin and Henningson, Dan S. (2015):
On the role of adaptivity for robust laminar flow control.
In: Journal of Fluid Mechanics, pp. 767 R1-12, 767, ISSN 0022-1120,
[Online-Edition: http://dx.doi.org/10.1017/jfm.2015.45],
[Article]

Fath, Anja and Horn, Tobias and Gambaryan-Roisman, Tatiana and Stephan, Peter and Bothe, Dieter (2015):
Numerical and experimental analysis of short-scale Marangoni convection on heated structured surfaces.
In: International Journal of Heat and Mass Transfer, pp. 764-779, 86, ISSN 0017-9310,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatmasstransfer.2015.03.034],
[Article]

Farwig, Reinhard and Nakatsuka, Tomoyuki and Taniuchi, Yasushi (2015):
Existence of solutions on the whole time axis to the Navier-Stokes equations with precompact range in L (3).
In: Archiv Der Mathematik, pp. 539-550, 104, (6), ISSN 0003-889X,
[Article]

Farwig, Reinhard and Riechwald, Paul Felix (2015):
Very weak solutions to the Navier-Stokes system in general unbounded domains.
In: Journal of Evolution Equations, pp. 253-279, 15, (2), ISSN 1424-3199,
[Online-Edition: http://dx.doi.org/10.1007/s00028-014-0258-y],
[Article]

Fuest, Frederik and Barlow, Robert S. and Magnotti, Gaetano and Dreizler, Andreas and Ekoto, Isaac W. and Sutton, Jeffrey A. (2015):
Quantitative acetylene measurements in laminar and turbulent flames using 1D Raman/Rayleigh scattering.
In: Combustion and Flame, pp. 2248-2255, 162, (5), ISSN 0010-2180,
[Online-Edition: http://dx.doi.org/10.1016/j.combustflame.2015.01.021],
[Article]

Farwig, Reinhard and Nakatsuka, Tomoyuki and Taniuchi, Yasushi (2015):
Uniqueness of Solutions on the Whole Time Axis to the Navier-Stokes Equations in Unbounded Domains.
In: Communications in Partial Differential Equations, pp. 1884-1904, 40, (10), ISSN 0360-5302,
[Online-Edition: http://dx.doi.org/10.1080/03605302.2015.1054938],
[Article]

Farwig, Reinhard and Riechwald, Paul Felix (2015):
Very weak solutions and the Fujita-Kato approach to the Navier-Stokes system in general unbounded domains.
In: Nodea-Nonlinear Differential Equations and Applications, pp. 1143-1165, 22, (5), ISSN 1021-9722,
[Online-Edition: http://dx.doi.org/10.1007/s00030-015-0317-2],
[Article]

Fiorina, B. and Mercier, R. and Kuenne, G. and Ketelheun, Anja and Avdic, Amer and Janicka, J. and Geyer, D. and Dreizler, A. and Alenius, E. and Duwig, C. and Trisjono, P. and Kleinheinz, K. and Kang, S. and Pitsch, H. and Proch, F. and Marincola, F. Cavallo and Kempf, A. (2015):
Challenging modeling strategies for LES of non-adiabatic turbulent stratified combustion.
In: Combustion and Flame, pp. 4264-4282, 162, (11), ISSN 0010-2180,
[Online-Edition: http://dx.doi.org/10.1016/j.combustflame.2015.07.036],
[Article]

Farwig, Reinhard and Sohr, Hermann and Varnhorn, Werner (2015):
LOCAL STRONG SOLUTIONS OF THE NONHOMOGENEOUS NAVIER-STOKES SYSTEM WITH CONTROL OF THE INTERVAL OF EXISTENCE.
In: Topological Methods in Nonlinear Analysis, pp. 999-1012, 46, (2), ISSN 1230-3429,
[Article]

Fleckenstein, Stefan and Bothe, Dieter (2015):
A Volume-of-Fluid-based numerical method for multi-component mass transfer with local volume changes.
In: Journal of Computational Physics, pp. 35-58, 301, ISSN 0021-9991,
[Online-Edition: http://dx.doi.org/10.1016/j.jcp.2015.08.011],
[Article]

Fehr, Victoria and Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, p. 765, 2015, [Article]

Fischlin, Marc and Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Faraon, Montathar and Stenberg, Georg J. H. and Budurushi, Jurlind and Kaipainen, Mauri
Parycek, Peter and Sachs, Michael and Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Feier, Christian and Neumann, Stephan and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, TU Darmstadt, [Master Thesis]

Franz, Martin and Holzer, Andreas and Katzenbeisser, Stefan and Schallhart, Christian and Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, 8409, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja and Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
In: J. Cryptology, 27, DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

Fleischhacker, N. and Günther, F. and Kiefer, F. and Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]

Felzer, Torsten and Rinderknecht, Stephan (2013):
Mouse mode of OnScreenDualScribe: Three types of keyboard-driven mouse replacement.
In: CHI '13 Extended Abstracts on Human Factors in Computing Systems, ACM Press, pp. 1593-1598, DOI: 10.1145/2468356.2468641,
[Book Section]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, pp. 117-128, 17, (3), [Article]

Fontein, Felix and Schneider, Michael and Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013, Bergen (Norway), [Conference or Workshop Item]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Fehr, Victoria (2012):
Sophisticated Public-Key Encryption.
Tu Darmstadt, [Master Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

G

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference or Workshop Item]

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena and Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, In: 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Geihs, Matthias and Nikiforov, Oleg and Demirel, Denise and Sauer, Alexander and Butin, Denis and Günther, Felix and Alber, Gernot and Walther, Thomas and Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: 10.1109/TSUSC.2019.2913948,
[Online-Edition: https://ieeexplore.ieee.org/document/8703121],
[Article]

Grefe, Ann-Kathrin and Kuttich, Björn and Stühn, Lukas and Stark, Robert and Stühn, Bernd (2019):
Oriented crystallization of PEG induced by confinement in cylindrical nanopores: Structural and thermal properties.
In: Soft Matter, pp. 3149-3159, (15), ISSN 1744-683X,
DOI: 10.1039/C9SM00053D,
[Online-Edition: https://doi.org/10.1039/C9SM00053D],
[Article]

Grube, Tim and Daubert, Jörg and Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
IEEE, In: IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813,
ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Online-Edition: https://ieeexplore.ieee.org/document/8647607],
[Conference or Workshop Item]

Geihs, Matthias and Schabhüser, Lucas and Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
Springer, In: International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, In: LNCS, [Online-Edition: http://www.c2si-conference.org/],
[Conference or Workshop Item]

Geyer, Florian and Seiler, Patrick M. and Vollmer, Doris and Berger, Rüdiger (2019):
Wie sich Tropfen bewegen.
In: Physik in unserer Zeit, pp. 90-96, 50, (2), ISSN 00319252,
DOI: 10.1002/piuz.201901531,
[Online-Edition: https://doi.org/10.1002/piuz.201901531],
[Article]

Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian
Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
Hamburg, Germany, ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8. bis 11. September 2019, [Conference or Workshop Item]

Geyer, Florian and Asaumi, Yuta and Vollmer, Doris and Butt, Hans-Jürgen and Nakamura, Yoshinobu and Fujii, Syuji (2019):
Polyhedral Liquid Marbles.
In: Advanced Functional Materials, Wiley-Blackwell - STM, p. 1808826, 29, (25), ISSN 1616301X,
DOI: 10.1002/adfm.201808826,
[Online-Edition: https://doi.org/10.1002/adfm.201808826],
[Article]

Geihs, Matthias and Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: International Conference on Information Security and Cryptology (ICISC) 2018, Springer, Seoul, Korean, Nov 28, 2018 - Nov 30, 2018, In: LNCS, [Online-Edition: http://www.wikicfp.com/cfp/program?id=1397&s=ICISC&f=Interna...],
[Conference or Workshop Item]

Gil Dantas, Yuri and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor Thesis]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena and Henhapl, Birgit and Emeröz, Sinem and Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
In: International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference or Workshop Item]

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference or Workshop Item]

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), In: ACM, [Conference or Workshop Item]

Guhl, Conrad and Kehne, Philipp and Ma, Qianli and Tietz, Frank and Alff, Lambert and Komissinskiy, Philipp and Jaegermann, Wolfram and Hausbrand, René (2018):
In-operando photoelectron spectroscopy for batteries: Set-up using pristine thin film cathode and first results on NaxCoO2.
In: Review of Scientific Instruments, AMER INST PHYSICS, 1305 WALT WHITMAN RD, STE 300, MELVILLE, NY 11747-4501 USA, pp. 073104, 89, (7), ISSN 0034-6748,
DOI: 10.1063/1.5022616,
[Online-Edition: https://doi.org/10.1063/1.5022616],
[Article]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelor Thesis]

Guhl, Conrad and Kehne, Philipp and Ma, Qianli and Tietz, Frank and Komissinskiy, Philipp and Jaegermann, Wolfram and Hausbrand, René (2018):
Interfaces in solid-state sodium-ion batteries: NaCoO 2 thin films on solid electrolyte substrates.
In: Electrochimica Acta, Elsevier Science Publishing, pp. 226-233, 268, ISSN 00134686,
DOI: 10.1016/j.electacta.2018.02.109,
[Online-Edition: https://doi.org/10.1016/j.electacta.2018.02.109],
[Article]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Mezini, Mira
Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, Gesellschaft für Informatik, pp. 117-118, [Book Section]

Gens, David and Schmitt, Simon and Davi, Lucas and Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, pp. 83-98, [Book Section]

Godina, Lidia I. and Tokarev, Anton V. and Simakova, Irina L. and Mäki-Arvela, Päivi and Kortesmäki, Ewelina and Gläsel, Jan and Kronberg, Leif and Etzold, Bastian and Murzin, Dmitry Yu. (2018):
Aqueous-phase reforming of alcohols with three carbon atoms on carbon-supported Pt.
In: Catalysis Today, pp. 78-89, 301, ISSN 09205861,
DOI: 10.1016/j.cattod.2017.03.042,
[Online-Edition: https://doi.org/10.1016/j.cattod.2017.03.042],
[Article]

Gao, Yangyang and Müller-Plathe, Florian (2018):
Molecular Dynamics Study on the Thermal Conductivity of the End-grafted Carbon Nanotubes Filled Polyamide-6.6 Nanocomposites.
In: The Journal of Physical Chemistry C, pp. 1412-1421, 122, (2), ISSN 1932-7447,
DOI: 10.1021/acs.jpcc.7b11310,
[Online-Edition: https://doi.org/10.1021/acs.jpcc.7b11310],
[Article]

Ghoussoub, Yara E. and Zerball, Maximilian and Fares, Hadi M. and Ankner, John F. and von Klitzing, Regine and Schlenoff, Joseph B. (2018):
Ion distribution in dry polyelectrolyte multilayers: a neutron reflectometry study.
In: Soft Matter, pp. 1699-1708, 14, (9), ISSN 1744-683X,
DOI: 10.1039/c7sm02461d,
[Online-Edition: https://doi.org/10.1039/c7sm02461d],
[Article]

Gil Dantas, Yuri and Gay, Richard and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Ganter, Sebastian and Straßacker, Christina and Kuenne, Guido and Meier, Thorsten and Heinrich, Arne and Maas, Ulrich and Janicka, J. (2018):
Laminar near-wall combustion: Analysis of tabulated chemistry simulations by means of detailed kinetics.
In: International Journal of Heat and Fluid Flow, pp. 259-270, 70, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.02.015,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.02.015],
[Article]

Gugat, Martin and Ulbrich, Stefan (2018):
Lipschitz solutions of initial boundary value problems for balance laws.
In: Mathematical Models and Methods in Applied Sciences, pp. 921-951, 28, (05), ISSN 0218-2025,
DOI: 10.1142/s0218202518500240,
[Online-Edition: https://doi.org/10.1142/s0218202518500240],
[Article]

Grebenev, Vladimir N. and Oberlack, Martin (2018):
Homogeneous Isotropic Turbulence: Geometric and Isometry Properties of the 2-point Velocity Correlation Tensor.
In: Journal of Nonlinear Mathematical Physics, pp. 650-672, 25, (4), ISSN 1402-9251,
DOI: 10.1080/14029251.2018.1503447,
[Online-Edition: https://doi.org/10.1080/14029251.2018.1503447],
[Article]

Gerber, Nina and Zimmermann, Verena and Henhapl, Birgit and Emeröz, Sinem and Volkamer, Melanie and Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), pp. 680-685, 42, (11), [Article]

Gründing, Dirk and Bothe, Dieter and Marschall, Holger (2018):
Wetting phenomena with ALE interface tracking.
In: PAMM, pp. e201800430, 18, (1), ISSN 16177061,
DOI: 10.1002/pamm.201800430,
[Online-Edition: https://doi.org/10.1002/pamm.201800430],
[Article]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8094],
[Ph.D. Thesis]

Gerlach, Felix and Garoff, Stephen and Tropea, Cameron (2018):
Quantitative optical measurement of contact lines on milliscale metal structures dipped into a liquid pool.
In: Proceedings of the 19th International Symposium on Application of Laser and Imaging Techniques to Fluid Mechanics, Lisbon, In: 19th International Symposium on Application of Laser and Imaging Techniques to Fluid Mechanics, Lisbon, 16-19 July 2018, ISBN 978-989-20-9177-8,
[Conference or Workshop Item]

Geyer, Florian and D'Acunzi, Maria and Yang, Ching-Yu and Müller, Michael and Baumli, Philipp and Kaltbeitzel, Anke and Mailänder, Volker and Encinas, Noemí and Vollmer, Doris and Butt, Hans-Jürgen (2018):
How to Coat the Inside of Narrow and Long Tubes with a Super-Liquid-Repellent Layer-A Promising Candidate for Antibacterial Catheters.
In: Advanced Materials, p. 1801324, 31, (2), ISSN 09359648,
DOI: 10.1002/adma.201801324,
[Online-Edition: https://doi.org/10.1002/adma.201801324],
[Article]

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Online-Edition: https://encrypto.de/papers/GKS17.pdf],
[Conference or Workshop Item]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference or Workshop Item]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3106305],
[Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena
Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa (eds.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, Gesellschaft für Informatik, Regensburg, Germany, DOI: 10.18420/muc2017-ws05-0405,
[Conference or Workshop Item]

Grube, Tim and Thummerer, Markus and Daubert, Jörg and Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Security and Trust Management. STM 2017., Oslo, Norway, Springer, In: 13th International Workshop on Security and Trust Management, Oslo, Norway, In: Lecture Notes in Computer Science, 10547, DOI: 10.1007/978-3-319-68063-7_15,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...],
[Conference or Workshop Item]

Günther, Felix and Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Göpfert, Florian and van Vredendaal, Christine and Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, [Conference or Workshop Item]

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Gielok, Martin and Lopes, Marcus and Bonaccurso, Elmar and Gambaryan-Roisman, Tatiana (2017):
Droplet on an elastic substrate: Finite Element Method coupled with lubrication approximation.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, pp. 13-21, 521, ISSN 09277757,
[Online-Edition: http://doi.org/10.1016/j.colsurfa.2016.08.001],
[Article]

Grosse-Puppendahl, Tobias and Holz, Christian and Cohn, Gabe A. and Wimmer, Raphael and Bechtold, Oskar and Hodges, Steve and Reynolds, Matthew S. and Smith, Joshua R. (2017):
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
In: CHI'17 CHI Conference on Human Factors in Computing Systems, ACM, Denver, CO, USA, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025808,
[Conference or Workshop Item]

Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques, Springer, [Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Günther, Felix and Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, Springer, pp. 281-297, 16, (3), ISSN 1615-5270,
[Article]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference or Workshop Item]

Gugat, Martin and Ulbrich, Stefan (2017):
The isothermal Euler equations for ideal gas with source term: Product solutions, flow reversal and no blow up.
In: Journal of Mathematical Analysis and Applications, pp. 439-452, 454, (1), ISSN 0022247X,
[Online-Edition: https://doi.org/10.1016/j.jmaa.2017.04.064],
[Article]

Galdi, Giovanni P. and Hieber, Matthias and Kashiwabara, Takahito (2017):
Strong time-periodic solutions to the 3D primitive equations subject to arbitrary large forces.
In: Nonlinearity, pp. 3979-3992, 30, (10), ISSN 0951-7715,
DOI: 10.1088/1361-6544/aa8166,
[Online-Edition: https://doi.org/10.1088/1361-6544/aa8166],
[Article]

Groß, T. F. and Pöttgen, P. F. and Pelz, P. F. (2017):
Analytical Approach for the Optimal Operation of Pumps in Booster Systems.
In: Journal of Water Resources Planning and Management, pp. 04017029, 143, (8), ISSN 0733-9496,
DOI: 10.1061/(asce)wr.1943-5452.0000776,
[Online-Edition: https://doi.org/10.1061/(asce)wr.1943-5452.0000776],
[Article]

Grebenev, V. N. and Wacławczyk, M. and Oberlack, M. (2017):
Conformal invariance of the Lungren–Monin–Novikov equations for vorticity fields in 2D turbulence.
In: Journal of Physics A: Mathematical and Theoretical, p. 435502, 50, (43), ISSN 1751-8113,
DOI: 10.1088/1751-8121/aa8c69,
[Online-Edition: https://doi.org/10.1088/1751-8121/aa8c69],
[Article]

Groß, M. and Tupinamba Lima, M. and Uhlig, M. and Ebraheme, A. and Roeber, O. and Olschewski, B. and von Klitzing, R. and Schomäcker, R. and Schwarze, M. (2017):
Biopolymers for dye removal via foam separation.
In: Separation and Purification Technology, pp. 451-457, 188, ISSN 13835866,
DOI: 10.1016/j.seppur.2017.07.025,
[Online-Edition: https://doi.org/10.1016/j.seppur.2017.07.025],
[Article]

Ganter, Sebastian and Heinrich, Arne and Meier, Thorsten and Kuenne, Guido and Jainski, Christopher and Rißmann, Martin C. and Dreizler, Andreas and Janicka, J. (2017):
Numerical analysis of laminar methane–air side-wall-quenching.
In: Combustion and Flame, Elsevier, pp. 299-310, 186, ISSN 00102180,
DOI: 10.1016/j.combustflame.2017.08.017,
[Online-Edition: https://doi.org/10.1016/j.combustflame.2017.08.017],
[Article]

Gao, Yangyang and Müller-Plathe, Florian (2017):
Effect of grafted chains on the heat transfer between carbon nanotubes in a polyamide-6.6 matrix: A molecular dynamics study.
In: Polymer, pp. 228-234, 129, ISSN 00323861,
DOI: 10.1016/j.polymer.2017.09.066,
[Online-Edition: https://doi.org/10.1016/j.polymer.2017.09.066],
[Article]

Gao, Nan and Geyer, Florian and Pilat, Dominik W. and Wooh, Sanghyuk and Vollmer, Doris and Butt, Hans-Jürgen and Berger, Rüdiger (2017):
How drops start sliding over solid surfaces.
In: Nature Physics, pp. 191-196, 14, (2), ISSN 1745-2473,
DOI: 10.1038/nphys4305,
[Online-Edition: https://doi.org/10.1038/nphys4305],
[Article]

Gerber, Paul and Volkamer, Melanie and Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Gronarz, Tim and Schulze, Jan and Laemmerhold, Mischka and Graeser, Philipp and Gorewoda, Jeanette and Kez, Vitali and Habermehl, Martin and Schiemann, Martin and Ströhle, Jochen and Epple, Bernd and Scherer, Viktor and Kneer, Reinhold (2017):
Quantification of the influence of parameters determining radiative heat transfer in an oxy-fuel operated boiler.
In: Fuel Processing Technology, pp. 76-89, 157, ISSN 03783820,
DOI: 10.1016/j.fuproc.2016.11.012,
[Online-Edition: https://doi.org/10.1016/j.fuproc.2016.11.012],
[Article]

Gerber, Paul and Renaud, Karen and Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, pp. 8-26, 34, (1), DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference, Auckland, New Zealand, [Conference or Workshop Item]

Ghiglieri, Marco and Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Gagliardoni, Tommaso and Hülsing, Andreas and Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: Advances in Cryptology – CRYPTO 2016, Springer, In: LNCS, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, 10., [Conference or Workshop Item]

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Ghiglieri, Marco and Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, pp. pp. 61-67, vol. 14, no., (IEEE 14/3), [Article]

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Ghiglieri, Marco and Hansen, Marit and Nebel, Maxi and Pörschke, Julia Victoria and Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Gumprich, Werner and Synek, B. and Sadiki, A. (2016):
ASSESSMENT OF THE DIRECT QUADRATURE-BASED SECTIONAL METHOD OF MOMENTS FOR THE SIMULATION OF EVAPORATING POLYDISPERSE SPRAYS.
In: Atomization and Sprays, pp. 163-186, 26, (2), ISSN 1044-5110,
[Online-Edition: http://dx.doi.org/10.1615/AtomizSpr.2014010635],
[Article]

Gao, Yangyang and Mueller-Plathe, Florian (2016):
Increasing the Thermal Conductivity of Graphene-Polyamide-6,6 Nanocomposites by Surface-Grafted Polymer Chains: Calculation with Molecular Dynamics and Effective-Medium Approximation.
In: Journal of Physical Chemistry B, pp. 1336-1346, 120, (7), ISSN 1520-6106,
[Online-Edition: http://dx.doi.org/10.1021/acs.jpcb.5b08398],
[Article]

Geissert, Matthias and Hieber, Matthias and Thieu Huy, Nguyen (2016):
A General Approach to Time Periodic Incompressible Viscous Fluid Flow Problems.
In: Archive for Rational Mechanics and Analysis, pp. 1095-1118, 220, (3), ISSN 0003-9527,
[Online-Edition: http://dx.doi.org/10.1007/s00205-015-0949-8],
[Article]

Golzke, Hendrik and Leick, Philippe and Dreizler, Andreas (2016):
Differential infrared thermography of gasoline direct injection sprays.
In: Quantitative Infrared Thermography Journal, pp. 50-69, 13, (1), ISSN 1768-6733,
[Online-Edition: http://dx.doi.org/10.1080/17686733.2015.1084725],
[Article]

Ganguly, Pritam and van der Vegt, Nico F. A. and Shea, Joan-Emma (2016):
Hydrophobic Association in Mixed Urea-TMAO Solutions.
In: Journal of Physical Chemistry Letters, pp. 3052-3059, 7, (15), ISSN 1948-7185,
[Online-Edition: http://dx.doi.org/10.1021/acs.jpclett.6b01344],
[Article]

Guan, Lulu and Yu, Haitao and Shen, Jianqi and Tropea, Cameron (2016):
Simulation of optical caustics associated with the tertiary rainbow of oblate droplets.
In: Applied Optics, pp. 6447-6451, 55, (23), ISSN 1559-128X,
[Online-Edition: http://dx.doi.org/10.1364/ao.55.006447],
[Article]

Guo, Xiaogang and Peng, Chong and Wu, Wei and Wang, Yongqi (2016):
A hypoplastic constitutive model for debris materials.
In: Acta Geotechnica, pp. 1217-1229, 11, (6), ISSN 1861-1125,
[Online-Edition: http://doi.org/10.1007/s11440-016-0494-0],
[Article]

Gründing, D. and Fleckenstein, S. and Bothe, D. (2016):
A subgrid-scale model for reactive concentration boundary layers for 3D mass transfer simulations with deformable fluid interfaces.
In: International Journal of Heat and Mass Transfer, pp. 476-487, 101, ISSN 0017-9310,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatmasstransfer.2016.04.119],
[Article]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5850],
[Ph.D. Thesis]

Germanus, Daniel and Ismail, Hatem and Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, [Conference or Workshop Item]

Gong, Liang and Pradel, Michael and Sen, Koushik (2015):
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ACM, Bergamo, Italy, In: ESEC/FSE 2015, ISBN 978-1-4503-3675-8,
DOI: 10.1145/2786805.2786831,
[Conference or Workshop Item]

Gong, Liang and Pradel, Michael and Sridharan, Manu and Sen, Koushik (2015):
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, ACM, Baltimore, MD, USA, In: ISSTA 2015, ISBN 978-1-4503-3620-8,
DOI: 10.1145/2771783.2771809,
[Conference or Workshop Item]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, In: Weiterdenken, [Conference or Workshop Item]

Günther, Felix and Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference or Workshop Item]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Ghiglieri, Marco and Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, pp. 16-21, 45, (1), DOI: 10.1145/2738210.2738214,
[Article]

Gerber, Paul and Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, pp. 108 - 113, 2/2015, DOI: 10.1007/s11623-015-0375-y,
[Article]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC, Las Vegas, NV, [Conference or Workshop Item]

Gambaryan-Roisman, Tatiana (2015):
Modulation of Marangoni convection in liquid films.
In: Advances in colloid and interface science, pp. 319-331, 222, ISSN 0001-8686,
[Online-Edition: http://dx.doi.org/10.1016/j.cis.2015.02.003],
[Article]

Gatti, Davide and Guettler, Andreas and Frohnapfel, Bettina and Tropea, Cameron (2015):
Experimental assessment of spanwise-oscillating dielectric electroactive surfaces for turbulent drag reduction in an air channel flow.
In: Experiments in Fluids, 56, (5), ISSN 0723-4864,
[Online-Edition: http://dx.doi.org/10.1007/s00348-015-1983-x],
[Article]

Ganguly, Pritam and Hajari, Timir and Shea, Joan-Emma and van der Vegt, Nico F. A. (2015):
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment.
In: Journal of Physical Chemistry Letters, pp. 581-585, 6, (4), ISSN 1948-7185,
[Article]

Ganguly, Pritam and Hajari, Timir and Shea, Joan-Emma and van der Vegt, Nico F. A. (2015):
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment (vol 6, pg 581, 2015).
In: Journal of Physical Chemistry Letters, pp. 4728-4729, 6, (23), ISSN 1948-7185,
[Online-Edition: http://dx.doi.org/10.1021/acs.jpclett.5b02536],
[Article]

Ganji, Fatemeh and Krämer, Juliane and Seifert, Jean-Pierre and Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, US, [Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security, Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas
Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: Cryptology and Network Security (13th International Conference, CANS 2014), Springer, Heraklion, Crete, Greece, In: LNCS, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto and Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 11/2014, [Conference or Workshop Item]

Geihs, Matthias and Cabarcas, Daniel
Aranha, Diego F. and Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, Springer, Florianópolis, Brazil, In: LNCS, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
San Jose, California, [Other]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael (2014):
Personal DLP for Facebook.
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, In: 6, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco and Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 10/2013, [Conference or Workshop Item]

Gutmann, Andreas and Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
Kagawa, Japan, [Other]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt, [Master Thesis]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt, [Master Thesis]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco and Kalabis, Lukas and Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Gupta, Aditi and Miettinen, Markus and Asokan, N. and Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference or Workshop Item]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes
Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Gupta, Aditi and Miettinen, Markus and Nagy, Marcin and Asokan, Nadarajah and Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Lugano, Switzerland, ISBN 978-1-4673-0905-9,
DOI: 10.1109/PerComW.2012.6197553,
[Conference or Workshop Item]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt, [Master Thesis]

H

Heß, Julian and Tai, Yih-Chin and Wang, Yongqi (2019):
Debris flows with pore pressure and intergranular friction on rugged topography.
In: Computers & Fluids, pp. 139-155, 190, ISSN 00457930,
DOI: 10.1016/j.compfluid.2019.06.015,
[Online-Edition: https://doi.org/10.1016/j.compfluid.2019.06.015],
[Article]

Hark, Rhaban Simon (2019):
Monitoring Federated Softwarized Networks: Approaches for Efficient and Collaborative Data Collection in Large-Scale Software-Defined Networks.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9073],
[Ph.D. Thesis]

Heidt, Margareta and Gerlach, Jin and Buxmann, Peter (2019):
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
In: Hawaii International Conference on System Sciences (HICSS), Wailea, USA, 08.-11.01.2019, [Online-Edition: http://hicss.hawaii.edu],
[Conference or Workshop Item]

Heidt, Margareta and Olt, Christian M. and Buxmann, Peter (2019):
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
In: Internationale Tagung Wirtschaftsinformatik, Siegen, Deutschland, 24.02.2019-27.02.2019, [Online-Edition: https://wi2019.de/],
[Conference or Workshop Item]

Heß, Julian and Wang, Yongqi (2019):
On the role of pore-fluid pressure evolution and hypoplasticity in debris flows.
In: European Journal of Mechanics - B/Fluids, pp. 363-379, 74, ISSN 09977546,
DOI: 10.1016/j.euromechflu.2018.09.005,
[Online-Edition: https://doi.org/10.1016/j.euromechflu.2018.09.005],
[Article]

Hartmann, Maximilian and Hardt, Steffen (2019):
Stability of Evaporating Droplets on Chemically Patterned Surfaces.
In: Langmuir, pp. 4868-4875, 35, (14), ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.9b00172,
[Online-Edition: https://doi.org/10.1021/acs.langmuir.9b00172],
[Article]

Hartl, S. and Van Winkle, R. and Geyer, D. and Dreizler, A. and Magnotti, G. and Hasse, C. and Barlow, R.S. (2019):
Assessing the relative importance of flame regimes in Raman/Rayleigh line measurements of turbulent lifted flames.
In: Proceedings of the Combustion Institute, pp. 2297-2305, 37, (2), ISSN 15407489,
DOI: 10.1016/j.proci.2018.06.067,
[Online-Edition: https://doi.org/10.1016/j.proci.2018.06.067],
[Article]

Han, Wang and Wang, Haiou and Kuenne, Guido and Hawkes, Evatt R. and Chen, Jacqueline H. and Janicka, Johannes and Hasse, Christian (2019):
Large eddy simulation/dynamic thickened flame modeling of a high Karlovitz number turbulent premixed jet flame.
In: Proceedings of the Combustion Institute, pp. 2555-2563, 37, (2), ISSN 15407489,
DOI: 10.1016/j.proci.2018.06.228,
[Online-Edition: https://doi.org/10.1016/j.proci.2018.06.228],
[Article]

Han, Wang and Scholtissek, Arne and Hasse, Christian (2019):
The role of tangential diffusion in evaluating the performance of flamelet models.
In: Proceedings of the Combustion Institute, pp. 1767-1774, 37, (2), ISSN 15407489,
DOI: 10.1016/j.proci.2018.06.171,
[Online-Edition: https://doi.org/10.1016/j.proci.2018.06.171],
[Article]

Hieber, Matthias and Mahalov, Alex and Takada, Ryo (2019):
Time periodic and almost time periodic solutions to rotating stratified fluids subject to large forces.
In: Journal of Differential Equations, pp. 977-1002, 266, (2-3), ISSN 00220396,
DOI: 10.1016/j.jde.2018.07.067,
[Online-Edition: https://doi.org/10.1016/j.jde.2018.07.067],
[Article]

Hänichen, Philipp and Bender, Achim and Voß, Bernhard and Gambaryan-Roisman, Tatiana and Stephan, Peter (2019):
Drop evaporation of hydrocarbon fluids with deposit formation.
In: International Journal of Heat and Mass Transfer, pp. 115 - 124, 128, ISSN 0017-9310,
DOI: 10.1016/j.ijheatmasstransfer.2018.08.102,
[Online-Edition: https://doi.org/10.1016/j.ijheatmasstransfer.2018.08.102],
[Article]

Haaf, Martin and Ohlemüller, Peter and Ströhle, Jochen and Epple, Bernd (2019):
Techno-economic assessment of alternative fuels in second-generation carbon capture and storage processes.
In: Mitigation and Adaptation Strategies for Global Change, ISSN 1381-2386,
DOI: 10.1007/s11027-019-09850-z,
[Online-Edition: https://doi.org/10.1007/s11027-019-09850-z],
[Article]

Hartwig, Katrin and Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Hartwig, Katrin and Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTwe...],
[Conference or Workshop Item]

Herzog, Nicole and Brilmayer, Robert and Stanzel, Mathias and Kalyta, Anastasia and Spiehl, Dieter and Dörsam, Edgar and Hess, Christian and Andrieu-Brunsen, Annette (2019):
Gravure printing for mesoporous film preparation.
In: RSC Advances, Royal Socienty of Chemistry, pp. 23570-23578, 9, (41), ISSN 2046-2069,
DOI: 10.1039/C9RA04266K,
[Online-Edition: https://doi.org/10.1039/C9RA04266K],
[Article]

Heidt, Margareta and Gerlach, Jin (2018):
The Influence of SME Constraints in an Organizational IT Security Context.
San Francisco, USA, In: International Conference on Information Systems (ICIS), San Francisco, USA, 13.-16.12.2018, [Online-Edition: https://icis2018.aisconferences.org/],
[Conference or Workshop Item]

Hutter, Kolumban and Wang, Yongqi (2018):
Fluid and Thermodynamics. Volume 3: Structured and Multiphase Fluids.
Springer, ISBN 978-3-319-77744-3,
DOI: 10.1007/978-3-319-77745-0,
[Online-Edition: https://doi.org/10.1007/978-3-319-77745-0],
[Book]

Helm, Dominik and Kübler, Florian and Eichberg, Michael and Reif, Michael and Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ACM, In: ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226],
[Conference or Workshop Item]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelor Thesis]

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference or Workshop Item]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Master Thesis]

Haaf, Martin and Hilz, Jochen and Helbig, Martin and Weingärtner, Christoph and Stallmann, Olaf and Ströhle, Jochen and Epple, Bernd (2018):
Assessment of the operability of a 20 MWth calcium looping demonstration plant by advanced process modelling.
In: International Journal of Greenhouse Gas Control, pp. 224-234, 75, ISSN 17505836,
DOI: 10.1016/j.ijggc.2018.05.014,
[Online-Edition: https://doi.org/10.1016/j.ijggc.2018.05.014],
[Article]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master Thesis]

Heidt, Margareta (2018):
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress], [Article]

Heinrich, A. and Ries, F. and Kuenne, G. and Ganter, S. and Hasse, C. and Sadiki, A. and Janicka, J. (2018):
Large Eddy Simulation with tabulated chemistry of an experimental sidewall quenching burner.
In: International Journal of Heat and Fluid Flow, pp. 95-110, 71, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.03.011,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.03.011],
[Article]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Master Thesis]

Heß, Julian and Wang, Yongqi (2018):
Modeling Debris Flow: On The Influence Of Pore Pressure Evolution And Hypoplasticity.
In: International Journal of Computational Methods and Experimental Measurements, WIT Press, pp. 385-397, 6, (2), ISSN 2046-0554,
DOI: 10.2495/CMEM-V6-N2-385-397,
[Online-Edition: https://www.witpress.com/elibrary/cmem-volumes/6/2/1986],
[Article]

Han, Haoya and Li, Li and Yang, Qingsong and Tian, Yuchuan and Wang, Yunwei and Ye, Zhishuang and von Klitzing, Regine and Guo, Xuhong (2018):
Characterization of hollow silica–polyelectrolyte composite nanoparticles by small-angle X-ray scattering.
In: Journal of Materials Science, pp. 3210-3224, 53, (5), ISSN 0022-2461,
DOI: 10.1007/s10853-017-1747-5,
[Online-Edition: https://doi.org/10.1007/s10853-017-1747-5],
[Article]

Hänichen, Philipp and van Eyk, Maximilian and Stephan, Peter (2018):
Experimental investigations of fuel film evaporation with deposit formation.
In: International Journal of Heat and Fluid Flow, pp. 125 - 130, 70, ISSN 0142-727X,
DOI: 10.1016/j.ijheatfluidflow.2018.02.001,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.02.001],
[Article]

Hartl, Sandra and Geyer, Dirk and Dreizler, Andreas and Magnotti, Gaetano and Barlow, Robert S. and Hasse, Christian (2018):
Regime identification from Raman/Rayleigh line measurements in partially premixed flames.
In: Combustion and Flame, pp. 126 - 141, 189, ISSN 0010-2180,
DOI: 10.1016/j.combustflame.2017.10.024,
[Online-Edition: https://doi.org/10.1016/j.combustflame.2017.10.024],
[Article]

Hill, S. and Deising, D. and Acher, T. and Klein, H. and Bothe, D. and Marschall, H. (2018):
Boundedness-preserving implicit correction of mesh-induced errors for VOF based heat and mass transfer.
In: Journal of Computational Physics, pp. 285-300, 352, ISSN 00219991,
DOI: 10.1016/j.jcp.2017.09.027,
[Online-Edition: https://doi.org/10.1016/j.jcp.2017.09.027],
[Article]

Hellwig, Johannes and Strebe, Julia and Klitzing, Regine von (2018):
Effect of environmental parameters on the nano mechanical properties of hyaluronic acid/poly(l-lysine) multilayers.
In: Physical Chemistry Chemical Physics, pp. 19082-19086, 20, (28), ISSN 1463-9076,
DOI: 10.1039/c8cp02621a,
[Online-Edition: https://doi.org/10.1039/c8cp02621a],
[Article]

Hieber, Matthias and Prüss, Jan (2018):
On the bidomain problem with FitzHugh–Nagumo transport.
In: Archiv der Mathematik, pp. 313-327, 111, (3), ISSN 0003-889X,
DOI: 10.1007/s00013-018-1188-7,
[Online-Edition: https://doi.org/10.1007/s00013-018-1188-7],
[Article]

Hajduk, Andreas and Lebedev, Mikhail V. and Kaiser, Bernhard and Jaegermann, Wolfram (2018):
Interaction of liquid water with the p-GaInP2(100) surface covered with submonolayer oxide.
In: Physical Chemistry Chemical Physics, pp. 21144-21150, 20, (32), ISSN 1463-9076,
DOI: 10.1039/c8cp03337d,
[Online-Edition: https://doi.org/10.1039/c8cp03337d],
[Article]

Heinrich, Arne and Kuenne, Guido and Ganter, Sebastian and Hasse, Christian and Janicka, J. (2018):
Investigation of the Turbulent Near Wall Flame Behavior for a Sidewall Quenching Burner by Means of a Large Eddy Simulation and Tabulated Chemistry.
In: Fluids, p. 65, 3, (3), ISSN 2311-5521,
DOI: 10.3390/fluids3030065,
[Online-Edition: https://doi.org/10.3390/fluids3030065],
[Article]

Horsch, Moritz and Braun, Johannes and Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017, Karlstad, Sweden, [Conference or Workshop Item]

Haaf, Martin and Stroh, Alexander and Hilz, Jochen and Helbig, Martin and Ströhle, Jochen and Epple, Bernd (2017):
Process Modelling of the Calcium Looping Process and Validation Against 1 MWth Pilot Testing.
In: Energy Procedia, pp. 167-178, 114, ISSN 18766102,
DOI: 10.1016/j.egypro.2017.03.1159,
[Online-Edition: https://doi.org/10.1016/j.egypro.2017.03.1159],
[Article]

Horsch, Moritz and Braun, Johannes and Metz, Dominique and Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Auckland, New Zealand, [Conference or Workshop Item]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
In: 2017 IEEE Symposium on Security and Privacy (SP 2017), Curran Associates, Inc, San Jose, CA, USA, 2, ISBN 978-1-5090-5534-0,
[Conference or Workshop Item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master Thesis]

Heß, Julian and Wang, Yongqi and Hutter, Kolumban (2017):
Thermodynamically consistent modeling of granular-fluid mixtures incorporating pore pressure evolution and hypoplastic behavior.
In: Continuum Mechanics and Thermodynamics, pp. 311-343, 29, (1), ISSN 0935-1175,
[Online-Edition: http://dx.doi.org/10.1007/s00161-016-0535-9],
[Article]

Horn, Benjamin M. and Luethen, H. and Pfetsch, M. E. and Ulbrich, S. (2017):
Geometry and topology optimization of sheet metal profiles by using a branch-and-bound framework.
In: Materialwissenschaft Und Werkstofftechnik, pp. 27-40, 48, (1), ISSN 0933-5137,
[Online-Edition: http://dx.doi.org/10.1002/mawe.201600762],
[Article]

Han, Haoxue and Merabia, Samy and Muller-Plathe, Florian (2017):
Thermal Transport at Solid-Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The journal of physical chemistry letters, pp. 1946-1951, [Online-Edition: http://dx.doi.org/10.1021/acs.jpclett.7b00227],
[Article]

Hieber, Matthias and Saito, Hirokazu (2017):
Strong solutions for two-phase free boundary problems for a class of non-Newtonian fluids.
In: Journal of Evolution Equations, pp. 335-358, 17, (1), ISSN 1424-3199,
[Online-Edition: http://dx.doi.org/10.1007/s00028-016-0351-5],
[Article]

Han, Haoxue and Mérabia, Samy and Müller-Plathe, Florian (2017):
Thermal Transport at Solid–Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The Journal of Physical Chemistry Letters, pp. 1946-1951, 8, (9), ISSN 1948-7185,
[Online-Edition: http://doi.org/10.1021/acs.jpclett.7b00227],
[Article]

Han, Haoxue and Schlawitschek, Christiane and Katyal, Naman and Stephan, Peter and Gambaryan-Roisman, Tatiana and Leroy, Frédéric and Müller-Plathe, Florian (2017):
Solid–Liquid Interface Thermal Resistance Affects the Evaporation Rate of Droplets from a Surface: A Study of Perfluorohexane on Chromium Using Molecular Dynamics and Continuum Theory.
In: Langmuir, ISSN 0743-7463,
[Online-Edition: http://doi.org/10.1021/acs.langmuir.7b01410],
[Article]

Han, Haoxue and Merabia, Samy and Müller-Plathe, Florian (2017):
Thermal transport at a solid–nanofluid interface: from increase of thermal resistance towards a shift of rapid boiling.
In: Nanoscale, pp. 8314-8320, 9, (24), ISSN 2040-3364,
[Online-Edition: https://doi.org/10.1039/c7nr01215b],
[Article]

Hansmann, Stefanie and Schmidts, Volker and Thiele, Christina M. (2017):
Synthesis of Poly-γ-S -2-methylbutyl-l -glutamate and Poly-γ-S -2-methylbutyl-d -glutamate and Their Use as Enantiodiscriminating Alignment Media in NMR Spectroscopy.
In: Chemistry - A European Journal, pp. 9114-9121, 23, (38), ISSN 09476539,
[Online-Edition: https://doi.org/10.1002/chem.201700699],
[Article]

Heid, Maurice and Knoche, Stefan and Gora, Niklas and Ohlig, Dominik and Drochner, Alfons and Etzold, Bastian J. M. and Vogel, Herbert (2017):
Dynamics of Bulk Oxygen in the Selective Oxidation of Acrolein.
In: ChemCatChem, pp. 2390-2398, 9, (12), ISSN 18673880,
[Online-Edition: https://doi.org/10.1002/cctc.201700124],
[Article]

He, Chao and Leudesdorff, Wibke and di Mare, Francesca and Sadiki, Amsini and Janicka, J. (2017):
Analysis of In-cylinder Flow Field Anisotropy in IC Engine using Large Eddy Simulation.
In: Flow, Turbulence and Combustion, pp. 353-383, 99, (2), ISSN 1386-6184,
[Online-Edition: https://doi.org/10.1007/s10494-017-9812-3],
[Article]

Honza, Rene and Ding, Carl-Philipp and Dreizler, Andreas and Böhm, Benjamin (2017):
Flame imaging using planar laser induced fluorescence of sulfur dioxide.
In: Applied Physics B, 123, (9), ISSN 0946-2171,
DOI: 10.1007/s00340-017-6823-7,
[Online-Edition: https://doi.org/10.1007/s00340-017-6823-7],
[Article]

Holl, Mario and Rausch, Lea and Pelz, P. F. (2017):
New methods for new systems – How to find the techno-economically optimal hydrogen conversion system.
In: International Journal of Hydrogen Energy, pp. 22641-22654, 42, (36), ISSN 03603199,
DOI: 10.1016/j.ijhydene.2017.07.061,
[Online-Edition: https://doi.org/10.1016/j.ijhydene.2017.07.061],
[Article]

Hieber, Matthias and Prüss, Jan (2017):
Dynamics of the Ericksen–Leslie equations with general Leslie stress I: the incompressible isotropic case.
In: Mathematische Annalen, pp. 977-996, 369, (3-4), ISSN 0025-5831,
DOI: 10.1007/s00208-016-1453-7,
[Online-Edition: https://doi.org/10.1007/s00208-016-1453-7],
[Article]

Hilz, Jochen and Helbig, Martin and Haaf, Martin and Daikeler, Alexander and Ströhle, Jochen and Epple, Bernd (2017):
Long-term pilot testing of the carbonate looping process in 1 MWth scale.
In: Fuel, pp. 892-899, 210, ISSN 00162361,
DOI: 10.1016/j.fuel.2017.08.105,
[Online-Edition: https://doi.org/10.1016/j.fuel.2017.08.105],
[Article]

He, Chao and Kuenne, Guido and Yildar, Esra and van Oijen, Jeroen and di Mare, Francesca and Sadiki, Amsini and Ding, Carl-Philipp and Baum, Elias and Peterson, Brian and Böhm, Benjamin and Janicka, J. (2017):
Evaluation of the flame propagation within an SI engine using flame imaging and LES.
In: Combustion Theory and Modelling, pp. 1080-1113, 21, (6), ISSN 1364-7830,
DOI: 10.1080/13647830.2017.1343498,
[Online-Edition: https://doi.org/10.1080/13647830.2017.1343498],
[Article]

Hietzschold, Sebastian and Hillebrandt, Sabina and Ullrich, Florian and Bombsch, Jakob and Rohnacher, Valentina and Ma, Shuangying and Liu, Wenlan and Köhn, Andreas and Jaegermann, Wolfram and Pucci, Annemarie and Kowalsky, Wolfgang and Mankel, Eric and Beck, Sebastian and Lovrincic, Robert (2017):
Functionalized Nickel Oxide Hole Contact Layers: Work Function versus Conductivity.
In: ACS Applied Materials & Interfaces, pp. 39821-39829, 9, (45), ISSN 1944-8244,
DOI: 10.1021/acsami.7b12784,
[Online-Edition: https://doi.org/10.1021/acsami.7b12784],
[Article]

Hosseinzadeh, Arash and Sadiki, Amsini and di Mare, Francesca and Janicka, J. (2017):
Effects of subgrid scale and combustion modelling on flame structure of a turbulent premixed flame within LES and tabulated chemistry framework.
In: Combustion Theory and Modelling, pp. 838-863, 21, (5), ISSN 1364-7830,
DOI: 10.1080/13647830.2017.1305514,
[Online-Edition: https://doi.org/10.1080/13647830.2017.1305514],
[Article]

Han, Haoya and Li, Li and Tian, Yuchuan and Wang, Yunwei and Ye, Zhishuang and Yang, Qingsong and Wang, Yiming and von Klitzing, Regine and Guo, Xuhong (2017):
Spherical polyelectrolyte nanogels as templates to prepare hollow silica nanocarriers: observation by small angle X-ray scattering and TEM.
In: RSC Adv., pp. 47877-47885, 7, (76), ISSN 2046-2069,
DOI: 10.1039/C7RA10011F,
[Online-Edition: https://doi.org/10.1039/C7RA10011F],
[Article]

Han, Haoya and Li, Li and Wang, Weihua and Tian, Yuchuan and Wang, Yunwei and Wang, Junyou and von Klitzing, Regine and Guo, Xuhong (2017):
Core–Shell–Corona Silica Hybrid Nanoparticles Templated by Spherical Polyelectrolyte Brushes: A Study by Small Angle X-ray Scattering.
In: Langmuir, pp. 9857-9865, 33, (38), ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.7b02239,
[Online-Edition: https://doi.org/10.1021/acs.langmuir.7b02239],
[Article]

Huang, Shilin and Gawlitza, Kornelia and von Klitzing, Regine and Steffen, Werner and Auernhammer, Günter K. (2017):
Structure and Rheology of Microgel Monolayers at the Water/Oil Interface.
In: Macromolecules, pp. 3680-3689, 50, (9), ISSN 0024-9297,
DOI: 10.1021/acs.macromol.6b02779,
[Online-Edition: https://doi.org/10.1021/acs.macromol.6b02779],
[Article]

Herdel, Philipp and Krause, David and Peters, Jens and Kolmorgen, Brigga and Ströhle, Jochen and Epple, Bernd (2017):
Experimental investigations in a demonstration plant for fluidized bed gasification of multiple feedstock’s in 0.5 MWth scale.
In: Fuel, pp. 286-296, 205, ISSN 00162361,
[Online-Edition: https://doi.org/10.1016/j.fuel.2017.05.058],
[Article]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW), Vienna, Austria, [Conference or Workshop Item]

Hauck, Markus and Savvides, Savvas and Eugster, Patrick and Mezini, Mira and Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala, ACM, [Conference or Workshop Item]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference or Workshop Item]

Hardt, Steffen (2016):
Free-molecule heat transfer in a conservative force field between parallel surfaces.
In: Physical Review E, pp. 052139, 93, (5), ISSN 1063-651X,
[Online-Edition: http://dx.doi.org/10.1103/PhysRevE.93.052139],
[Article]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Hieber, Matthias and Nesensohn, Manuel and Pruess, Jan and Schade, Katharina (2016):
Dynamics of nematic liquid crystal flows: The quasilinear approach.
In: Annales De L Institut Henri Poincare-Analyse Non Lineaire, pp. 397-408, 33, (2), ISSN 0294-1449,
[Online-Edition: http://dx.doi.org/10.1016/j.anihpc.2014.11.001],
[Article]

Hosseinzadeh, A. and Sadiki, A. and Janicka, J. (2016):
Assessment of the Dynamic SGS Wrinkling Combustion Modeling Using the Thickened Flame Approach Coupled with FGM Tabulated Detailed Chemistry.
In: Flow Turbulence and Combustion, pp. 939-964, 96, (4), ISSN 1386-6184,
[Online-Edition: http://dx.doi.org/10.1007/s10494-016-9715-8],
[Article]

Hidouri, A. and Yahya, N. and Boushaki, T. and Sadiki, A. and Sautet, J. C. (2016):
Numerical and experimental investigation of turbulent three separated jets.
In: Applied Thermal Engineering, pp. 153-161, 104, ISSN 1359-4311,
[Online-Edition: http://dx.doi.org/10.1016/j.applthermaleng.2016.05.021],
[Article]

Hieber, Matthias and Hussein, Amru and Kashiwabara, Takahito (2016):
Global strong L-P well-posedness of the 3D primitive equations with heat and salinity diffusion.
In: Journal of Differential Equations, pp. 6950-6981, 261, (12), ISSN 0022-0396,
[Online-Edition: http://dx.doi.org/10.1016/j.jde.2016.09.010],
[Article]

Huang, Weizhang and Kamenski, Lennard and Lang, Jens (2016):
STABILITY OF EXPLICIT ONE-STEP METHODS FOR P1-FINITE ELEMENT APPROXIMATION OF LINEAR DIFFUSION EQUATIONS ON ANISOTROPIC MESHES.
In: Siam Journal on Numerical Analysis, pp. 1612-1634, 54, (3), ISSN 0036-1429,
[Online-Edition: http://dx.doi.org/10.1137/130949531],
[Article]

Hutter, Kolumban and Wang, Yongqi (2016):
Fluid and Thermodynamics. Volume 1: Basic Fluid Mechanics.
Berlin-Heidelberg-New York, Springer Verlag, In: Advances in Geophysical and Environmental Mechanics and Mathematics, ISBN 978-3319336329,
[Online-Edition: http://www.springer.com/book/9783319336329],
[Book]

Hutter, Kolumban and Wang, Yongqi (2016):
Fluid and Thermodynamics. Volume 2: Advanced Fluid Mechanics and Thermodynamic Fundamentals.
Berlin-Heidelberg-NewYork, Springer Verlag, In: Advances in Geophysical and Environmental Mechanics and Mathematics, ISBN 978-3-319-33635-0,
[Online-Edition: http://www.springer.com/book/9783319336350],
[Book]

Holl, M. and Pelz, P. F. (2016):
Multi-pole system analysis (MPSA) - A systematic method towards techno-economic optimal system design.
In: Applied Energy, pp. 937-949, 169, ISSN 0306-2619,
[Online-Edition: http://dx.doi.org/10.1016/j.apenergy.2016.02.076],
[Article]

Hajian, Ramin and Hardt, Steffen (2015):
Formation and lateral migration of nanodroplets via solvent shifting in a microfluidic device.
In: Microfluidics and Nanofluidics, pp. 1281-1296, 19, (6), ISSN 1613-4982,
[Online-Edition: http://dx.doi.org/10.1007/s10404-015-1644-7],
[Article]

Huang, Jialin and Vaudenay, Serge and Lai, Xuejia and Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference or Workshop Item]

Horsch, Moritz and Hülsing, Andreas and Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Volk, Florian and Hauke, Sascha and Mühlhäuser, Max
Ko, Ryan and Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, Amsterdam Heidelberg, Elsevier Syngress, pp. 463-493, DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Hasan, T. and Kikiras, Panayotis and Leonardi, Alessandro and Ziekow, Holger and Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, pp. 80-84, (19), [Article]

Hieber, Matthias and Murata, Miho (2015):
THE L-P-APPROACH TO THE FLUID-RIGID BODY INTERACTION PROBLEM FOR COMPRESSIBLE FLUIDS.
In: Evolution Equations and Control Theory, pp. 69-87, 4, (1), ISSN 2163-2480,
[Article]

Hajari, Timir and van der Vegt, Nico F. A. (2015):
Publisher's Note: "Solvation thermodynamics of amino acid side chains on a short peptide backbone" J. Chem. Phys. 142, 144502 (2015).
In: The Journal of chemical physics, p. 169901, 142, (16), [Article]

Hajari, Timir and van der Vegt, Nico F. A. (2015):
Solvation thermodynamics of amino acid side chains on a short peptide backbone.
In: Journal of Chemical Physics, 142, (14), ISSN 0021-9606,
[Article]

Hartmann, S. and Friedrich, F. and Molitor, A. and Reichert, M. and Elsaesser, W. and Walser, R. (2015):
Tailored quantum statistics from broadband states of light.
In: New Journal of Physics, 17, ISSN 1367-2630,
[Article]

Hosseinzadeh, A. and Schmitt, T. and Sadiki, A. and Janicka, J. (2015):
Application of the Dynamic F-TACLES Combustion Model to a Lean Premixed Turbulent Flame.
In: Flow Turbulence and Combustion, pp. 481-500, 95, (2-3), ISSN 1386-6184,
[Online-Edition: http://dx.doi.org/10.1007/s10494-015-9628-y],
[Article]

Hauk, T. and Bonaccurso, E. and Roisman, I. V. and Tropea, C. (2015):
Ice crystal impact onto a dry solid wall. Particle fragmentation.
In: Proceedings of the Royal Society a-Mathematical Physical and Engineering Sciences, 471, (2181), ISSN 1364-5021,
[Online-Edition: http://dx.doi.org/10.1098/rspa.2015.0399],
[Article]

Hau, Jan-Niklas and Chagelishvili, George and Khujadze, George and Oberlack, Martin and Tevzadze, Alexander (2015):
A comparative numerical analysis of linear and nonlinear aerodynamic sound generation by vortex disturbances in homentropic constant shear flows.
In: Physics of Fluids, p. 126101, 27, (12), ISSN 1070-6631,
[Online-Edition: http://dx.doi.org/10.1063/1.4936137],
[Article]

Hartmann, Sebastien and Molitor, Andreas and Elsaesser, Wolfgang (2015):
Ultrabroadband ghost imaging exploiting optoelectronic amplified spontaneous emission and two-photon detection.
In: Optics Letters, pp. 5770-5773, 40, (24), ISSN 0146-9592,
[Online-Edition: http://dx.doi.org/10.1364/ol.40.005770],
[Article]

Herzberg, Amir and Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, In: ACSAC, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC), ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Horsch, Moritz and Tuengerthal, Max and Wich, Tobias (2014):
SAML Privacy-Enhancing Profile.
In: Open Identity Summit 2014, GI, Stuttgart, Germany, In: LNI, P-237, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Ries, Sebastian and Varikkattu, Prabhu and Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, pp. 2185-2200, 7, (11), DOI: 10.1002/sec.748,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.748],
[Article]

Herzberg, Amir and Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014, Berlin, Germany, [Conference or Workshop Item]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Horsch, Moritz and Derler, David and Rath, Christof and Haase, Hans-Martin and Wich, Tobias (2014):
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, pp. 237-241, 38, (4), DOI: 10.1007/s11623-014-0098-5,
[Article]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158, [Article]

Herzberg, Amir and Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: 2013 International Conference on Availability, Reliability and Security, IEEE Computer Society, Regensburg, Germany, In: ARES 2013, DOI: 10.1109/ARES.2013.138,
[Conference or Workshop Item]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Hülsing, Andreas and Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz and Hühnlein, Detlef and Breitenstrom, Christian and Wieland, Thomas and Wiesmaier, Alexander and Biallowons, Benedikt and Petrautzki, Dirk and Potzernheim, Simon and Schmölz, Johannes and Wesner, Alexander and Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013, Springer, pp. 194-208, [Book Section]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013, Cairo, Egypt, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
In: Proceedings of 28th ACM SAC 2013, New York, NY, USA, ACM, pp. 1963-1965, DOI: 10.1145/2480362.2480727,
[Online-Edition: http://doi.acm.org/10.1145/2480362.2480727],
[Book Section]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Hülsing, Andreas and Busold, Christoph and Buchmann, Johannes
Knudsen, Lars and Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: SAC2012 - Conference on Selected Areas in Cryptography, Springer Berlin Heidelberg, Windsor, Canada, In: LNCS, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Henß, Stefan and Monperrus, Martin and Mezini, Mira (2012):
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
In: Proceedings of the 34th International Conference on Software Engineering, IEEE Press, Zurich, Switzerland, In: ICSE '12, ISBN 978-1-4673-1067-3,
[Conference or Workshop Item]

Heinrichs, Felix and Schreiber, Daniel and Huber, Jochen and Mühlhäuser, Max (2012):
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI '12: Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, ACM, In: CHI'12, ISBN 978-1-4503-1015-4,
DOI: 10.1145/2208276.2208328,
[Conference or Workshop Item]

Hauke, Sascha and Volk, Florian and Habib, Sheikh Mahbub and Mühlhäuser, Max
Dimitrakos, Theo and Moona, Rajat and Patel, Dhiren and McKnight, D. Harrison (eds.) (2012):
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models.
In: Proceedings of the 6th International Conference on Trust Management (IFIPTM 2012), Berlin, Heidelberg, Springer, pp. 158-173, [Book Section]

Huber, Jochen and Steimle, Jürgen and Liao, Chunyuan and Liu, Qiong and Mühlhäuser, Max (2012):
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223828,
[Conference or Workshop Item]

Hülsing, Andreas and Petzoldt, Albrecht and Schneider, Michael and Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012, Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Hühnlein, Detlef and Petrautzki, Dirk and Schmölz, Johannes and Wich, Tobias and Horsch, Moritz and Wieland, Thomas and Eichholz, Jan and Wiesmaier, Alexander and Braun, Johannes and Feldmann, Florian and Potzernheim, Simon and Schwenk, Jörg and Kahlo, Christian and Kühne, Andreas and Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit, Darmstadt, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander and Schaaf, Joachim and Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September, [Conference or Workshop Item]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
TU Darmstadt, [Master Thesis]

Habib, Sheikh Mahbub and Ries, Sebastian and Mühlhäuser, Max (2011):
Towards a Trust Management System for Cloud Computing.
In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, ISSN 2324-898X,
DOI: 10.1109/TrustCom.2011.129,
[Conference or Workshop Item]

I

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
In: 23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
In: IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Ilie, Ioana M. and Nayar, Divya and den Otter, Wouter K. and van der Vegt, Nico F. A. and Briels, Wim J. (2018):
Intrinsic Conformational Preferences and Interactions in α-Synuclein Fibrils: Insights from Molecular Dynamics Simulations.
In: Journal of Chemical Theory and Computation, pp. 3298-3310, 14, (6), ISSN 1549-9618,
DOI: 10.1021/acs.jctc.8b00183,
[Online-Edition: https://doi.org/10.1021/acs.jctc.8b00183],
[Article]

Ilgen, Julian and Kaltschnee, Lukas and Thiele, Christina M. (2018):
perfect BASH: Band-selective homonuclear decoupling in peptides and peptidomimetics.
In: Magnetic Resonance in Chemistry, pp. 918-933, 56, (10), ISSN 07491581,
DOI: 10.1002/mrc.4757,
[Online-Edition: https://doi.org/10.1002/mrc.4757],
[Article]

Ide, Tobias and Sumer, Vakur and Aldehoff, Larissa
Ojendal, Joakim and Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
New York, NY, USA, ACM, In: Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, In: MobiSys PhD Forum '18, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Online-Edition: http://doi.acm.org/10.1145/3212711.3212712],
[Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, [Conference or Workshop Item]

Iapichino, L. and Ulbrich, S. and Volkwein, S. (2017):
Multiobjective PDE-constrained optimization using the reduced-basis method.
In: Advances in Computational Mathematics, Springer, pp. 945-972, 43, (5), ISSN 1019-7168,
DOI: 10.1007/s10444-016-9512-x,
[Online-Edition: https://doi.org/10.1007/s10444-016-9512-x],
[Article]

Izdebska-Podsiadły, Joanna and Dörsam, Edgar (2017):
Effects of argon low temperature plasma on PLA film surface and aging behaviors.
In: Vacuum, pp. 278-284, 145, ISSN 0042207X,
DOI: 10.1016/j.vacuum.2017.09.001,
[Online-Edition: https://doi.org/10.1016/j.vacuum.2017.09.001],
[Article]

Ilgen, Julian and Kaltschnee, Lukas and Thiele, Christina M. (2017):
A pure shift experiment with increased sensitivity and superior performance for strongly coupled systems.
In: Journal of Magnetic Resonance, ISSN 10907807,
DOI: 10.1016/j.jmr.2017.11.001,
[Online-Edition: https://doi.org/10.1016/j.jmr.2017.11.001],
[Article]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt, [Master Thesis]

J

Jesch, David and Bevrnja, Alija and di Mare, Francesca and Janicka, Johannes and Sadiki, Amsini (2019):
Large eddy simulation of a turbulent flame using tabulated chemistry with a novel multivariate PDF.
In: International Journal of Computational Fluid Dynamics, pp. 1-21, ISSN 1061-8562,
DOI: 10.1080/10618562.2019.1640359,
[Online-Edition: https://doi.org/10.1080/10618562.2019.1640359],
[Article]

Järvinen, Kimmo and Leppäkoski, Helena and Lohan, Elena Simona and Richter, Philipp and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), [Online-Edition: https://encrypto.de/papers/JLLRSTY19.pdf],
[Conference or Workshop Item]

Ji, Yining and DiRocco, Daniel A. and Kind, Jonas and Thiele, Christina M. and Gschwind, Ruth M. and Reibarkh, Mikhail (2019):
LED‐Illuminated NMR Spectroscopy: A Practical Tool for Mechanistic Studies of Photochemical Reactions.
In: ChemPhotoChem, ISSN 2367-0932,
DOI: 10.1002/cptc.201900109,
[Online-Edition: https://doi.org/10.1002/cptc.201900109],
[Article]

Johchi, Ayane and Pareja, Jhon and Böhm, Benjamin and Dreizler, Andreas (2019):
Quantitative mixture fraction imaging of a synthetic biogas turbulent jet propagating into a NO-vitiated air co-flow using planar laser-induced fluorescence (PLIF).
In: Experiments in Fluids, 60, (5), ISSN 0723-4864,
DOI: 10.1007/s00348-019-2723-4,
[Online-Edition: https://doi.org/10.1007/s00348-019-2723-4],
[Article]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Online-Edition: https://encrypto.de/papers/JKSTY18.pdf],
[Conference or Workshop Item]

Jainski, Christopher and Rißmann, Martin and Jakirlić, Suad and Böhm, Benjamin and Dreizler, Andreas (2018):
Quenching of Premixed Flames at Cold Walls: Effects on the Local Flow Field.
In: Flow, Turbulence and Combustion, pp. 177-196, 100, (1), ISSN 1386-6184,
DOI: 10.1007/s10494-017-9836-8,
[Online-Edition: https://doi.org/10.1007/s10494-017-9836-8],
[Article]

Jeziorowski, Sharon and Thiele, Christina M. (2018):
Poly-γ-p -Biphenylmethyl-Glutamate as Enantiodifferentiating Alignment Medium for NMR Spectroscopy with Temperature-Tunable Properties.
In: Chemistry - A European Journal, pp. 15631-15637, 24, (58), ISSN 09476539,
DOI: 10.1002/chem.201802921,
[Online-Edition: https://doi.org/10.1002/chem.201802921],
[Article]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt, [Master Thesis]

Jainski, Christopher and Rissmann, Martin and Boehm, Benjamin and Dreizler, Andreas (2017):
Experimental investigation of flame surface density and mean reaction rate during flame-wall interaction.
In: Proceedings of the Combustion Institute, pp. 1827-1834, 36, (2), ISSN 1540-7489,
[Online-Edition: http://dx.doi.org/10.1016/j.proci.2016.07.113],
[Article]

Jainski, Christopher and Rißmann, Martin and Böhm, Benjamin and Janicka, J. and Dreizler, Andreas (2017):
Sidewall quenching of atmospheric laminar premixed flames studied by laser-based diagnostics.
In: Combustion and Flame, pp. 271-282, 183, ISSN 00102180,
[Online-Edition: https://doi.org/10.1016/j.combustflame.2017.05.020],
[Article]

Jiang, Hao and Müller-Plathe, Florian and Panagiotopoulos, Athanassios Z. (2017):
Contact angles from Young’s equation in molecular dynamics simulations.
In: The Journal of Chemical Physics, pp. 084708, 147, (8), ISSN 0021-9606,
DOI: 10.1063/1.4994088,
[Online-Edition: https://doi.org/10.1063/1.4994088],
[Article]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
TU Darmstadt, [Master Thesis]

Jattke, Patrick and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Junk, Markus and Reitz, Michael and Ströhle, Jochen and Epple, Bernd (2016):
Technical and Economical Assessment of the Indirectly Heated Carbonate Looping Process.
In: Journal of Energy Resources Technology-Transactions of the Asme, 138, (4), ISSN 0195-0738,
[Online-Edition: http://dx.doi.org/10.1115/1.4033142],
[Article]

Janassek, Patrick and Hartmann, Sebastien and Molitor, Andreas and Michel, Florian and Elsaesser, Wolfgang (2016):
Investigations of the polarization behavior of quantum cascade lasers by Stokes parameters.
In: Optics Letters, pp. 305-308, 41, (2), ISSN 0146-9592,
[Online-Edition: http://dx.doi.org/10.1364/ol.41.000305],
[Article]

Jumpertz, L. and Michel, F. and Pawlus, R. and Elsaesser, W. and Schires, K. and Carras, M. and Grillot, F. (2016):
Measurements of the linewidth enhancement factor of mid-infrared quantum cascade lasers by different optical feedback techniques.
In: Aip Advances, 6, (1), ISSN 2158-3226,
[Online-Edition: http://dx.doi.org/10.1063/1.4940767],
[Article]

Jakirlic, S. and Maduta, R. (2016):
"Steady" RANS Modeling for Improved Prediction of Wall-Bounded Separation.
In: Aiaa Journal, pp. 1802-1808, 54, (5), ISSN 0001-1452,
[Online-Edition: http://dx.doi.org/10.2514/1.j054399],
[Article]

Janko, Marek and Jocher, Michael and Boehm, Alexander and Babel, Laura and Bump, Steven and Biesalski, Markus and Meckel, Tobias and Stark, Robert W. (2015):
Cross-Linking Cellulosic Fibers with Photoreactive Polymers: Visualization with Confocal Raman and Fluorescence Microscopy.
In: Biomacromolecules, American Chemical Society, pp. 2179-87, 16, (7), ISSN 1525-7797,
[Online-Edition: http://dx.doi.org/10.1021/acs.biomac.5b00565],
[Article]

Jakirlić, Suad and Maduta, R. (2015):
Extending the bounds of 'steady' RANS closures: Toward an instability-sensitive Reynolds stress model.
In: International Journal of Heat and Fluid Flow, pp. 175-194, 51, ISSN 0142-727X,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatfluidflow.2014.09.003],
[Article]

Janocha, Daniel D. and Waclawczyk, Marta and Oberlack, Martin (2015):
Lie Symmetry Analysis of the Hopf Functional-Differential Equation.
In: Symmetry, pp. 1536-1566, 7, (3), ISSN 2073-8994,
[Online-Edition: http://www.mdpi.com/2073-8994/7/3/1536],
[Article]

Juretzka, Carsten and Simos, Hercules and Bogris, Adonis and Syvridis, Dimitris and Elsaesser, Wolfgang and Carras, Mathieu (2015):
Intensity Noise Properties of Midinfrared Injection Locked Quantum Cascade Lasers: II. Experiments.
In: Ieee Journal of Quantum Electronics, 51, (1), ISSN 0018-9197,
[Article]

Jayalath, Chamikara and Stephen, Julian James and Eugster, Patrick (2013):
Atmosphere: A Universal Cross-Cloud Communication Infrastructure.
In: Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Beijing, China. December 2013. Proceedings., Springer, Beijing, China, In: Lecture Notes in Computer Science, ISBN 978-3-642-45064-8,
DOI: 10.1007/978-3-642-45065-5_9,
[Conference or Workshop Item]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Jiang, Xuxian and Grace, Michael and Sadeghi, Ahmad-Reza and Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec, ACM, [Conference or Workshop Item]

K

Kind, J. and Thiele, C. M. (2019):
MRI and localised NMR spectroscopy of sessile droplets on hydrophilic, hydrophobic and superhydrophobic surfaces – Examination of the chemical composition during evaporation.
In: Journal of Magnetic Resonance, p. 106579, 307, ISSN 10907807,
DOI: 10.1016/j.jmr.2019.106579,
[Online-Edition: https://doi.org/10.1016/j.jmr.2019.106579],
[Article]

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, 2, [Online-Edition: https://encrypto.de/papers/KNLAS19.pdf],
[Article]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19), SciTePress, [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
In: 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/],
[Conference or Workshop Item]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8998],
[Ph.D. Thesis]

Kohnhäuser, Florian and Püllen, Dominik and Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
In: IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Online-Edition: https://www.ieee-security.org/TC/SPW2019/SafeThings/],
[Conference or Workshop Item]

Krämer, Juliane and Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
In: COSADE 2019, Springer, Darmstadt, [Online-Edition: https://www.cosade.org/index.html],
[Conference or Workshop Item]

Köser, Jan and Li, Tao and Vorobiev, Nikita and Dreizler, Andreas and Schiemann, Martin and Böhm, Benjamin (2019):
Multi-parameter diagnostics for high-resolution in-situ measurements of single coal particle combustion.
In: Proceedings of the Combustion Institute, pp. 2893-2900, 37, (3), ISSN 15407489,
DOI: 10.1016/j.proci.2018.05.116,
[Online-Edition: https://doi.org/10.1016/j.proci.2018.05.116],
[Article]

Knappstein, R. and Kuenne, G. and Nicolai, H. and di Mare, F. and Sadiki, A. and Janicka, J. (2019):
Description of the char conversion process in coal combustion based on premixed FGM chemistry.
In: Fuel, pp. 124-134, 236, ISSN 00162361,
DOI: 10.1016/j.fuel.2018.08.158,
[Online-Edition: https://doi.org/10.1016/j.fuel.2018.08.158],
[Article]

Kaufhold, Marc-André and Reuter, Christian
Reuter, Christian (ed.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Kumar, Abhijeet and Trambitas, Alexandra and Peggau, Jörg and Dahl, Verena and Venzmer, Joachim and Gambaryan-Roisman, Tatiana and Kleinen, Jochen (2019):
Charge and size matters — How to formulate organomodified silicones for textile applications.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, pp. 180 - 188, 560, ISSN 0927-7757,
DOI: 10.1016/j.colsurfa.2018.09.080,
[Online-Edition: https://doi.org/10.1016/j.colsurfa.2018.09.080],
[Article]

Kez, Vitali and Consalvi, Jean-Louis and Liu, Fengshan and Gronarz, Tim and Ströhle, Jochen and Kneer, Reinhold and Epple, Bernd (2019):
Investigation of gas and particle radiation modelling in wet oxy-coal combustion atmospheres.
In: International Journal of Heat and Mass Transfer, pp. 1026-1040, 133, ISSN 00179310,
DOI: 10.1016/j.ijheatmasstransfer.2019.01.013,
[Online-Edition: https://doi.org/10.1016/j.ijheatmasstransfer.2019.01.013],
[Article]

Kyrey, Tetyana and Witte, Judith and Pipich, Vitaliy and Feoktystov, Artem and Koutsioubas, Alexandros and Vezhlev, Egor and Frielinghaus, Henrich and von Klitzing, Regine and Wellert, Stefan and Holderer, Olaf (2019):
Influence of the cross-linker content on adsorbed functionalised microgel coatings.
In: Polymer, pp. 29-35, 169, ISSN 00323861,
DOI: 10.1016/j.polymer.2019.02.037,
[Online-Edition: https://doi.org/10.1016/j.polymer.2019.02.037],
[Article]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38, [Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian (2019):
Resilience in Security and Crises through Adaptions and Transitions.
Kassel, Germany, Gesellschaft für Informatik e. V., In: Informatik 2019, Lecture Notes in Informatics (LNI), Kassel, Germany, 23.-26. September, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian
Reuter, Christian (ed.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, pp. 1-11, [Online-Edition: https://arxiv.org/pdf/1907.07725.pdf],
[Article]

Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReutereta...],
[Conference or Workshop Item]

Kresse, B. and Höfler, M.V. and Privalov, A.F. and Vogel, Michael (2019):
One dimensional magnetic resonance microscopy with micrometer resolution in static field gradients.
In: Journal of Magnetic Resonance, p. 106566, 307, ISSN 10907807,
DOI: 10.1016/j.jmr.2019.106566,
[Online-Edition: https://doi.org/10.1016/j.jmr.2019.106566],
[Article]

Koch, Christian (2018):
Proactive Mechanisms for Video-on-Demand Content Delivery.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8212],
[Ph.D. Thesis]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Conference or Workshop Item]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Master Thesis]

Koşak Söz, Çağla and Trosien, Simon and Biesalski, Markus (2018):
Superhydrophobic Hybrid Paper Sheets with Janus-Type Wettability.
In: ACS Applied Materials & Interfaces, pp. 37478-37488, 10, (43), ISSN 1944-8244,
DOI: 10.1021/acsami.8b12116,
[Online-Edition: https://doi.org/10.1021/acsami.8b12116],
[Article]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Kumar, Manish and Anagnostopoulos, Nikolaos Athanasios and Fan, Yufan and Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: 28th Crypto-Day, In: GI, [Conference or Workshop Item]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Master Thesis]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session, [Online-Edition: https://encrypto.de/papers/KSS18.pdf],
[Other]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Master Thesis]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544],
[Conference or Workshop Item]

Kannwischer, Matthias and Genêt, Aymeric and Butin, Denis and Krämer, Juliane and Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE2018, Singapore, In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design, In: LNCS, 10815, [Conference or Workshop Item]

Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Schloss Dagstuhl-Leibniz-Zentrum für Informatik, In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Online-Edition: https://2018.ecoop.org/],
[Conference or Workshop Item]

Kolvenbach, Philip and Lass, Oliver and Ulbrich, Stefan (2018):
An approach for robust PDE-constrained optimization with application to shape optimization of electrical engines and of dynamic elastic structures under uncertainty.
In: Optimization and Engineering, Springer US, pp. 697-731, 19, (3), ISSN 1389-4420,
DOI: 10.1007/s11081-018-9388-3,
[Online-Edition: https://link.springer.com/article/10.1007/s11081-018-9388-3?...],
[Article]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Master Thesis]

Kumar, Abhijeet and Kleinen, Jochen and Gambaryan-Roisman, Tatiana and Venzmer, Joachim (2018):
Electrokinetic investigation of deposition of cationic fabric softener vesicles on anionic porous cotton fabrics.
In: Journal of Colloid and Interface Science, pp. 132-145, 514, ISSN 0021-9797,
DOI: 10.1016/j.jcis.2017.11.062,
[Online-Edition: https://doi.org/10.1016/j.jcis.2017.11.062],
[Article]

Kashiwaya, Shun and Aymonier, Cyril and Majimel, Jérôme and Olivier, Céline and Klein, Andreas and Jaegermann, Wolfram and Toupance, Thierry (2018):
Supercritical CO2-assisted deposition of NiO on (101)-anatase-TiO2 for efficient facet engineered photocatalysts.
In: New Journal of Chemistry, pp. 18649-18658, 42, (23), ISSN 1144-0546,
DOI: 10.1039/c8nj04292f,
[Online-Edition: https://doi.org/10.1039/c8nj04292f],
[Article]

Kraheberger, S. and Hoyas, S. and Oberlack, M. (2018):
DNS of a turbulent Couette flow at constant wall transpiration up to.
In: Journal of Fluid Mechanics, pp. 421-443, 835, ISSN 0022-1120,
DOI: 10.1017/jfm.2017.757,
[Online-Edition: https://doi.org/10.1017/jfm.2017.757],
[Article]

Kuhnhenn, Maximilian and Joensen, Tórstein V. and Reck, Mads and Roisman, Ilia V. and Tropea, Cameron (2018):
Study of the internal flow in a rotary atomizer and its influence on the properties of the resulting spray.
In: International Journal of Multiphase Flow, pp. 30-40, 100, ISSN 03019322,
DOI: 10.1016/j.ijmultiphaseflow.2017.11.019,
[Online-Edition: https://doi.org/10.1016/j.ijmultiphaseflow.2017.11.019],
[Article]

Kyrey, Tetyana and Ganeva, Marina and Gawlitza, Kornelia and Witte, Judith and von Klitzing, Regine and Soltwedel, Olaf and Di, Zhenyu and Wellert, Stefan and Holderer, Olaf (2018):
Grazing incidence SANS and reflectometry combined with simulation of adsorbed microgel particles.
In: Physica B: Condensed Matter, pp. 172-178, 551, ISSN 09214526,
DOI: 10.1016/j.physb.2018.03.049,
[Online-Edition: https://doi.org/10.1016/j.physb.2018.03.049],
[Article]

Kittel, Hannah M. and Alam, Ehsanul and Roisman, Ilia V. and Tropea, Cameron and Gambaryan-Roisman, Tatiana (2018):
Splashing of a Newtonian drop impacted onto a solid substrate coated by a thin soft layer.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, pp. 89-96, 553, ISSN 0927-7757,
DOI: 10.1016/j.colsurfa.2018.04.060,
[Online-Edition: https://doi.org/10.1016/j.colsurfa.2018.04.060],
[Article]

Kosaka, Hidemasa and Zentgraf, Florian and Scholtissek, Arne and Bischoff, Lothar and Häber, Thomas and Suntz, Rainer and Albert, Barbara and Hasse, Christian and Dreizler, Andreas (2018):
Wall heat fluxes and CO formation/oxidation during laminar and turbulent side-wall quenching of methane and DME flames.
In: International Journal of Heat and Fluid Flow, pp. 181-192, 70, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.01.009,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.01.009],
[Article]

Kunimoto, Masahiro and Bothe, Dieter and Tamura, Risa and Oyanagi, Takahiro and Fukunaka, Yasuhiro and Nakai, Hiromi and Homma, Takayuki (2018):
Spectroscopic and Computational Analyses of Liquid–Liquid Interfacial Reaction Mechanism of Boric Acid Esterification with 2,2,4-Trimethyl-1,3-pentanediol in Boron Extraction Processes.
In: The Journal of Physical Chemistry C, pp. 10423-10429, 122, (19), ISSN 1932-7447,
DOI: 10.1021/acs.jpcc.8b01086,
[Online-Edition: https://doi.org/10.1021/acs.jpcc.8b01086],
[Article]

Krumbein, B. and Termini, V. and Jakirlić, S. and Tropea, C. (2018):
Flow and heat transfer in cross-stream type T-junctions: A computational study.
In: International Journal of Heat and Fluid Flow, pp. 179-188, 71, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.03.013,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2018.03.013],
[Article]

Kittel, Hannah M. and Roisman, Ilia V. and Tropea, Cameron (2018):
Splash of a drop impacting onto a solid substrate wetted by a thin film of another liquid.
In: Physical Review Fluids, 3, (7), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.073601,
[Online-Edition: https://doi.org/10.1103/PhysRevFluids.3.073601],
[Article]

Kübelbeck, Sonja and Mikhael, Jules and Keller, Harald and Konradi, Rupert and Andrieu-Brunsen, Annette and Baier, Grit (2018):
Enzyme-Polymer Conjugates to Enhance Enzyme Shelf Life in a Liquid Detergent Formulation.
In: Macromolecular Bioscience, p. 1800095, 18, (7), ISSN 16165187,
DOI: 10.1002/mabi.201800095,
[Online-Edition: https://doi.org/10.1002/mabi.201800095],
[Article]

Kuhnhenn, Maximilian and Luh, Max F. and Joensen, Tórstein V. and Reck, Mads and Roisman, Ilia V. and Tropea, Cameron (2018):
Modelling of the breakup process of viscous fluids by a high-speed rotary atomizer.
In: Experiments in Fluids, 59, (7), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2573-5,
[Online-Edition: https://doi.org/10.1007/s00348-018-2573-5],
[Article]

Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), pp. 1-19, 10, (1), DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
Portsmouth, UK, In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, [Conference or Workshop Item]

Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), pp. 1-16, DOI: 10.1111/1468-5973.12249,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...],
[Article]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
TU Darmstadt, [Master Thesis]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

Kummer, Florian (2017):
High-fidelity droplet and bubble simulations using local enrichment.
In: 70th Annual Meeting of the APS Division of Fluid Dynamics, Denver, Colorado, November 19-21, 2017, [Online-Edition: http://adsabs.harvard.edu/abs/2017APS..DFD.Q7006K],
[Conference or Workshop Item]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt, [Master Thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt, [Master Thesis]

Karuppayah, Shankar and Böck, Leon and Grube, Tim and Manickam, Selvakumar and Mühlhäuser, Max and Fischer, Mathias (2017):
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
In: International Conference on Availability, Reliability and Security (ARES), New York, USA, ACM, Reggio Calabria, Italy, DOI: 10.1145/3098954.3098991,
[Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, Springer, Oslo, Norway, [Conference or Workshop Item]

Karvelas, Nikolaos and Senftleben, Marius and Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security, ACM, Reggio Calabria, Italy, [Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
In: International Conference on Human-Computer Interaction (HCII), Springer, 10292, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, [Conference or Workshop Item]

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 177-197, 2017, (4), DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],
[Article]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, pp. 24-29, 15, (3), DOI: 10.1109/MSP.2017.70,
[Article]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, [Conference or Workshop Item]

Kumar, Abhijeet and Dahl, Verena and Kleinen, Jochen and Gambaryan-Roisman, Tatiana and Venzmer, Joachim (2017):
Influence of lipid bilayer phase behavior and substrate roughness on the pathways of intact vesicle deposition: A streaming potential study.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, pp. 302-311, 521, ISSN 0927-7757,
[Online-Edition: http://doi.org/10.1016/j.colsurfa.2016.07.066],
[Article]

Krause, Dennis and Kummer, Florian (2017):
An incompressible immersed boundary solver for moving body flows using a cut cell discontinuous Galerkin method.
In: Computers & Fluids, pp. 118-129, 153, ISSN 00457930,
DOI: 10.1016/j.compfluid.2017.05.008,
[Online-Edition: http://doi.org/10.1016/j.compfluid.2017.05.008],
[Article]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, [Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Article]

Koeser, Jan and Becker, Lukas G. and Gossmann, Ann-Kathrin and Boehm, Benjamin and Dreizler, Andreas (2017):
Investigation of ignition and volatile combustion of single coal particles within oxygen-enriched atmospheres using high-speed OH-PLIF.
In: Proceedings of the Combustion Institute, pp. 2103-2111, 36, (2), ISSN 1540-7489,
[Online-Edition: http://dx.doi.org/10.1016/j.proci.2016.07.083],
[Article]

Krueger, Christian and Schorr, Juergen and Nicollet, Franck and Bode, Johannes and Dreizler, Andreas and Boehm, Benjamin (2017):
Cause-and-effect chain from flow and spray to heat release during lean gasoline combustion operation using conditional statistics.
In: International Journal of Engine Research, pp. 143-154, 18, (1-2), ISSN 1468-0874,
[Online-Edition: http://dx.doi.org/10.1177/1468087416686721],
[Article]

Kuenne, Guido and Avdic, Amer and Janicka, J. (2017):
Assessment of subgrid interpolation for the source term evaluation within premixed combustion simulations.
In: Combustion and Flame, pp. 225-256, 178, ISSN 0010-2180,
[Online-Edition: http://dx.doi.org/10.1016/j.combustflame.2016.12.016],
[Article]

Kummer, Florian and Müller, Björn and Utz, Thomas (2017):
Time integration for extended discontinuous Galerkin methods with moving domains.
In: International Journal for Numerical Methods in Engineering, ISSN 00295981,
DOI: 10.1002/nme.5634,
[Online-Edition: https://doi.org/10.1002/nme.5634],
[Article]

Knappstein, R. and Kuenne, G. and Meier, T. and Sadiki, A. and Janicka, J. (2017):
Evaluation of coal particle volatiles reaction by using detailed kinetics and FGM tabulated chemistry.
In: Fuel, pp. 39-52, 201, ISSN 00162361,
[Online-Edition: https://doi.org/10.1016/j.fuel.2016.10.033],
[Article]

Korepanov, Vitaly I. and Hamaguchi, Hiro-o and Osawa, Eiji and Ermolenkov, Vladimir and Lednev, Igor K. and Etzold, Bastian J. M. and Levinson, Olga and Zousman, Boris and Epperla, Chandra Prakash and Chang, Huan-Cheng (2017):
Carbon structure in nanodiamonds elucidated from Raman spectroscopy.
In: Carbon, pp. 322-329, 121, ISSN 00086223,
[Online-Edition: https://doi.org/10.1016/j.carbon.2017.06.012],
[Article]

Kumar, Abhijeet and Kleinen, J. and Venzmer, Joachim and Gambaryan-Roisman, Tatiana (2017):
Effect of Geometry on Electrokinetic Characterization of Solid Surfaces.
In: Langmuir, pp. 7556-7568, 33, (30), ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.7b00344,
[Online-Edition: http://dx.doi.org/10.1021/acs.langmuir.7b00344],
[Article]

Kumar, Abhijeet and Kleinen, Jochen and Venzmer, Joachim and Gambaryan-Roisman, Tatiana (2017):
Effect of Geometry on Electrokinetic Characterization of Solid Surfaces.
In: Langmuir, pp. 7556-7568, 33, (30), ISSN 0743-7463,
[Online-Edition: https://doi.org/10.1021/acs.langmuir.7b00344],
[Article]

Klingebiel, Marcus and Ehrlich, André and Finger, Fanny and Röschenthaler, Timo and Jakirlić, Suad and Voigt, Matthias and Müller, Stefan and Maser, Rolf and Wendisch, Manfred and Hoor, Peter and Spichtinger, Peter and Borrmann, Stephan (2017):
A tandem approach for collocated measurements of microphysical and radiative cirrus properties.
In: Atmospheric Measurement Techniques, pp. 3485-3498, 10, (9), ISSN 1867-8548,
DOI: 10.5194/amt-10-3485-2017,
[Online-Edition: https://doi.org/10.5194/amt-10-3485-2017],
[Article]

Kommoß, Björn and Klemenz, Sebastian and Schmitt, Fabian and Hocke, Elisabeth and Vogel, Kevin and Drochner, Alfons and Albert, Barbara and Etzold, Bastian and Vogel, Herbert G. (2017):
Heterogeneously Catalyzed Hydrogenation of Supercritical CO2 to Methanol.
In: Chemical Engineering & Technology, pp. 1907-1915, 40, (10), ISSN 09307516,
DOI: 10.1002/ceat.201600400,
[Online-Edition: https://doi.org/10.1002/ceat.201600400],
[Article]

Khanjari, Neda and Eslami, Hossein and Müller-Plathe, Florian (2017):
Adaptive-numerical-bias metadynamics.
In: Journal of Computational Chemistry, pp. 2721-2729, 38, (31), ISSN 01928651,
DOI: 10.1002/jcc.25066,
[Online-Edition: https://doi.org/10.1002/jcc.25066],
[Article]

Knoche, Stefan and Heid, Maurice and Gora, Niklas and Ohlig, Dominik and Drochner, Alfons and Vogel, Herbert and Etzold, Bastian J. M. (2017):
Activity Hysteresis during Cyclic Temperature-Programmed Reactions in the Partial Oxidation of Acrolein to Acrylic Acid.
In: Chemical Engineering & Technology, pp. 2084-2095, 40, (11), ISSN 09307516,
DOI: 10.1002/ceat.201700111,
[Online-Edition: https://doi.org/10.1002/ceat.201700111],
[Article]

Kaygusuz, Hakan and Micciulla, Samantha and Erim, F. Bedia and von Klitzing, Regine (2017):
Effect of anionic surfactant on alginate-chitosan polyelectrolyte multilayer thickness.
In: Journal of Polymer Science Part B: Polymer Physics, pp. 1798-1803, 55, (23), ISSN 08876266,
DOI: 10.1002/polb.24429,
[Online-Edition: https://doi.org/10.1002/polb.24429],
[Article]

Kaygusuz, Hakan and Torlak, Emrah and Akın-Evingür, Gülşen and Özen, İlhan and von Klitzing, Regine and Erim, F. Bedia (2017):
Antimicrobial cerium ion-chitosan crosslinked alginate biopolymer films: A novel and potential wound dressing.
In: International Journal of Biological Macromolecules, pp. 1161-1165, 105, ISSN 01418130,
DOI: 10.1016/j.ijbiomac.2017.07.144,
[Online-Edition: https://doi.org/10.1016/j.ijbiomac.2017.07.144],
[Article]

Krumbein, Benjamin and Forooghi, Pourya and Jakirlić, Suad and Magagnato, Franco and Frohnapfel, Bettina (2017):
VLES Modeling of Flow Over Walls with Variably-shaped Roughness by Reference to Complementary DNS.
In: Flow, Turbulence and Combustion, pp. 685-703, 99, (3-4), ISSN 1386-6184,
DOI: 10.1007/s10494-017-9867-1,
[Online-Edition: https://doi.org/10.1007/s10494-017-9867-1],
[Article]

Kesal, D. and Christau, S. and Trapp, M. and Krause, P. and von Klitzing, R. (2017):
The internal structure of PMETAC brush/gold nanoparticle composites: a neutron and X-ray reflectivity study.
In: Physical Chemistry Chemical Physics, pp. 30636-30646, 19, (45), ISSN 1463-9076,
DOI: 10.1039/C7CP04404F,
[Online-Edition: https://doi.org/10.1039/C7CP04404F],
[Article]

Krumbein, B. and Jakirlić, S. and Tropea, C. (2017):
VLES study of a jet impinging onto a heated wall.
In: International Journal of Heat and Fluid Flow, pp. 290-297, 68, ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2017.09.020,
[Online-Edition: https://doi.org/10.1016/j.ijheatfluidflow.2017.09.020],
[Article]

Kez, V. and Consalvi, J.L. and Liu, F. and Ströhle, Jochen and Epple, Bernd (2017):
Assessment of several gas radiation models for radiative heat transfer calculations in a three-dimensional oxy-fuel furnace under coal-fired conditions.
In: International Journal of Thermal Sciences, pp. 289-302, 120, ISSN 12900729,
[Online-Edition: https://doi.org/10.1016/j.ijthermalsci.2017.06.017],
[Article]

Kaufhold, Marc-André and Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", pp. 78-88, 7, (1), [Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...],
[Article]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon
Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian
Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), Albi, France, In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0386,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236],
[Conference or Workshop Item]

Kogan, Kirill and Nikolenko, Sergey I. and Eugster, Patrick and Shalimov, Alexander and Rottenstreich, Ori (2016):
FIB efficiency in distributed platforms.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, DOI: 10.1109/ICNP.2016.7784452,
[Conference or Workshop Item]

Kohnhäuser, Florian and Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
TU Darmstadt, [Master Thesis]

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, [Conference or Workshop Item]

Kiss, Ágnes and Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Online-Edition: https://encrypto.de/papers/KS16.pdf],
[Conference or Workshop Item]

Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Fischer, Mathias and Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference or Workshop Item]

Kogan, Kirill and Menikkumbura, Danushka and Petri, Gustavo and Noh, Youngtae and Nikolenko, Sergey I. and Eugster, Patrick (2016):
BASEL (Buffer mAnagement SpEcification Language).
In: ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, ACM, Santa Clara, CA, ISBN 978-1-4503-4183-7,
DOI: 10.1145/2881025.2881027,
[Conference or Workshop Item]

Kulyk, Oksana and Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Karimi, Nader and McGrath, Stephen and Brown, Philip and Weinkauff, Johannes and Dreizler, Andreas (2016):
Generation of adverse pressure gradient in the circumferential flashback of a premixed flame.
In: Flow Turbulence and Combustion, pp. 663-687, 97, (2), ISSN 1386-6184,
[Online-Edition: http://dx.doi.org/10.1007/s10494-015-9695-0],
[Article]

Kez, Vitali and Liu, F. and Consalvi, J. L. and Ströhle, Jochen and Epple, Bernd (2016):
A comprehensive evaluation of different radiation models in a gas turbine combustor under conditions of oxy-fuel combustion with dry recycle.
In: Journal of Quantitative Spectroscopy & Radiative Transfer, pp. 121-133, 172, ISSN 0022-4073,
[Online-Edition: http://dx.doi.org/10.1016/j.jqsrt.2015.11.002],
[Article]

Kuehnreich, Benjamin and Hoeh, Matthias and Wagner, Steven and Ebert, Volker (2016):
Direct single-mode fibre-coupled miniature White cell for laser absorption spectroscopy.
In: Review of Scientific Instruments, 87, (2), ISSN 0034-6748,
[Online-Edition: http://dx.doi.org/10.1063/1.4941748],
[Article]

Kintea, D. M. and Roisman, I. V. and Tropea, C. (2016):
Transport processes in a wet granular ice layer: Model for ice accretion and shedding.
In: International Journal of Heat and Mass Transfer, pp. 461-472, 97, ISSN 0017-9310,
[Online-Edition: http://dx.doi.org/10.1016/j.ijheatmasstransfer.2016.01.076],
[Article]

Kintea, D. M. and Breitenbach, J. and Gurumurthy, V. Thammanna and Roisman, I. V. and Tropea, C. (2016):
On the influence of surface tension during the impact of particles on a liquid-gaseous interface.
In: Physics of Fluids, 28, (1), ISSN 1070-6631,
[Online-Edition: http://dx.doi.org/10.1063/1.4939285],
[Article]

Kadoch, Benjamin and Reimann, Thorsten and Schneider, Kai and Schaefer, Michael (2016):
Comparison of a spectral method With volume penalization and a finite volume method with body fitted grids for turbulent flows.
In: Computers & Fluids, pp. 140-150, 133, ISSN 0045-7930,
[Online-Edition: http://dx.doi.org/10.1016/j.compfluid.2016.04.028],
[Article]

Kuhn, Simone and Hartmann, Sebastien and Elsaesser, Wolfgang (2016):
Photon-statistics-based classical ghost imaging with one single detector.
In: Optics Letters, pp. 2863-2866, 41, (12), ISSN 0146-9592,
[Online-Edition: http://dx.doi.org/10.1364/ol.41.002863],
[Article]

Kirillova, Alina and Ionov, Leonid and Roisman, Ilia V. and Synytska, Alla (2016):
Hybrid Hairy Janus Particles for Anti-Icing and De-Icing Surfaces: Synergism of Properties and Effects.
In: Chemistry of Materials, pp. 6995-7005, 28, (19), ISSN 0897-4756,
[Online-Edition: http://dx.doi.org/10.1021/acs.chemmater.6b02765],
[Article]

Knappstein, Robert and Kuenne, Guido and Ketelheun, Anja and Koeser, Jan and Becker, Lukas and Heuer, Sebastian and Schiemann, Martin and Scherer, Viktor and Dreizler, Andreas and Sadiki, Amsini and Janicka, J. (2016):
Devolatilization and volatiles reaction of individual coal particles in the context of FGM tabulated chemistry.
In: Combustion and Flame, pp. 72-84, 169, ISSN 0010-2180,
[Online-Edition: http://dx.doi.org/10.1016/j.cornbustflame.2016.04.014],
[Article]

Krohm, F. and Kind, J. and Savka, R. and Alcaraz Janßen, M. and Herold, D. and Plenio, H. and Thiele, C. M. and Andrieu-Brunsen, A. (2016):
Photochromic spiropyran- and spirooxazine-homopolymers in mesoporous thin films by surface initiated ROMP.
In: Journal of Materials Chemistry C, pp. 4067-4076, 4, (18), ISSN 2050-7526,
DOI: 10.1039/C5TC04054J,
[Online-Edition: https://doi.org/10.1039/C5TC04054J],
[Article]

Kumar, Abhijeet and Gilson, Laurent and Henrich, Franziska and Dahl, Verena and Kleinen, Jochen and Gambaryan-Roisman, Tatiana and Venzmer, Joachim (2016):
Intact deposition of cationic vesicles on anionic cellulose fibers: Role of vesicle size, polydispersity, and substrate roughness studied via streaming potential measurements.
In: Journal of Colloid and Interface Science, pp. 152-161, 473, ISSN 0021-9797,
[Online-Edition: http://dx.doi.org/10.1016/j.jcis.2016.04.004],
[Article]

Köser, J. and Becker, L.G. and Vorobiev, N. and Schiemann, M. and Scherer, V. and Böhm, B. and Dreizler, A. (2015):
Characterization of single coal particle combustion within oxygen-enriched environments using high-speed OH-PLIF.
In: Applied Physics B-Lasers and Optics, pp. 459-464, 121, (4), ISSN 0946-2171,
[Online-Edition: http://dx.doi.org/10.1007/s00340-015-6253-3],
[Article]

Krämer, Juliane and Kiss, Ágnes and Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, [Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Online-Edition: https://encrypto.de/papers/KPRSSZ15.pdf],
[Conference or Workshop Item]

Kohnhäuser, Florian and Schaller, André and Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Kußmaul, Tobias and Löffler, Johannes and Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Kornhaas, Michael and Sternel, Dörte C. and Schäfer, Michael (2015):
Efficient numerical simulation of aeroacoustics for low Mach number flows interacting with structures.
In: Computational Mechanics, Springer Berlin Heidelberg, pp. 1143-1154, 55, (6), ISSN 0178-7675,
[Online-Edition: http://dx.doi.org/10.1007/s00466-014-1114-1],
[Article]

Kintea, Daniel M. and Hauk, Tobias and Roisman, Ilia V. and Tropea, Cameron (2015):
Shape evolution of a melting nonspherical particle.
In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), pp. 033012 (9 pp.)-033012 (9 pp.), 92, (3), ISSN 1539-3755,
[Online-Edition: http://dx.doi.org/10.1103/PhysRevE.92.033012],
[Article]

Karimi, Nader and Heeger, Christoph and Christodoulou, Loizos and Dreizler, Andreas (2015):
Experimental and Theoretical Investigation of the Flashback of a Swirling, Bluff-Body Stabilised, Premixed Flame.
In: Zeitschrift Fur Physikalische Chemie-International Journal of Research in Physical Chemistry & Chemical Physics, pp. 663-689, 229, (5), ISSN 0942-9352,
[Article]

Kuenne, Guido and Euler, Matthias and Ketelheun, Anja and Avdic, Amer and Dreizler, Andreas and Janicka, J. (2015):
A Numerical Study of the Flame Stabilization Mechanism Being Determined by Chemical Reaction Rates Submitted to Heat Transfer Processes.
In: Zeitschrift Fur Physikalische Chemie-International Journal of Research in Physical Chemistry & Chemical Physics, pp. 643-662, 229, (5), ISSN 0942-9352,
[Article]

Kriegseis, J. and Maden, I. and Schwarz, C. and Tropea, Cameron and Grundmann, S. (2015):
velocity-information based force-term estimation of dielectric barrier discharge plasma actuators (vol 46, 055202, 2013).
In: Journal of Physics D-Applied Physics, 48, (32), ISSN 0022-3727,
[Online-Edition: http://dx.doi.org/10.1088/0022-3727/48/32/329401],
[Article]

Kallendorf, Christina and Fath, Anja and Oberlack, Martin and Wang, Yongqi (2015):
Exact solutions to the interfacial surfactant transport equation on a droplet in a Stokes flow regime.
In: Physics of Fluids, 27, (8), ISSN 1070-6631,
[Online-Edition: http://dx.doi.org/10.1063/1.4928547],
[Article]

Klein, Benedikt and Kummer, Florian and Keil, Markus and Oberlack, Martin (2015):
An extension of the SIMPLE based discontinuous Galerkin solver to unsteady incompressible flows.
In: International Journal for Numerical Methods in Fluids, pp. 571-589, 77, (10), ISSN 0271-2091,
[Online-Edition: http://dx.doi.org/10.1002/fld.3994],
[Article]

Kumar, Abhijeet and Kleinen, J. and Gambaryan-Roisman, Tatiana and Venzmer, J. (2015):
Interaction of cationic complex fluids with anionic substrates.
In: Droplets Conference, Twente, 2015, [Conference or Workshop Item]

Kumar, Abhijeet and Kleinen, J. and Venzmer, J. and Gambaryan-Roisman, Tatiana (2015):
A streaming potential study of cationic vesicle deposition on anionic porous substrates.
In: Complex Fluid Flow in Porous Media, Bordeaux, 2015, [Conference or Workshop Item]

Klewicki, J. and Oberlack, Martin (2015):
Finite Reynolds number properties of a turbulent channel flow similarity solution.
In: Physics of Fluids, 27, (9), ISSN 1070-6631,
[Online-Edition: http://dx.doi.org/10.1063/1.4931651],
[Article]

Krauß, Christoph and Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, pp. 383-387, 39(6), [Article]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, Scottsdale, AZ, USA, In: ACM, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]

Kulyk, Oksana and Feier, Christian and Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Kogan, Kirill and Nikolenko, Sergey I. and Rottenstreich, Ori and Culhane, William and Eugster, Patrick (2014):
SAX-PAC (Scalable And eXpressive PAcket Classification).
In: Proceedings of the 2014 ACM conference on SIGCOMM, ACM, Chicago, Illinois, USA, In: SIGCOMM '14, ISBN 978-1-4503-2836-4,
DOI: 10.1145/2619239.2626294,
[Conference or Workshop Item]

Kong, Joonho and Koushanfar, Farinaz and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, ACM Press, [Conference or Workshop Item]

Kolb, Nina and Bartsch, Steffen and Volkamer, Melanie and Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, Springer, Cham, Heraklion, Greece, 8533, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Kremer, Steve and Künnemann, Robert (2014):
Automated analysis of security protocols with global state.
In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, IEEE Computer Society, San Jose, CA, USA, In: SP '14, ISBN 978-1-4799-4686-0,
DOI: 10.1109/SP.2014.18,
[Conference or Workshop Item]

Koeberl, Patrick and Schulz, Steffen and Sadeghi, Ahmad-Reza and Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Klos, Christian (2013):
Design and deployment of a public key infrastructure.
TU Darmstadt, [Master Thesis]

Kalabis, Lukas and Wolf, Ruben and Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, pp. 512-516, 37, (8), DOI: 10.1007/s11623-013-0209-8,
[Article]

Kieseberg, Peter and Huber, Markus and Leithner, Manuel and Mulazzani, Martin and Weippl, Edgar (2013):
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security table of contents, ACM, Hangzhou, China, In: ASIA CCS '13, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484384,
[Conference or Workshop Item]

Kocabas, Unal and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference or Workshop Item]

Kauer, Michaela and Günther, Sebastian and Storck, Daniel and Volkamer, Melanie
Marinos, Louis and Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Springer, In: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, In: Lecture Notes in Computer Science, 8030, ISBN ISBN 978-3-642-39345-7,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39345-7_11],
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13), [Other]

Katzenbeisser, Stefan and Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885, [Article]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, pp. 305-308, 35, (4), [Article]

Kelbert, Florian and Shirazi, Fatemeh and Simo, Hervais and Wüchner, Tobias and Buchmann, Johannes and Pretschner, Alexander and Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, pp. 189-279, [Book Section]

Katzenbeisser, Stefan and Kocabaş, Ünal and Rožic, Vladimir and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 7428, [Conference or Workshop Item]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Kiefer, Franziskus and Wiesmaier, Alexander and Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12), Las Vegas, USA, [Conference or Workshop Item]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Khalilbeigi, Mohammadreza and Schmittat, Patrik and Steimle, Jürgen and Mühlhäuser, Max (2012):
Occlusion-aware Interaction Techniques for Tabletop Systems.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223831,
[Conference or Workshop Item]

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: Sicherheit, GI, Darmstadt, Germany, In: LNI, 195, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Kalabis, Lukas and Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, pp. 670--675, 36, (9), DOI: 10.1007/s11623-012-0224-1,
[Article]

Kauer, Michaela and Kiesel, Florian and Ueberschaer, Felix and Volkamer, Melanie and Bruder, Ralph
Jähnke, Jochen and Mühlen, Nicolas von zur and Rechert, Klaus and Suchodoletz, Dirk von (eds.)
Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, Berlin, Duncker & Humblot, pp. 215-220, [Book Section]

L

Liu, M. and Bothe, D. (2019):
Toward the predictive simulation of bouncing versus coalescence in binary droplet collisions.
In: Acta Mechanica, Springer, pp. 623-644, 230, (2), ISSN 0001-5970,
DOI: 10.1007/s00707-018-2290-4,
[Online-Edition: http://link.springer.com/article/10.1007/s00707-018-2290-4],
[Article]

Li, Lingxi and Rosenkranz, Simon and Schäfer, Walter and Tropea, Cameron (2019):
Light scattering from a drop with an embedded particle and its exploitation in the time-shift technique.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, pp. 20-31, 227, ISSN 00224073,
DOI: 10.1016/j.jqsrt.2019.01.022,
[Online-Edition: https://doi.org/10.1016/j.jqsrt.2019.01.022],
[Article]

Lehmann, Maren and Krause, Paul and Miruchna, Viktor and von Klitzing, Regine (2019):
Tailoring PNIPAM hydrogels for large temperature-triggered changes in mechanical properties.
In: Colloid and Polymer Science, pp. 633-640, 297, (4), ISSN 0303-402X,
DOI: 10.1007/s00396-019-04470-0,
[Online-Edition: https://doi.org/10.1007/s00396-019-04470-0],
[Article]

Ludwig, Michael and Witt, Marcus U. and von Klitzing, Regine (2019):
Bridging the gap between two different scaling laws for structuring of liquids under geometrical confinement.
In: Advances in Colloid and Interface Science, pp. 270-276, 269, ISSN 00018686,
DOI: 10.1016/j.cis.2019.04.012,
[Online-Edition: https://doi.org/10.1016/j.cis.2019.04.012],
[Article]

Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/amandalanger1/2019/1757_AmandaLa...],
[Conference or Workshop Item]

Linsner, Sebastian and Varma, Rashmi and Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna. Austria, 18.-19. Februar 2019, [Online-Edition: http://gil-net.de/Publikationen/139_119.pdf],
[Conference or Workshop Item]

Liu, Mo-meng and Krämer, Juliane and Hu, Yu-pu and Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, Springer, pp. 1348-1369, 18, Issue 9, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Online-Edition: https://link.springer.com/journal/11714],
[Article]

Landwehr, Johannes and Steldinger, Hendryk and Etzold, Bastian J. M. (2018):
Introducing sulphur surface groups in microporous carbons: A mechanistic study on carbide derived carbons.
In: Catalysis Today, pp. 191-195, 301, ISSN 09205861,
DOI: 10.1016/j.cattod.2017.05.027,
[Online-Edition: https://doi.org/10.1016/j.cattod.2017.05.027],
[Article]

Löhmann, Oliver and Micciulla, Samantha and Soltwedel, Olaf and Schneck, Emanuel and von Klitzing, Regine (2018):
Swelling Behavior of Composite Systems: Mutual Effects between Polyelectrolyte Brushes and Multilayers.
In: Macromolecules, pp. 2996-3005, 51, (8), ISSN 0024-9297,
DOI: 10.1021/acs.macromol.8b00359,
[Online-Edition: https://doi.org/10.1021/acs.macromol.8b00359],
[Article]

Lehmann, Maren and Tabaka, Weronika and Möller, Tim and Oppermann, Alex and Wöll, Dominik and Volodkin, Dmitry and Wellert, Stefan and Klitzing, Regine von (2018):
DLS Setup for in Situ Measurements of Photoinduced Size Changes of Microgel-Based Hybrid Particles.
In: Langmuir, pp. 3597-3603, 34, (12), ISSN 0743-7463,
D