TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "Profilbereiche > Cybersicherheit (CYSEC)"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z
Anzahl der Einträge auf dieser Ebene: 579.

A

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira :
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Artikel], (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit], (2017)

Anagnostopoulos, Nikolaos A. ; Gabmeyer, Sebastian :
An extensice classication and analysis of attaks against Physical Unclonable Functions (PUFs).
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas :
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Afridi, Hassaan Ali Khan :
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt
[Masterarbeit], (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub :
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE Trustcom IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas :
MCMix: Anonymous Messaging via Secure Multiparty Computation.
26th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2017)

Anagnostopoulos, Nikolaos A. ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan :
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane :
A Framework to Select Parameters for Lattice-Based Cryptography.

[Anderes], (2017)

Alexopoulos, Nikolaos :
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Proceedings of the 32nd Annual ACM Symposium on Applied Computing ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew :
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
13th IEEE International Conference on Advanced and Trusted Computing
[Konferenz- oder Workshop-Beitrag], (2017)

Anagnostopoulos, Nikolaos A. ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga :
Low-temperature data remanence attacks against intrinsic SRAM PUFs.

[Report], (2016)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Abera, Tigist ; Asokan, Nadarajah ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Arzt, Steven ; Bodden, Eric :
StubDroid: automatic inference of precise data-flow summaries for the android framework.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Alber, Gernot ; Trautmann, Nils :
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series
[Artikel], (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes], (2016)

Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko :
Hybrid Monitors for Concurrent Noninterference.
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2015)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter :
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.

[Anderes], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34th Advances in Cryptology - EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More efficient oblivious transfer extensions with security for malicious adversaries.
34th Advances in Cryptology - EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf :
Evaluation of User Feedback in Smart Home for Situational Context Identification.
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel], (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
International Conference on Software Engineering(ICSE) 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas :
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science , 8383 .
[Konferenz- oder Workshop-Beitrag], (2014)

Asokan, Nadarajah ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian :
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
ICISC 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Alaoui, Sidi Mohamed El Yousfi ; El Bansarkhani, Rachid ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard :
Code based Identification and Signature Schemes in Software.
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2) pp. 209-232.
[Artikel], (2013)

Anjorin, Mojisola ; Domínguez García, Renato ; Rensing, Christoph :
Context determines content: an approach to resource recommendation in folksonomies.
In: RSWeb '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
International Conference on Cryptology in Africa (AFRICACRYPT 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

B

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
INDOCRYPT 2017 - 18th International Conference on Cryptology in India Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
ProvSec 2017 - The 11th International Conference on Provable Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
The 10th International Symposium on Foundations & Practice of Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes :
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
CODES/ISSS ’17 Companion Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Security and Cryptology , 22 (10492). Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele :
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15 pp. 12-13.
[Artikel], (2017)

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian :
PRF-ODH: Relations, Instantiations, and Impossibility Results.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Butin, Denis :
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4) pp. 37-43.
[Artikel], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan :
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Proceedings on Privacy Enhancing Technologies De Gruyter
[Konferenz- oder Workshop-Beitrag], (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Billes, Marina ; Møller, Anders ; Pradel, Michael :
Systematic Black-Box Analysis of Collaborative Web Applications.
PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation ACM New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias :
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
[Artikel], (2017)

Bindel, Nina :
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2017)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick :
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS (10194). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik :
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).

[Anderes], (2016)

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael :
Towards Automated Measurements of Internets Naming Infrastructure.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag], (2016)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Anderes], (2016)

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas :
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas:
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9
[Buch], (2016)

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel :
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7) 309–322.
[Artikel], (2016)

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan :
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS (9614). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias :
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: ACSAC 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel :
Detection and Forensics of Domains Hijacking.
IEEE Global Communications Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Buescher, Niklas ; Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Konferenz- oder Workshop-Beitrag], (2015)

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Dodis, Yevgeniy ; Nielsen, Arno Buus (eds.) :

Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Lecture Notes in Computer Science 9015 . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf :
A Concept for a C2X-based Crossroad Assistant.
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 pp. 5-13.
[Artikel], (2015)

Butin, Denis ; Métayer, Daniel Le :
A Guide to End-to-End Privacy Accountability.
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes :
Real-World Post-Quantum Digital Signatures.
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015) Springer CCIS
[Konferenz- oder Workshop-Beitrag], (2015)

Brzuska, Christina ; Mittelbach, Arno
Sarkar, Palash ; Iwata, Tetsu (eds.) :

Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Lecture Notes in Computer Science 8874 , 2 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Braun, Johannes :
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) :

Towards Security Solutions for Emergent Business Software.
Future Business Software Conference 2012 Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Garay, Arno A. ; Gennaro, Rosario (eds.) :

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Lecture Notes in Computer Science 8616 , 1 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander :
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3) pp. 459-478.
[Artikel], (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster privacy-preserving distance computation and biometric identification.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max :
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014 913-959 (2014).
[Artikel], (2014)

Brzuska, Christina ; Mittelbach, Arno :
Using Indistinguishability Obfuscation via UCEs.
In: LNCS 8874 , 2 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) :

Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
International Conference for E-Democracy and Open Government 2014 Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag], (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Konferenz- oder Workshop-Beitrag], (2014)

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik :
Interaction Techniques for Co-located Collaborative TV.
CHI 2014 ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 pp. 114-125.
[Artikel], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander:
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg ISBN 978-3-642-40656-0
[Buch], (2013)

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander :
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 11/2013 720 - 725.
[Artikel], (2013)

Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia :
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
In: MobiCom'13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) :

Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS (8341). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch], (2013)

Braden, Kjell :
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt
[Masterarbeit], (2013)

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes :
EP 2600270 Identification element-based authentication and identification with decentralised service use.

[Norm, Patent, Standard], (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS (7859). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas :
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt :
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) :

On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on Systems Science (HICSS-46) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus :
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1) pp. 84-96.
[Artikel], (2013)

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS (8282). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Rynkowski, Gregor :
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Social Computing (SocialCom) - PASSAT2013
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander :
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.

[Report], (2012)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) :

iPIN and mTAN for secure eID applications.
In: LNCS (7232). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Volkamer, Melanie :
Towards the Systematic Development of Contextualized Security Interventions.
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) :

Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012 IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen :
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
[Artikel], (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.

[Report], (2012)

Busold, Christoph :
Hash-based Signatures on Smart Cards.
TU Darmstadt
[Masterarbeit], (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Buch], (2012)

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard :
The Transitivity of Trust Problem in the Interaction of Android Applications.

[Report], (2012)

Bartsch, Steffen :
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
[Dissertation]

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[Konferenz- oder Workshop-Beitrag], (2012)

C

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.

[Anderes], (2017)

Chauhan, Prankur :
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
TU Darmstadt
[Masterarbeit], (2017)

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya :
Are We There Yet? On RPKIs Deployment and Security.
Network and Distributed Systems Security (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias :
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias :
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
[Artikel], (2016)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper).
ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Classen, Jiska :
Software Defined Radio – Open Source Wireless Hacking.

[Anderes], (2016)

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik :
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Classen, Jiska :
Building and Breaking Wireless Security.

[Anderes], (2015)

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le :
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6) pp. 749-762.
[Artikel], (2015)

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward :
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
2nd ACM Workshop on Visible Light Communication Systems
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias :
Practical Covert Channels for WiFi Systems.
IEEE Conference on Communications and Network Security (CNS)
[Konferenz- oder Workshop-Beitrag], (2015)

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas :
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.

[Report], (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin :
NoPhish App Evaluation: Lab and Retention Study.
NDSS Workshop on Usable Security 2015 Internet Society
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Konferenz- oder Workshop-Beitrag], (2015)

Culhane, William ; Jayaram, K. R. ; Eugster, Patrick :
Fast, Expressive Top-k Matching.
In: Middleware '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
Analyzing the Effectiveness of DoS Attacks on Tor.
7th International Conference on Security of Information and Networks (SIN 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
A Survey on Tor and I2P.
Ninth International Conference on Internet Monitoring and Protection (ICIMP2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil :
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) pp. 1-6.
[Artikel], (2014)

Conrad, Bernd :
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt
[Masterarbeit], (2014)

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias :
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP) pp. 92-107.
[Artikel], (2014)

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza :
A trusted versioning file system for passive mobile storage devices.
J. Network and Computer Applications
[Konferenz- oder Workshop-Beitrag], (2014)

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick :
Provably Secure LWE-Encryption with Uniform Secret.

[Anderes], (2013)

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian :
k-anonymous reputation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13 ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Cuong, N. ; Katzenbeisser, Stefan :
Robust Resampling Detection in Digital Images.
Conference on Communications and Multimedia Security (CMS 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[Konferenz- oder Workshop-Beitrag], (0018)

D

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
CANS'17 - 16. International Conference on Cryptology And Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson :
Just-in-Time Static Analysis.
Proceedings of ISSTA ’17 ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective protection of sensitive metadata in online communication networks.
ACNS'17 - 15. International Conference on Applied Cryptography and Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson :
Cheetah: Just-in-Time Taint Analysis for Android Apps.
2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) Curran Associates, Inc.
[Konferenz- oder Workshop-Beitrag], (2017)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Experimental Study of a Bucketing Approach.
Quantitative Aspects of Programming Languages and Systems
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Dietsch, Sascha Thorsten :
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
TU Darmstadt
[Masterarbeit], (2017)

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael :
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052 . Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2016)

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas :
Secure Logging Schemes and Certificate Transparency.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia :
Efficient Third Party Auditing for a Distributed Storage System.
International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas :
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
2016 11th International Conference on Availability, Reliability and Security (ARES) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.

[Anderes], (2016)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. :
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security (IJIS)
[Artikel], (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch], (2015)

Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
Andy, Gill (ed.) :

Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: OOPSLA 2015 , 50 (10). ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
22nd ACM Conference on Computer and Communications Security (CCS 2015) ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Demirel, Denise ; Lancrenon, Jean :
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.

[Report], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical multi-server PIR.
6th ACM Cloud Computing Security Workshop (ACM CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung :
The Cubic Simple Matrix Encryption Scheme.
In: LNCS (8772). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS (9024). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel], (2014)

Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf :
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
In: PerCom Workshops 2014 . IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Second Look at Fischlin’s Transformation.
Africacrypt 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Fischlin, Marc :
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
ISIT 2014 - IEEE International Symposium on Information Theory
[Konferenz- oder Workshop-Beitrag], (2014)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) :

Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: LNCS (8893). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko :
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
In: CCS '13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Demirel, Denise ; Henning, Maria ; van de Graaf, Jeroen ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) :

Prêt à Voter Providing Everlasting Privacy.
In: LNCS (7985). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in the Quantum World.
ASIACRYPT 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Demirel, Denise :
Universally Veriable Poll-Site Voting Schemes Providing Everlasting Privacy.
TU Darmstadt
[Dissertation]

Demirel, Denise ; Henning, Maria
Weblaw, Editions (ed.) :

Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
[Artikel], (2012)

Demirel, Denise ; van de Graaf, Jeroen ; Araújo, Roberto :
Improving Helios with Everlasting Privacy Towards the Public.
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max :
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Konferenz- oder Workshop-Beitrag], (2012)

E

El Bansarkhani, Rachid ; Sturm, Jan :
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
15th International Conference on Cryptology and Network Security - CANS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

El Bansarkhani, Rachid ; El Kaafarani, Ali :
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.

[Anderes], (2016)

Ermuth, Markus ; Pradel, Michael :
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Erbenich, Vanessa :
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt
[Masterarbeit], (2016)

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes :
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes :
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive p. 20.
[Artikel], (2015)

Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. :
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4) pp. 29-37.
[Artikel], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) :

Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS (8469). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes :
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
IACR Cryptology ePrint Archive 2014: 334
[Konferenz- oder Workshop-Beitrag], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS (8282).
[Konferenz- oder Workshop-Beitrag], (2013)

Egert, Rolf :
Lattice-based Signatures.
TU Darmstadt
[Masterarbeit], (2013)

El Bansarkhani, Rachid ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael :
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53 pp. 81-102.
[Artikel], (2012)

El Bansarkhani, Rachid ; Meziani, Mohammed :
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

F

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
ARES 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Konferenz- oder Workshop-Beitrag], (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP p. 1.
[Artikel], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag], (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Fischlin, Marc ; Günther, Felix :
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro :
Capture and Replay: Reproducible Network Experiments in Mininet.
SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya :
Obfuscation Combiners.
International Cryptology Conference (CRYPTO)
[Konferenz- oder Workshop-Beitrag], (2016)

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens :
NetCo: Reliable Routing with Unreliable Routers.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Konferenz- oder Workshop-Beitrag], (2016)

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan :
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
37th IEEE Symposium on Security and Privacy (S&P 2016) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Fleisch, Gilbert :
Towards policy checks on passwords via fully homomorphic encryption.
TU Darmstadt
[Masterarbeit], (2016)

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot :
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society (92) p. 10.
[Artikel], (2015)

Fischlin, Marc ; Mazaheri, Sogol :
Notions of Deniable Message Authentication.
In: WPES '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. :
Data Is a Stream: Security of Stream-Based Channels.
Advances in Cryptology - CRYPTO 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. :
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, IOP Publishing 025501.
[Artikel], (2015)

Fischlin, Marc ; Günther, Felix :
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Franke, Daniel :
Risk Simulations for the Web PKI.
TU Darmstadt
[Masterarbeit], (2014)

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut :
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Compiler Construction (CC)2014, Lecture Notes in Computer Science
[Konferenz- oder Workshop-Beitrag], (2014)

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof :
Robust Multi-Property Combiners for Hash Functions.
J. Cryptology
[Konferenz- oder Workshop-Beitrag], (2014)

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. :
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Artikel], (2013)

Felzer, Torsten ; Rinderknecht, Stephan :
Mouse mode of OnScreenDualScribe: three types of keyboard-driven mouse replacement.
In: CHI EA '13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Franz, M. ; Deiseroth, B. ; Hamacher, K. ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. :
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3) pp. 117-128.
[Artikel], (2013)

Fontein, Felix ; Schneider, Michael ; Wagner, Urs :
A Polynomial Time Version of LLL With Deep Insertions.
International Workshop on Coding and Cryptography - WCC 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Fehr, Victoria :
Sophisticated Public-Key Encryption.
Tu Darmstadt
[Masterarbeit], (2012)

G

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2018)

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , pp. 83-98.
[Buchkapitel], (2018)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval :
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
to appear at: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Nina ; Zimmermann, Verena
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) :

Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max :
Cover Traffic: A Trade of Anonymity and Efficiency.
to appear in: 13th International Workshop on Security and Trust Management in conjunction with the 22th European Symposium On Research in Computer Security (ESORICS 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Felix ; Mazaheri, Sogol :
A Formal Treatment of Multi-key Channels.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Göpfert, Florian ; van Vredendaal, Christine ; Wunderer, Thomas :
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Konferenz- oder Workshop-Beitrag], (2017)

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. :
ORAMs in a Quantum World.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. :
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
CHI'17 CHI Conference on Human Factors in Computing Systems ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian :
0-RTT Key Exchange with Full Forward Secrecy.
Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colonies for Efficient and Anonymous Group Communication Systems.
2017 International Conference on Networked Systems (NetSys) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Masterarbeit], (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
(to appear) Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina :
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing Springer Fachmedien Wiesbaden
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) pp. 8-26.
[Artikel], (2016)

Ghiglieri, Marco ; Stopczynski, Martin :
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE
[Konferenz- oder Workshop-Beitrag], (2016)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Ghiglieri, Marco ; Waidner, Michael :
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, vol. 14, no. (IEEE 14/3) pp. 61-67.
[Artikel], (2016)

Günther, Felix ; Poettering, Bertram :
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security (IJIS)
[Artikel], (2016)

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo :
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.

[Report], (2016)

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj :
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
[Konferenz- oder Workshop-Beitrag], (2015)

Gong, Liang ; Pradel, Michael ; Sen, Koushik :
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: ESEC/FSE 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik :
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: ISSTA 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael :
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken .
[Konferenz- oder Workshop-Beitrag], (2015)

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[Konferenz- oder Workshop-Beitrag], (2015)

Günther, Felix ; Poettering, Bertram :
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
20th Australasian Conference on Information Security and Privacy (ACISP 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Müller, Jan :
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
14. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Oswald, Florian :
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
14. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco :
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
IEEE CCNC
[Konferenz- oder Workshop-Beitrag], (2015)

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin :
Lattice Basis Reduction Attack against Physically Unclonable Functions.
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) :

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS (8813). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV – aktueller Stand 2014.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Konferenz- oder Workshop-Beitrag], (2014)

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) :

Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS (8895). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael :
Personal DLP for Facebook.
In: 6 . IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Günther, Felix ; Manulis, Mark ; Peter, Andreas :
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Konferenz- oder Workshop-Beitrag], (2013)

Gleser, Michael :
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt
[Masterarbeit], (2013)

Geihs, Matthias :
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt
[Masterarbeit], (2013)

Guo, Sheng :
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.

[Report], (2013)

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David :
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
13. Deutschen IT-Sicherheitskongress SecuMedia Verlags-GmbH
[Konferenz- oder Workshop-Beitrag], (2013)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Göttert, Norman :
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt
[Masterarbeit], (2012)

H

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes :
Update-tolerant and Revocable Password Backup.
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag], (2017)

Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira :
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2017 IEEE Symposium on Security and Privacy (SP 2017) Curran Associates, Inc
[Konferenz- oder Workshop-Beitrag], (2017)

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Stratum Filtering: Cloud-Based Detection of Attack Sources.
ACM Cloud Computing Security Workshop (CCSW)
[Konferenz- oder Workshop-Beitrag], (2016)

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido :
SecureScala: Scala embedding of secure computations.
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes :
Password Requirements Markup Language.
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag], (2016)

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Survey of Software Protection with Minimal Hardware.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[Konferenz- oder Workshop-Beitrag], (2015)

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes :
PALPAS - PAsswordLess PAssword Synchronization.
International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier pp. 463-493.
[Artikel], (2015)

Herzberg, Amir ; Shulman, Haya :
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE (19) pp. 80-84.
[Artikel], (2015)

Herzberg, Amir ; Shulman, Haya :
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC .
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno :
Less is More: Cipher-Suite Negotiation for DNSSEC.
Computer Security Applications Conference (ACM ACSAC) ACSAC, IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias :
SAML Privacy-Enhancing Profile.
In: LNI , P-237 . GI
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya :
DNS Security: Past, Present and Future.
Future Security Conference 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias :
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4) pp. 237-241.
[Artikel], (2014)

Herzberg, Amir ; Shulman, Haya :
Limiting MitM to MitE Covert-Channels.
In: ARES 2013 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Hamann, Tobias :
The BKZ Simulation Algorithm.
Tu Darmstadt
[Masterarbeit], (2013)

Hülsing, Andreas ; Braun, Johannes :
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias :
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas :
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Africa Crypt 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes :
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013. LNCS (8128). Springer Regensburg, Germany , pp. 194-208.
[Buchkapitel], (2013)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander :
Decoupling Authentication from the Usage of Services.

[Report], (2012)

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut :
Secure Two-Party Computations in ANSI C.
Conference on Computer and Communications Security (CCS 2012) ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Heinrich, Markus :
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
[Masterarbeit], (2012)

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) :

Forward Secure Signatures on Smart Cards.
In: LNCS (7707). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2012)

Henß, Stefan ; Monperrus, Martin ; Mezini, Mira :
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
In: ICSE '12 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2012)

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max :
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI'12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) :

Post-Quantum Signaturverfahren Heute.
22. SIT-Smartcard Workshop 2012 Fraunhofer Verlag Stuttgart
[Konferenz- oder Workshop-Beitrag], (2012)

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko :
On the design and implementation of the Open eCard App.
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[Konferenz- oder Workshop-Beitrag], (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas :
Verteilte Dienstnutzung mit dem neuen Personalausweis.
D-A-CH Security 2012, 25. - 26. September
[Konferenz- oder Workshop-Beitrag], (2012)

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Inel, Miray :
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt
[Masterarbeit], (2014)

J

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit], (2017)

Jawed, Kashif :
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
TU Darmstadt
[Masterarbeit], (2016)

Jayalath, Chamikara ; Stephen, Julian James ; Eugster, Patrick :
Atmosphere: A Universal Cross-Cloud Communication Infrastructure.
In: Lecture Notes in Computer Science (8275). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[Konferenz- oder Workshop-Beitrag], (2012)

K

Kübler, Florian :
Foundations of a refinement-based framework for escape analyses.
TU Darmstadt
[Masterarbeit], (2017)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
Automated Software Engineering (ASE'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
Proceedings on Privacy Enhancing Technologies
[Konferenz- oder Workshop-Beitrag], (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit], (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit], (2017)

Karuppayah, Shankar ; Böck, Leon ; Grube, Tim ; Manickam, Selvakumar ; Mühlhäuser, Max ; Fischer, Mathias :
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Using Oblivious RAM in Genomic Studies.
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan :
Microblogging in a Privacy-Preserving way.
ARES 2017 - 12th International Conference on Availability, Reliability and Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie :
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
International Conference on Human-Computer Interaction (HCII) Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2017)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Internet-Wide Study of DNS Cache Injections.
IEEE International Conference on Computer Communications (INFOCOM)
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv
[Artikel], (2017)

Kogan, Kirill ; Nikolenko, Sergey I. ; Eugster, Patrick ; Shalimov, Alexander ; Rottenstreich, Ori :
FIB efficiency in distributed platforms.
2016 IEEE 24th International Conference on Network Protocols (ICNP) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Klir, Thomas :
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
TU Darmstadt
[Masterarbeit], (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's universal circuit is practical.
In: LNCS , 9665 . Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Kogan, Kirill ; Menikkumbura, Danushka ; Petri, Gustavo ; Noh, Youngtae ; Nikolenko, Sergey I. ; Eugster, Patrick :
BASEL (Buffer mAnagement SpEcification Language).
ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Volkamer, Melanie :
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan :
PUF-based Software Protection for Low-end Embedded Devices.
8th International Conference on Trust and Trustworthy Computing (TRUST 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Krauß, Christoph ; Waidner, Michael :
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39(6) pp. 383-387.
[Artikel], (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to rethink: Trust brokerage using trusted execution environments.
8th International Conference on Trust & Trustworthy Computing (TRUST'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Kogan, Kirill ; Nikolenko, Sergey I. ; Rottenstreich, Ori ; Culhane, William ; Eugster, Patrick :
SAX-PAC (Scalable And eXpressive PAcket Classification).
In: SIGCOMM '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

Kremer, Steve ; Künnemann, Robert :
Automated analysis of security protocols with global state.
In: SP '14 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2014)

Klos, Christian :
Design and deployment of a public key infrastructure.
TU Darmstadt
[Masterarbeit], (2013)

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas :
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8) pp. 512-516.
[Artikel], (2013)

Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar :
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
In: ASIA CCS '13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[Konferenz- oder Workshop-Beitrag], (2013)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Short Talk: Automatic Protocol Selection in Secure Two-Party Computations.

[Anderes], (2013)

Katzenbeisser, Stefan ; Schaller, André :
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit pp. 881-885.
[Artikel], (2012)

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes :
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4) pp. 305-308.
[Artikel], (2012)

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) :

State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE). Springer Verlag Heidelberg , pp. 189-279. ISBN 978-3-642-31942-6
[Buchkapitel], (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Kirchbuchner, Florian :
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt
[Masterarbeit], (2012)

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian :
Practical Security in E-Mail Applications.
The 2012 International Conference on Security and Management (SAM’12)
[Konferenz- oder Workshop-Beitrag], (2012)

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Buch], (2012)

Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max :
Occlusion-aware Interaction Techniques for Tabletop Systems.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Kalabis, Lukas ; Selzer, Annika :
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9) 670--675.
[Artikel], (2012)

L

Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. :
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2017)

Langfeld, Benedikt :
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
TU Darmstadt
[Masterarbeit], (2017)

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming
[Artikel], (2017)

Lato, Ellen :
Fault Attacks on Lattice-Based Encryption Schemes.
TU Darmstadt
[Masterarbeit], (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag], (2016)

Liu, Hui ; Liu, Qiurong ; Staicu, Cristian-Alexandru ; Pradel, Michael ; Luo, Yue :
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil :
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Konferenz- oder Workshop-Beitrag], (2015)

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel :
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
[Artikel], (2015)

Lillack, Max ; Kästner, Christian ; Bodden, Eric :
Tracking Load-time Configuration Option.
In: ASE '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Lagerspetz, E. ; Truong, Hien Thi Thu ; Tarkoma, S. ; Asokan, N. :
MDoctor: A Mobile Malware Prognosis Application.
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on
[Konferenz- oder Workshop-Beitrag], (2014)

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Mühlhäuser, Max :
EarPut: Augmenting Behind-the-Ear Devices for Ear-based Interaction.
CHI EA '13: Proceedings of the 2013 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Lissermann, Roman ; Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max :
Permulin: Personal In- and Output on Interactive Surfaces.
CHI '13 Interactivity ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Lissermann, Roman ; Olberding, Simon ; Steimle, Jürgen ; Mühlhäuser, Max :
Interacting with Videos On Paper-like Displays.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

M

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit], (2017)

Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. :
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
In: IEEE Transactions on Computers , 66 (10)
[Konferenz- oder Workshop-Beitrag], (2017)

Mulholland, John ; Mosca, Michele ; Braun, Johannes :
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4) pp. 14-21.
[Artikel], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Mayer, Peter ; Volkamer, Melanie :
Poster: Secure Storage of Masked Passwords.
IEEE European Symposium on Security and Privacy Posters
[Konferenz- oder Workshop-Beitrag], (2017)

Marson, Giorgia Azzurra ; Poettering, Bertram :
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (Volume 2017 Issue 1) pp. 405-426.
[Artikel], (2017)

Mohamed, Mohamed Saied Emam ; El Bansarkhani, Rachid ; Petzoldt, Albrecht :
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
ISC 2016 - The 19th Information Security Conference Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2016)

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes :
State Management for Hash-Based Signatures.
3rd International Conference on Research in Security Standardisation (SSR 2016) Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2016)

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie :
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Mariano, Artur ; Correia, Fabio ; Bischof, Christian :
A vectorized, cache efficient LLL implementation.
VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science
[Konferenz- oder Workshop-Beitrag], (2016)

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie :
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1st International Workshop on Innovations in Mobile Privacy and Security CEUR Workshop Proceedings
[Konferenz- oder Workshop-Beitrag], (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

Mariano, Artur ; Bischof, Christian :
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
PDP2016 Conference Publishing Services (CPS)
[Konferenz- oder Workshop-Beitrag], (2016)

Müller, Florian ; Günther, Sebastian ; Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Mühlhäuser, Max :
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems ACM New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2016)

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian :
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP.
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing in press
[Konferenz- oder Workshop-Beitrag], (2015)

Mineraud, Julien ; Lancerin, Federico ; Balasubramaniam, Sasitharan ; Conti, Mauro ; Tarkoma, Sasu :
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Konferenz- oder Workshop-Beitrag], (2015)

Meskanen, Tommi ; Ramezanian, Sara ; Liu, Jian ; Niemi, Valtteri :
Private Membership Test for Bloom Filters.
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Konferenz- oder Workshop-Beitrag], (2015)

Mitschke, Ralf ; Erdweg, Sebastian ; Köhler, Mirko ; Mezini, Mira ; Salvaneschi, Guido :
i3QL: Language-Integrated Live Data Views.
In: OOPSLA '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik :
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14 . USENIX Association
[Konferenz- oder Workshop-Beitrag], (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2014)

Mittelbach, Arno
Oswald, Elisabeth ; Nguyen, Arno Q. (eds.) :

Salvaging Indifferentiability in a Multi-stage Setting.
In: LNCS 8441 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Mühlbach, Sascha ; Koch, Andreas :
Malacoda: towards high-level compilation of network security applications on reconfigurable hardware.
In: ANCS '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Meziani, Mohammed :
SBS: A Fast and Secure Syndrome Based Stream Cipher.

[Anderes], (2012)

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis :
Improving the Performance of the SYND Stream Cipher.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Meziani, Mohammed ; El Bansarkhani, Rachid :
An Efficient and Secure Coding-based Authenticated Encryption.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

N

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric :
VisuFlow: a Debugging Environment for Static Analyses.
ICSE ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie :
Election-Dependent Security Evaluation of Internet Voting Schemes.
ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant round maliciously secure 2PC with function-independent preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

Nobach, Leonhard ; Rimac, I. ; Hilt, V. ; Hausheer, David :
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
2016 IEEE 24th International Conference on Network Protocols (ICNP) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Neumann, Stephan ; Volkamer, Melanie :
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco :
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications pp. 1-16.
[Artikel], (2016)

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric :
Jumping through hoops: why do Java developers struggle with cryptography APIs?
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Nyman, Thomas ; McGillion, Brian ; Asokan, N. :
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: Lecture Notes in Computer Science , 9229 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2015)

Nagy, Marcin ; Bui, Thanh ; Cristofaro, Emiliano De ; Asokan, Nadarajah ; Ott, Jorg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Nguyen, The An Binh ; Englert, Frank ; Farr, Simon ; Gottron, Christian ; Böhnstedt, Doreen ; Steinmetz, Ralf :
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian :
Pretty Understandable Democracy 2.0.
6th International Conference on Electronic Voting (EVOTE) TUT Press
[Konferenz- oder Workshop-Beitrag], (2014)

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) :

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science , 8650 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. :
Citizen Electronic Identities using {TPM} 2.0.
In: CoRR, abs/1409.1023
[Artikel], (2014)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, Nadarajah ; Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto :
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive: Report 2013/464, 2013.
[Konferenz- oder Workshop-Beitrag], (2013)

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (ed.) :

Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: LNCS (7932). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes :
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS (8128).
[Konferenz- oder Workshop-Beitrag], (2013)

Neumann, Stephan ; Volkamer, Melanie :
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012) , ICIMP 2012, The Seventh I ThinkMind Digital Library
[Konferenz- oder Workshop-Beitrag], (2012)

O

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves :
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: SEC'13 . USENIX Association
[Konferenz- oder Workshop-Beitrag], (2013)

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS) , 8068 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

P

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam :
A Practical Multivariate Blind Signature Scheme.
Financial Cryptography and Data Security 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2017)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable private set intersection based on ot extension.
In: Transactions on Privacy and Security (TOPS)
[Artikel], (2017)

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias :
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Pellegrino, Giancarlo ; Tschürtz, Constantin ; Bodden, Eric ; Rossow, Christian
Bos, Herbert ; Monrose, Fabian ; Blanc, Gregory (eds.) :

jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Lecture Notes in Computer Science 9404 . Springer Cham
[Konferenz- oder Workshop-Beitrag], (2015)

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai :
Design Principles for HFEv- based Signature Schemes.
In: LNCS (9452). Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas :
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris
[Konferenz- oder Workshop-Beitrag], (2015)

Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj :
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C
[Konferenz- oder Workshop-Beitrag], (2015)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private set intersection using permutation-based hashing.
24th USENIX Security Symposium (USENIX Security'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Pradel, Michael ; Schuh, Parker ; Sen, Koushik :
TypeDevil: dynamic type inconsistency analysis for JavaScript.
Proceedings of the 37th International Conference on Software Engineering IEEE Press
[Konferenz- oder Workshop-Beitrag], (2015)

Pradel, Michael ; Schuh, Parker ; Necula, George ; Sen, Koushik :
EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation.
In: OOPSLA '14 , 49 (10). ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster private set intersection based on OT extension.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Pradel, Michael ; Gross, Thomas R. :
Automatic testing of sequential and concurrent substitutability.
In: ICSE '13 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2013)

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Artikel], (2013)

Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan :
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012) IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Pradel, Michael ; Jaspan, Ciera ; Aldrich, Jonathan ; Gross, Thomas R. :
Statically checking API protocol conformance with mined multi-object specifications.
In: ICSE '12 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2012)

Pradel, Michael ; Gross, Thomas R. :
Leveraging test generation and specification mining for automated bug detection without false positives.
In: ICSE '12 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2012)

Piper, Thorsten ; Winter, Stefan ; Manns, Paul ; Suri, Neeraj :
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework.
In: DSN '12 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2012)

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten :
C4PS: colors for privacy settings.
Proceedings of the 21st international conference companion on World Wide Web ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan :
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
International Conference on Information Security (ISC 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten :
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Lecture Notes in Computer Science (7710). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

R

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan :
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation
[Artikel], (2017)

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie :
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4) pp. 400-415.
[Artikel], (2016)

Roth, Johannes :
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
TU Darmstadt
[Masterarbeit], (2016)

Riemann, Jan ; Khalilbeigi, Mohammadreza ; Schmitz, Martin ; Döweling, Sebastian ; Müller, Florian ; Mühlhäuser, Max :
FreeTop: Finding Free Spots for Projective Augmentation.
In: CHI EA'16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre :
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
COSADE 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Rasthofer, Siegfried ; Arzt, Steven ; Miltenberger, Marc ; Bodden, Eric :
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
Network and Distributed System Security Symposium 2016 Internet Society
[Konferenz- oder Workshop-Beitrag], (2016)

Riecker, Michael ; Yuan, Dingwen ; El Bansarkhani, Rachid ; Hollick, Matthias :
Patrolling wireless sensor networks: Randomized intrusion detection.
10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14
[Konferenz- oder Workshop-Beitrag], (2014)

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie :
Shake hands to bedevil: Securing email with wearable technology.
Proceedings of the eighth international symposium on human aspects of information security and assurance Lulu Press
[Konferenz- oder Workshop-Beitrag], (2014)

Roos, Stefanie ; Strufe, Thorsten :
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165
[Artikel], (2014)

Riecker, Michael ; Biedermann, Sebastian ; El Bansarkhani, Rachid ; Hollick, Matthias :
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security 2014 pp. 61-69.
[Artikel], (2014)

Rynkowski, Gregor :
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
TU Darmstadt
[Masterarbeit], (2013)

S

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos A. ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being.
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Singh, Govind :
o Static Bug Finders Identify API Misuses?
TU Darmstadt
[Masterarbeit], (2017)

Sarangdhar, Ravi :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
TU Darmstadt
[Masterarbeit], (2017)

Sitnikov, Konstantin :
A Survey on Post-Quantum Key Exchange.
TU Darmstadt
[Masterarbeit], (2017)

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias :
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
Proceedings of the 11th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Shulman, Haya ; Waidner, Michael :
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)
[Konferenz- oder Workshop-Beitrag], (2017)

Schurig, Sebastian :
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
TU Darmstadt
[Masterarbeit], (2017)

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Institute of Electrical and Electronics Engineers (IEEE)
[Konferenz- oder Workshop-Beitrag], (2017)

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS (10493). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Sang, Bo ; Petri, Gustavo ; Ardekani, Masoud Saeida ; Ravi, Srivatsan ; Eugster, Patrick :
Programming Scalable Cloud Services with AEON.
Middleware '16 Proceedings of the 17th International Middleware Conference ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Konferenz- oder Workshop-Beitrag], (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Konferenz- oder Workshop-Beitrag], (2016)

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (eds.) :

Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS) , 9813 . Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Späth, Johannes ; Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric :
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
30th European Conference on Object-Oriented Programming (ECOOP 2016) Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
[Konferenz- oder Workshop-Beitrag], (2016)

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias :
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016
[Artikel], (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Schmitz, Martin ; Leister, Andreas ; Dezfuli, Niloofar ; Riemann, Jan ; Müller, Florian ; Mühlhäuser, Max :
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion.
In: CHI EA'16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Selakovic, Marija ; Pradel, Michael :
Performance issues and optimizations in JavaScript: an empirical study.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM Association for Computing Machinery
[Konferenz- oder Workshop-Beitrag], (2016)

Salvaneschi, Guido ; Mezini, Mira :
Debugging for reactive programming.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Strenzke, Falko :
An Analysis of OpenSSL's Random Number Generator.
In: Lecture Notes in Computer Science 9665 (35). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Shulman, Haya ; Waidner, Michael :
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In Traffic Monitoring and Analysis (TMA)
[Konferenz- oder Workshop-Beitrag], (2016)

Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario :
New Horizons for a Data-Driven Economy.
In: Keine Angabe Springer , pp. 119-141. ISBN 978-3-319-21568-6
[Buchkapitel], (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
CT-RSA - Cryptographers' Track at the RSA Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Saissi, Habib ; Bokor, Peter ; Suri, Neeraj :
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan :
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: TrustED
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security (16) p. 14.
[Artikel], (2015)

Shulman, Haya ; Waidner, Michael
Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (eds.) :

DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: Lecture Notes in Computer Science 9326 , 1 . Springer-Verlag New York, Inc.
[Konferenz- oder Workshop-Beitrag], (2015)

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
IEEE Conference on Communications and Network Security 2015 (CNS)
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
Towards Security of Internet's Naming Infrastructure.
Computer Security ESORICS
[Konferenz- oder Workshop-Beitrag], (2015)

Schäfer, Marcel ; Mair, Sebastian ; Berchtold, Waldemar ; Steinebach, Martin :
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia :
Tor Experimentation Tools.
International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja :
Ask The Experts: Cybersecurity.

[Report], (2015)

Schreiner, Steffen :
A Security Architecture for e-Science Grid Computing.
TU Darmstadt
[Dissertation]

Shirazi, Fatemeh ; Volkamer, Melanie :
What Deters Jane from Preventing Identification and Tracking on the Web?
13th ACM Workshop on Privacy in the Electronic Society (WPES 2014) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya ; Ezra, Shiran :
Poster: On the Resilience of DNS Infrastructure.
ACM Conference on Computer and Communications Security (ACM CCS) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Stopczynski, Martin ; Zugelder, Michael :
Reducing User Tracking through Automatic Web Site State Isolations.
In: Lecture Notes in Computer Science , 8783 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Germanus, Daniel ; Roos, Stefanie ; Strufe, Thorsten :
Mitigating Eclipse Attacks in Peer-to-Peer Networks.
In Proceedings of IEEE Conference on Communications and Network Security (CNS)
[Konferenz- oder Workshop-Beitrag], (2014)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar :
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: ARES '14 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Vateva-Gurova, Tsvetoslava ; Luna, Jesus ; Pellegrino, Giancarlo :
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT)
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Lanzaro, Anna ; Natella, Roberto ; Winter, Stefan ; Cotroneo, Domenico :
An Empirical Study of Injected versus Actual Interface Errors.
Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA)
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Matthias ; Schneider, Thomas :
Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Schmachtenberg, Max ; Strufe, Thorsten ; Paulheim, Heiko :
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14)
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Markus ; Enzmann, Matthias ; Stopczynski, Martin :
Web-Tracking-Report 2014.

[Report], (2014)

Sahami Shirazi, Alireza ; Abdelrahman, Yomna ; Henze, Niels ; Schneegass, Stefan ; Khalilbeigi, Mohammadreza ; Schmidt, Albrecht :
Exploiting thermal reflection for interactive systems.
Proceedings of the 32nd annual ACM conference on Human factors in computing systems
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Taha, Ahmed ; Trapero, Ruben ; Luna, Jesus :
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14)
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya ; Waidner, Michael :
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
International Conference on Applied Cryptography and Network Security (ACNS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar :
Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security
[Konferenz- oder Workshop-Beitrag], (2014)

Schaller, André ; Arul, Tolga ; van der Leest, Vincent ; Katzenbeisser, Stefan :
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
International Conference on Trust & Trustworthy Computing ( TRUST)
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya :
Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society
[Konferenz- oder Workshop-Beitrag], (2014)

Stephen, Julian James ; Eugster, Patrick
Eyers, David ; Schwan, Karsten (eds.) :

Assured Cloud-Based Data Analysis with ClusterBFT.
In: Lecture Notes in Computer Science (8275). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Konferenz- oder Workshop-Beitrag], (2013)

Simo-Fhom, Hervais :
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
[Artikel], (2013)

Strenzke, Falko :
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: LNCS (7932). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin :
Smashing WEP in a Passive Attack.
20th International Workshop on Fast Software Encryption (FSE)
[Konferenz- oder Workshop-Beitrag], (2013)

Schneider, Michael :
Sieving for Shortest Vectors in Ideal Lattices.
Africa Crypt 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes :
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
[Artikel], (2013)

Strenzke, Falko :
Efficiency and Implementation Security of Code-based Cryptosystems.
TU Darmstadt
[Dissertation]

Stopczynski, Martin ; Ghiglieri, Marco :
Smart Home Dashboard – Das intelligente Energiemanagement.
VDE KONGRESS 2012 Smart Grid VDE Verlag GmbH
[Konferenz- oder Workshop-Beitrag], (2012)

Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes :
A Grid security architecture for AliEn.
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Ständer, Marcus :
Massively distributed authorship of academic papers.
In: CHI EA '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza :
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
ACM/IEEE Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2012)

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes :
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Artikel], (2012)

Schmidt, Axel :
Enabling Secure Online Elections with the Voting Service Provider.
TU Darmstadt
[Dissertation]

T

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, K. :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Trautmann, Nils ; Hauke, Philipp :
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: PHYSICAL REVIEW A, 97 023606.
[Artikel], (2018)

Traverso, Giulia ; Cordero, Carlos Garcia ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST)
[Konferenz- oder Workshop-Beitrag], (2017)

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. :
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2017)

Toteva, Iva :
Advancing Tool Support for the Detection of Side-Channel.
TU Darmstadt
[Masterarbeit], (2017)

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen :
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters
[Artikel], (2017)

Tundis, Andrea ; Cordero, Carlos Garcia ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max :
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
ICCPS 2017: 19th International Conference on Cyber-Physical Systems WASET
[Konferenz- oder Workshop-Beitrag], (2017)

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd :
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A p. 8.
[Artikel], (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes :
Dynamic and Verifiable Hierarchical Secret Sharing.
9th International Conference on Information Theoretic Security - ICITS 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes:
Homomorphic Signature Schemes - A survey.
SpringerBriefs in Computer Science. Springer ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8
[Buch], (2016)

Taha, Ahmed ; Metzler, Patrick ; Trapero, Ruben ; Luna, Jesus ; Suri, Neeraj :
Identifying and Utilizing Dependencies Across Cloud Security Services.
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Trautmann, Nils ; Hauke, Philipp :
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics (18) 043029.
[Artikel], (2016)

Trautmann, Nils ; Alber, Gernot :
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A p. 9.
[Artikel], (2016)

Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le :
Formal Accountability for Biometric Surveillance: A Case Study.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai :
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications (35) pp. 352-368.
[Artikel], (2015)

Tamrakar, Sandeep ; Ekberg, Jan-Erik ; Laitinen, Pekka :
On Rehoming the Electronic Id to TEEs.
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Konferenz- oder Workshop-Beitrag], (2015)

Tancreti, Matthew ; Sundaram, Vinaitheerthan ; Bagchi, Saurabh ; Eugster, Patrick :
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks.
In: IPSN '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. :
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: PHYSICAL REVIEW LETTERS, APS p. 173601.
[Artikel], (2015)

Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. :
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: PHYSICAL REVIEW A 90 063814.
[Artikel], (2014)

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. :
Security analysis of a widely deployed locking system.
In:
[Artikel], (2013)

Tasharofi, Samira ; Pradel, Michael ; Lin, Yu ; Johnson, Ralph :
Bita: Coverage-Guided, Automatic Testing of Actor Programs.
2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Tews, Erik :
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.

[Report], (2013)

Tse, Edward ; Marentette, Lynn ; Ahmed, Syed Ishtiaque ; Thayer, Alex ; Huber, Jochen ; Kim, Si Jung ; Brown, Quincy ; Mühlhäuser, Max :
Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy.
CHI ’12: Proceedings of the 30th International Conference on Human Factors in Computing Systems ACM
[Konferenz- oder Workshop-Beitrag], (2012)

U

Ulmer, Alex ; Kohlhammer, Jörn ; Shulman, Haya :
Towards Enhancing the Visual Analysis of Interdomain Routing.
VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
[Konferenz- oder Workshop-Beitrag], (2017)

V

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra :
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71 pp. 100-113.
[Artikel], (2017)

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max :
LoT: a Reputation-based Trust System for Long-term Archiving.
SECURWARE 2016 Thinkmind Digital Library
[Konferenz- oder Workshop-Beitrag], (2016)

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max :
Rating Decomposition with Conjoint Analysis and Machine Learning.
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA
[Konferenz- oder Workshop-Beitrag], (2015)

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander :
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50 pp. 16-32.
[Artikel], (2015)

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes :
An efficient time-stamping solution for long-term digital archiving.
IEEE 33rd International Performance Computing and Communications Conference (IPCCC)
[Konferenz- oder Workshop-Beitrag], (2014)

Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes :
A performance analysis of long-term archiving techniques.
IEEE - High Performace Computing and Communications (HPCC 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes :
Assessing Trust in the Long-Term Protection of Documents.
18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Vigil, Martín ; Custódio, Ricardo Felipe :
Cleaning up the PKI for Long-term Signatures.
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security Brazilian Computer Society
[Konferenz- oder Workshop-Beitrag], (2012)

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes :
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
[Artikel], (2012)

W

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit], (2017)

Whitefield, Jorden ; Chen, Liqun ; Kargl, Frank ; Paverd, Andrew ; Schneider, Steve ; Treharne, Helen ; Wesemeyer, Stephan :
Formal Analysis of V2X Revocation Protocols.
Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings
[Konferenz- oder Workshop-Beitrag], (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
ASIA CCS 2017 - ACM Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Wunderer, Thomas :
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.

[Anderes], (2016)

Wang, Weihang ; Zheng, Yunhui ; Xing, Xinyu ; Kwon, Yonghwi ; Zhang, Xiangyu ; Eugster, Patrick :
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Wang, Lin ; Jiao, Lei ; Kliazovich, Dzmitry ; Bouvry, Pascal :
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds.
2016 IEEE 24th International Conference on Network Protocols (ICNP) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Weinert, Christian :
Building a Modular Long-Term Archiving System.
TU Darmstadt
[Masterarbeit], (2016)

Wang, Weihang ; Zheng, Yunhui ; Liu, Peng ; Xu, Lei ; Zhang, Xiangyu ; Eugster, Patrick :
ARROW: automated repair of races on client-side web pages.
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Waidner, Michael ; Kasper, Michael :
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
DATE 2016 (Design, Automation and Test in Europe)
[Konferenz- oder Workshop-Beitrag], (2016)

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie:
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance
[Buch], (2015)

Wilk, Stefan ; Schönherr, Sophie ; Stohr, Denny ; Effelsberg, Wolfgang :
EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System.
In: TVX '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Winter, Stefan ; Piper, Thorsten ; Schwahn, Oliver ; Natella, Roberto ; Suri, Neeraj ; Cotroneo, Domenico :
GRINDER: On Reusability of Fault Injection Tools.
Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz
[Konferenz- oder Workshop-Beitrag], (2015)

Waidner, Michael :
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.

[Report], (2015)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Buch], (2014)

Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz :
EP 2639997 - Method and system for secure access of a first computer to a second computer.

[Norm, Patent, Standard], (2014)

Weinert, Christian :
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
TU Darmstadt
[Masterarbeit], (2013)

Wachsmann, Christian :
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
[Dissertation]

Winter, Stefan ; Tretter, Michael ; Sattler, Benjamin ; Suri, Neeraj :
simFI: From Single to Simultaneous Software Fault Injections.
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Wälde, Julian :
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
TU Darmstadt
[Masterarbeit], (2013)

Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes :
Instantiating Treeless Signature Schemes.

[Anderes], (2013)

Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe :
A User-Centric Digital Signature Scheme.
EuroPKI 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Walter, Michael :
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
TU Darmstadt
[Masterarbeit], (2012)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications. Springer , pp. 429-449.
[Buchkapitel], (2012)

Y

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit], (2017)

Yu, Tingting ; Pradel, Michael :
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks.
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Z

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
2017 International Conference On Computer Aided Design (ICCAD'17)
[Konferenz- oder Workshop-Beitrag], (2017)

Zimmermann, Verena ; Henhapl, Birgit ; Gerber, Nina ; Enzmann, Matthias
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) :

Promoting secure Email communication and authentication.
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2017)

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit :
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41 pp. 308-313.
[Artikel], (2017)

Zheng, Yao ; Schulz, Matthias ; Lou, Wenjing ; Hou, Thomas ; Hollick, Matthias :
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
[Artikel], (2016)

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür :
Authenticated Key Exchange from Ideal Lattices.
EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Zöller, Sebastian ; Reinhardt, Andreas ; Wachtel, Markus ; Steinmetz, Ralf :
Integrating Wireless Sensor Nodes and Smartphones for Energy - Efficient Data Exchange in Smart Environments.
In: PERCOM Workshops . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Diese Liste wurde am Sun May 20 02:29:54 2018 CEST generiert.