TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z | Á
Number of items at this level (without sub-levels): 1350.

A

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Maffei, Matteo ; Moreno-Sanchez, Pedro (2021):
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020):
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1), Association for Computing Machinery, ISSN 2471-2566,
DOI: 10.1145/3406112,
[Article]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020):
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
pp. 332-341, ACM, 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), virtual Conference, 30.03.-03.04., ISBN 978-1-4503-6866-7,
DOI: 10.1145/3341105.3374020,
[Conference or Workshop Item]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
pp. 484-502, Springer, 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., ISBN 978-3-030-51279-8,
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
pp. 41-61, Springer, The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., ISBN 978-3-030-55303-6,
[Conference or Workshop Item]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Conference or Workshop Item]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories,
k.A., IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Conference or Workshop Item]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-23,
[Conference or Workshop Item]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018,
11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Conference or Workshop Item]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
pp. 49-54, ACM, IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, 2 (7), MDPI, DOI: 10.3390/cryptography2020007,
[Article]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3), MDPI, ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Article]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Master Thesis]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: arxiv, In: CoRR, abs/1801.05764, [Article]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. ; Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Article]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1. ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Article]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology,
Springer, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Conference or Workshop Item]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Master Thesis]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
pp. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Conference or Workshop Item]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Conference or Workshop Item]

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, pp. 546-553,
IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Conference or Workshop Item]

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, pp. 1217-1234,
USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Conference or Workshop Item]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session,
Berkeley, CA, USENIX Association, USENIX Security Symposium, Vancouver, Canada, August 16-18, 2017, [Conference or Workshop Item]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), pp. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Article]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), pp. 805-858. Springer, DOI: 10.1007/s00145-016-9236-6,
[Article]

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day, Nürnberg, Germany, 01.-02.06.2017, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615), pp. 1-37. International Association for Cryptologic Research (IACR), [Article]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing,
New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference or Workshop Item]

Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew (2017):
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
In: 13th IEEE International Conference on Advanced and Trusted Computing, pp. 414-422,
ISBN 9781509027705,
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES),
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arzt, Steven ; Bodden, Eric (2016):
StubDroid: automatic inference of precise data-flow summaries for the android framework.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 725-735,
ACM, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884816,
[Conference or Workshop Item]

Alber, Gernot ; Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, 672, IOP Publishing Ltd., ISSN 1742-6596,
DOI: 10.1088/1742-6596/672/1/012004,
[Article]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, p. 10,
Springer, Fes, Morocco, [Conference or Workshop Item]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, pp. 155-168,
Springer, Koper, Slovenia, [Conference or Workshop Item]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, pp. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Book Section]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]

Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko (2015):
Hybrid Monitors for Concurrent Noninterference.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), pp. 137-151,
IEEE Computer Society, Verona, Italy, ISBN 978-1-4673-7539-9,
DOI: 10.1109/CSF.2015.17,
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Bachelor Thesis]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master Thesis]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 430-454,
Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 673-701,
Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015):
Evaluation of User Feedback in Smart Home for Situational Context Identification.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 20-25,
IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8426-8,
DOI: 10.1109/PERCOMW.2015.7133987,
[Conference or Workshop Item]

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 942-953,
Scottsdale, AZ, USA, [Conference or Workshop Item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, 8712, In: Computer Security - ESORICS 2014, pp. 76-93, Springer International Publishing, ISBN 978-3-319-11202-2,
DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]

Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, pp. 288-298,
DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science, 8383, In: Public-Key Cryptography PKC 2014, pp. 556-573,
[Conference or Workshop Item]

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 9, San Rafael, Morgan & Claypool, ISBN 9781627050975,
DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013,
Seoul, Korea, [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013,
University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2), pp. 209-232. [Article]

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3,
[Article]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), pp. 234-251,
Springer, [Conference or Workshop Item]

B

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference or Workshop Item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020):
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020), virtual Conference, 19.-23.10., [Conference or Workshop Item]

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference or Workshop Item]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Report]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, p. 16. SpringerOpen, DOI: 10.1186/s13635-019-0099-x,
[Article]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, pp. 535-542,
Springer, Faro, Portugal, 12.-14.06.2019, DOI: 10.1007/978-3-030-22750-0_48,
[Conference or Workshop Item]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), pp. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André
Meyer-Aurich, A. (ed.) (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: Gesellschaft für Informatik: GI-Edition / Proceedings, 287, In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, pp. 25-30,
Bonn, Gesellschaft für Informatik, 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19.2.2019, ISBN 978-3-88579-681-7,
[Conference or Workshop Item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Article]

Bansarkhani, Rachid El (2019):
LARA - A Design Concept for Lattice-based Encryption.
pp. 377-395, FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Conference or Workshop Item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Conference or Workshop Item]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), pp. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]

Bansarkhani, Rachid El (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor Thesis]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium, [Conference or Workshop Item]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master Thesis]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, pp. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India,
Springer, [Conference or Workshop Item]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security,
Springer, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion,
Springer, [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, pp. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, pp. 12-13. [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), pp. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Article]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, pp. 651-681,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Book]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Springer, Auckland, New Zealand, [Conference or Workshop Item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Master Thesis]

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, pp. 118–134,
De Gruyter, Minneapolis, USA, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Billes, Marina ; Møller, Anders ; Pradel, Michael (2017):
Systematic Black-Box Analysis of Collaborative Web Applications.
In: PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, p. 708,
ACM New York, NY, USA, Barcelona, Spain, ISBN 978-1-4503-4988-8,
DOI: 10.1145/3062341.3062363,
[Conference or Workshop Item]

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference,
IEEE, Valencia Spain, [Conference or Workshop Item]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress,
SecuMedia Verlag, [Conference or Workshop Item]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, pp. 142-160,
Springer, Rabat, Morocco, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 461-468,
New York, ACM, ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Conference or Workshop Item]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
pp. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
pp. 15:1-15:8, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Conference or Workshop Item]

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security,
IEEE, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016,
Milan, Italy, [Conference or Workshop Item]

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 37-46,
ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelor Thesis]

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016,
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), pp. 1-28. International Association for Cryptologic Research (IACR), [Article]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography,
IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 1-13,
New York, ACM, ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, ISBN 978-1-4503-4944-4,
[Conference or Workshop Item]

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security,
ACM, Xi'an, China, [Conference or Workshop Item]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography,
ACM, Xi'an, China, [Conference or Workshop Item]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
In: SpringerBriefs in Computer Science, Cham, Springer International Publishing - Springer, ISBN 978-3-319-53797-9,
[Book]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016,
Springer, Fes, Morocco, [Conference or Workshop Item]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, p. 24,
Springer, Taipei, Taiwan, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Master Thesis]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias (2015):
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: ACSAC 2015, In: Using Channel State Information for Tamper Detection in the Internet of Things, pp. 131-140,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818028,
[Conference or Workshop Item]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, pp. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Buescher, Niklas ; Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15),
USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Dodis, Yevgeniy ; Nielsen, Arno Buus (eds.) (2015):
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Lecture Notes in Computer Science 9015, In: Theory of Cryptography. TCC 2015., pp. 428-455,
Springer, Warsaw, Poland, ISBN 978-3-662-46497-7,
DOI: 10.1007/978-3-662-46497-7_17,
[Conference or Workshop Item]

Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf (2015):
A Concept for a C2X-based Crossroad Assistant.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 360-364,
IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8425-1,
DOI: 10.1109/PERCOMW.2015.7134063,
[Conference or Workshop Item]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p. 20,
Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20. [Article]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13. [Article]

Butin, Denis ; Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015),
IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015),
Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS),
[Conference or Workshop Item]

Brzuska, Christina ; Mittelbach, Arno
Sarkar, Palash ; Iwata, Tetsu (eds.) (2014):
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Lecture Notes in Computer Science, 2, In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., pp. 142-161, Berlin, Heidelberg, Springer, ISBN 978-3-662-45607-1,
DOI: 10.1007/978-3-662-45608-8_8,
[Book Section]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14, In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 6-15,
ACM, New Orleans, Louisiana, USA, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference or Workshop Item]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Conference or Workshop Item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Conference or Workshop Item]

Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, pp. 67-80,
Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1415-1426,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, pp. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Garay, Arno A. ; Gennaro, Rosario (eds.) (2014):
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Lecture Notes in Computer Science 8616, 1, In: Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., pp. 188-205,
Springer, Santa Barbara, CA, USA, ISBN 978-3-662-44370-5,
DOI: 10.1007/978-3-662-44371-2_11,
[Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3), pp. 459-478. DOI: 10.1007/s10623-012-9747-6,
[Article]

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pp. 187-198,
ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014). [Article]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, pp. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference or Workshop Item]

Brzuska, Christina ; Mittelbach, Arno (2014):
Using Indistinguishability Obfuscation via UCEs.
In: Lecture Notes in Computer Science, 2, In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., pp. 22-141, Berlin, Heidelberg, Springer, ISBN 978-3-662-45607-1,
DOI: 10.1007/978-3-662-45608-8,
[Book Section]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, pp. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), pp. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, pp. 168-171,
Bremen, [Conference or Workshop Item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, pp. 1819-1824,
ACM, [Conference or Workshop Item]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]

Bansarkhani, Rachid El ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, pp. 336-355,
Springer, Marrakesh, Morocco, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334,
[Conference or Workshop Item]

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014):
Scalable Offline Monitoring.
pp. 31-47, Heidelberg, Germany, Springer, Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37, pp. 720 - 725. ISSN 11,
DOI: 10.1007/s11623-013-0300-1,
[Article]

Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia (2013):
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
In: MobiCom'13, In: The 19th Annual International Conference on Mobile Computing and Networking, pp. 231-233,
ACM, Miami, FL, USA, ISBN 978-1-4503-1999-7/13/09,
DOI: 10.1145/2500423.2504583,
[Conference or Workshop Item]

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, pp. 31-46,
Springer Berlin Heidelberg, RHUL, Egham, UK, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hildebrandt, Mireille (ed.) (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013, pp. 139-164, Amsterdam, Iso Press, ISBN 978-1-61499-294-3 (print) ; 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book Section]

Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, pp. 1971-1984,
Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 48-67,
Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13),
USENIX, [Conference or Workshop Item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 752 - 766,
Koblenz, [Conference or Workshop Item]

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), pp. 291 - 296,
IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), pp. 198-207,
IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013),
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), pp. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, pp. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 347-359,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013):
Identification element-based authentication and identification with decentralised service use.
EP 2600270,
[Standards, patents]

Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt (2013):
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 8-13,
IEEE Computer Society, San Diego, CA, USA, ISBN 978-1-4673-5075-4,
DOI: 10.1109/PerComW.2013.6529448,
[Conference or Workshop Item]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242,
ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), pp. 4966-4976,
IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1), pp. 84-96. [Article]

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 402-417,
Springer, Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]

Braun, Johannes ; Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, pp. 600-605,
Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53, pp. 81-102. [Article]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: LNCS, In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), pp. 259-276,
Springer, Hangzhou, China, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, pp. 53-68,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012,
Birmingham, UK, [Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, pp. 1-5,
IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
Petcu, Dana ; Vazquez-Poletti, Jose Luis (eds.) (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing, pp. 151-177, New Castle upon Tyne, Cambridge Scholars Publishing, ISBN 978-1-44383-550-3,
[Book Section]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS, In: WISTP - Workshop in Information Security Theory and Practice 2012,
Springer, London, UK, [Conference or Workshop Item]

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen,
[Ph.D. Thesis]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013),
London, UK, [Conference or Workshop Item]

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1502-1507,
ACM, Trento, Italy, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), pp. 389-400,
ACM, DOI: 10.1145/2046707.2046753,
[Conference or Workshop Item]

C

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020):
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium, virtual Conference, August 12.–14.2020, [Conference or Workshop Item]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Other]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Conference or Workshop Item]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pp. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Master Thesis]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor Thesis]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Conference or Workshop Item]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Article]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), pp. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Other]

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 596-603,
Heraklion, Crete, Greece, [Conference or Workshop Item]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Other]

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), pp. 749-762. [Article]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), p. 8,
Florence, Italy, [Conference or Workshop Item]

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, p. 6,
Paris, France, [Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference or Workshop Item]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Conference or Workshop Item]

Culhane, William ; Jayaram, K. R. ; Eugster, Patrick (2014):
Fast, Expressive Top-k Matching.
In: Middleware '14, In: Proceedings of the 15th International Middleware Conference, pp. 73-84,
ACM, Bordeaux, France, ISBN 978-1-4503-2785-5,
DOI: 10.1145/2663165.2663326,
[Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
Darmstadt, Technische Universität, [Bachelor Thesis]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference or Workshop Item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014),
Glasgow, UK, [Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, pp. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference or Workshop Item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014),
Paris, France, [Conference or Workshop Item]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
Darmstadt, Technische Universität, [Master Thesis]

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107. [Article]

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164), pp. 1-20. International Association for Cryptologic Research (IACR), [Article]

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, pp. 359-368,
ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Cuong, N. ; Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), pp. 3-15,
Springer, [Conference or Workshop Item]

D

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Conference or Workshop Item]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Article]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Conference or Workshop Item]

Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020):
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-27.08., [Conference or Workshop Item]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
pp. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Conference or Workshop Item]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

De Oliveira Nunes, Ivan ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Conference or Workshop Item]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018,
Springer, Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master Thesis]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Master Thesis]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master Thesis]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Article]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
pp. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Conference or Workshop Item]

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelor Thesis]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Conference or Workshop Item]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Just-in-Time Static Analysis.
In: Proceedings of ISSTA ’17, p. 447,
ACM, Santa Barbara, California, United States, ISBN 978-1-4503-5076-1,
DOI: 10.1145/3092703.3092705,
[Conference or Workshop Item]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), pp. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Cheetah: Just-in-Time Taint Analysis for Android Apps.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 39-42,
Curran Associates, Inc., Buenos Aires, Argentina, ISBN 978-1-5386-1589-8,
DOI: 10.1109/ICSE-C.2017.20,
[Conference or Workshop Item]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems,
Uppsala, Sweden, [Conference or Workshop Item]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Darmstadt, Technische Universität, [Bachelor Thesis]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
pp. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052, In: Cryptology and Network Security. CANS 2016,
Springer, Cham, Milano, Italy, [Conference or Workshop Item]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016,
IEEE, Salzburg, Austria, [Conference or Workshop Item]

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas (2016):
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 88-97,
IEEE, Salzburg, Austria, ISBN 978-1-5090-0990-9/16,
DOI: 10.1109/ARES.2016.88,
[Conference or Workshop Item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Bachelor Thesis]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), pp. 637-657. Springer, ISSN 1615-5270,
[Article]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81), pp. 1-33. International Association for Cryptologic Research (IACR), [Article]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Conference or Workshop Item]

Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
Andy, Gill (ed.) (2015):
Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: OOPSLA 2015, 50, In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 607-622,
ACM, Pittsburgh, PA, USA, ISBN 978-1-4503-3689-5,
DOI: 10.1145/2814270.2814290,
[Conference or Workshop Item]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197-1210,
ACM, Denver, Colorado, USA, [Conference or Workshop Item]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20, pp. 13-28. DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), pp. 2665-2670,
IEEE, First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
Darmstadt, Technische Universität, [Diploma Thesis or Magisterarbeit]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Conference or Workshop Item]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014):
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
24th International Conference on Field Programmable Logic and Applications (FPL), München, Deutschland, 2014, [Conference or Workshop Item]

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, pp. 76-87,
Springer, Waterloo, Canada, [Conference or Workshop Item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS, In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, pp. 161-172,
Springer, Istanbul, Turkey, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA,
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
pp. 893-908, USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4), [Article]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf (2014):
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
In: PerCom Workshops 2014, In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp. 1-9,
IEEE, Budapest, Hungary, ISBN 978-1-4799-2737-1,
DOI: 10.1109/PerComW.2014.6815157,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014,
Marrakech, Morocco, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory,
Honolulu HI USA, [Conference or Workshop Item]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Lecture Notes in Computer Science, In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), pp. 1-25, Cham, Springer, ISBN 978-3-319-14054-4,
[Book Section]

Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko (2013):
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
In: CCS '13, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 285-298,
ACM, Berlin, Germany, ISBN 978-1-4503-2477-9,
DOI: 10.1145/2508859.2516750,
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: LNCS, In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, pp. 156-175,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013,
Bangalore, India, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi,
[Conference or Workshop Item]

Demirel, Denise ; Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Article]

Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012,
Bellevue, WA, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012),
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238,
Springer, [Conference or Workshop Item]

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012):
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2483-2488,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223823,
[Conference or Workshop Item]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

E

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 09.-13.05.2021, [Conference or Workshop Item]

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
pp. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Conference or Workshop Item]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor Thesis]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor Thesis]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Conference or Workshop Item]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017,
[Conference or Workshop Item]

Ermuth, Markus ; Pradel, Michael (2016):
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 82-93,
ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931053,
[Conference or Workshop Item]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. (2014):
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4), pp. 29-37. DOI: 10.1109/MSP.2014.38,
[Article]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

F

Fischlin, Marc ; Rohrbach, Felix (2021):
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 9.-13.05.2021, [Conference or Workshop Item]

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Conference or Workshop Item]

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Conference or Workshop Item]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2021):
Zero-Interaction Security-Towards Sound Experimental Validation. (Postprint)
In: GetMobile: Mobile Computing and Communications, 23 (2), Association for Computing Machinery (ACM), ISSN 2375-0529, e-ISSN 2375-0537,
DOI: 10.26083/tuprints-00018518,
[Article]

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020):
Information-Theoretic Security of Cryptographic Channels.
In: Information and Communications Security, pp. 295-311,
Springer Nature, 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-26.08.2021, ISBN 978-3-030-61078-4,
DOI: 10.1007/978-3-030-61078-4_17,
[Conference or Workshop Item]

Fischlin, Marc ; Harasser, Patrick ; Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Conference or Workshop Item]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), pp. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Article]

Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Article]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Master Thesis]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Article]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Master Thesis]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF),
IEEE, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, pp. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Conference or Workshop Item]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, pp. 202-220,
16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, [Conference or Workshop Item]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelor Thesis]

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS),
Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference or Workshop Item]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Conference or Workshop Item]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]

Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017),
IEEE, Paris, France, [Conference or Workshop Item]

Fojtik, Roman (2016):
Salt Synchronization Service.
Darmstadt, Technische Universität, [Bachelor Thesis]

Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro (2016):
Capture and Replay: Reproducible Network Experiments in Mininet.
In: SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, pp. 621-622,
ACM, Florianopolis, Brazil, ISBN 978-1-4503-4193-6,
DOI: 10.1145/2934872.2959076,
[Conference or Workshop Item]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Conference or Workshop Item]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016),
IEEE, San Jose, California, USA, [Conference or Workshop Item]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
Darmstadt, Technische Universität, [Master Thesis]

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062322,
[Article]

Fischlin, Marc ; Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: WPES '15, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pp. 55-64,
ACM, Denver, Colorado, USA, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Conference or Workshop Item]

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28.-30. Sept. 2015, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, pp. 545-564,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, 48 (2), IOP Publishing Ltd., ISSN 0953-4075,
DOI: 10.1088/0953-4075/48/2/025501,
[Article]

Fehr, Victoria ; Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015, p. 765. [Article]

Fischlin, Marc ; Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p. 12,
ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, pp. 191-205,
Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1401-1414,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
8409, In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, pp. 244-249,
[Conference or Workshop Item]

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
27, In: J. Cryptology, pp. 397-428,
DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]

Felzer, Torsten ; Rinderknecht, Stephan (2013):
Mouse mode of OnScreenDualScribe: Three types of keyboard-driven mouse replacement.
In: CHI '13 Extended Abstracts on Human Factors in Computing Systems, pp. 1593-1598, ACM Press, ISBN 978-1-4503-1952-2,
DOI: 10.1145/2468356.2468641,
[Book Section]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013,
Bergen (Norway), [Conference or Workshop Item]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

Fehr, Victoria (2012):
Sophisticated Public-Key Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

G

Glanz, Leonid ; Müller, Patrick ; Baumgärtner, Lars ; Reif, Michael ; Anthonysamy, Pauline ; Mezini, Mira (2020):
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 694-707,
ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10, ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384745,
[Conference or Workshop Item]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference or Workshop Item]

Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer, Hamburg, Germany, 8. bis 11. September 2019, ISBN 978-1-4503-7198-8,
DOI: 10.1145/3340764.3340782,
[Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Article]

Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Conference or Workshop Item]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Conference or Workshop Item]

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: Information Security and Cryptology- ICISC 2018, pp. 269-286,
Springer Nature, 21st Annual International Conference on Information Security and Cryptology, Seoul, Korean, 28.-30.11.2018, ISBN 978-3-030-12145-7,
DOI: 10.1007/978-3-030-12146-4_17,
[Conference or Workshop Item]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor Thesis]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference or Workshop Item]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018,
Songdo, Incheon, Korea, The Sixth International Workshop on Security in Cloud Computing (SCC), [Conference or Workshop Item]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelor Thesis]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, pp. 117-118, Gesellschaft für Informatik, [Book Section]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11), pp. 680-685. [Article]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, pp. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Conference or Workshop Item]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, UK, 04.-07.12., [Conference or Workshop Item]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 638-648,
Paderborn, Germany, Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, pp. 279-287,
Gesellschaft für Informatik, Regensburg, Germany, DOI: 10.18420/muc2017-ws05-0405,
[Conference or Workshop Item]

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
[Conference or Workshop Item]

Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. (2017):
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
In: CHI'17 CHI Conference on Human Factors in Computing Systems, pp. 3293-3316,
ACM, Denver, CO, USA, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025808,
[Conference or Workshop Item]

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques,
Springer, [Conference or Workshop Item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), pp. 281-297. Springer, ISSN 1615-5270,
[Article]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
pp. 18-34, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
pp. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 317 - 324,
IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, [Conference or Workshop Item]

Ghiglieri, Marco ; Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, pp. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3), pp. pp. 61-67. [Article]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal,
[Conference or Workshop Item]

Gong, Liang ; Pradel, Michael ; Sen, Koushik (2015):
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: ESEC/FSE 2015, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 357-368,
ACM, Bergamo, Italy, ISBN 978-1-4503-3675-8,
DOI: 10.1145/2786805.2786831,
[Conference or Workshop Item]

Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik (2015):
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: ISSTA 2015, In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 94-105,
ACM, Baltimore, MD, USA, ISBN 978-1-4503-3620-8,
DOI: 10.1145/2771783.2771809,
[Conference or Workshop Item]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), pp. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference or Workshop Item]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,
[Article]

Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2), pp. 108 - 113. DOI: 10.1007/s11623-015-0375-y,
[Article]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC,
Las Vegas, NV, [Conference or Workshop Item]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Conference or Workshop Item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), pp. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien,
[Conference or Workshop Item]

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS, In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, pp. 48-63,
Springer, Florianópolis, Brazil, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy, San Jose, California, 18.5.2014, [Conference or Workshop Item]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]

Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
In: Computer Security Symposium 2013, pp. 518-525,
Tokyo, Jōhō Shori Gakkai, Computer Security Symposium 2013, Kagawa, Japan, 21-23 October, 2013, [Conference or Workshop Item]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
Darmstadt, Technische Universität, [Bachelor Thesis]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), pp. 471 - 480,
IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference or Workshop Item]

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), pp. 512-529,
Springer, Leuven, Belgium, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 516-518,
Lugano, Switzerland, ISBN 978-1-4673-0905-9,
DOI: 10.1109/PerComW.2012.6197553,
[Conference or Workshop Item]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Darmstadt, Technische Universität, [Bachelor Thesis]

H

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium, virtual Conference, 11.-13.08.2021, [Conference or Workshop Item]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021):
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
In: WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 374-376,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468251,
[Conference or Workshop Item]

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
In: WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 371-373,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468252,
[Conference or Workshop Item]

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, pp. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Conference or Workshop Item]

Haase, Thorsten ; Alber, Gernot ; Stojanovic, Vladimir M. (2021):
Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems.
In: Physical Review A, 103 (3), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.032427,
[Article]

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]

Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021):
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3), pp. 227-245. Sciendo, e-ISSN 2299-0984,
DOI: 10.2478/popets-2021-0045,
[Article]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy. (Postprint)
In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20),
New York, NY, Association for Computing Machinery (ACM), WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Österreich, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.26083/tuprints-00017839,
[Conference or Workshop Item]

Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021), virtual Conference, 12.-16.07.2021, [Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
pp. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Conference or Workshop Item]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Conference or Workshop Item]

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Conference or Workshop Item]

Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020):
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
In: WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 306-316,
ACM, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006,
DOI: 10.1145/3395351.3399423,
[Conference or Workshop Item]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
In: Proceedings of the 13th ACM Conference onSecurity and Privacy in Wireless and MobileNetworks, pp. 331-333,
ACM, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3401796,
[Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
pp. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Conference or Workshop Item]

Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
GITO, 15th International Conference on Wirtschaftsinformatik (WI2020), Potsdam, Germany, 08.-11.03.2020, DOI: 10.30844/wi_2020_o2-haunschild,
[Conference or Workshop Item]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]

Heidt, Margareta ; Gerlach, Jin ; Buxmann, Peter (2019):
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
Hawaii International Conference on System Sciences (HICSS), Wailea, USA, 08.-11.01.2019, [Conference or Workshop Item]

Heidt, Margareta ; Olt, Christian M. ; Buxmann, Peter (2019):
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
Internationale Tagung Wirtschaftsinformatik, Siegen, Deutschland, 24.02.2019-27.02.2019, [Conference or Workshop Item]

Hartwig, Katrin ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Hartwig, Katrin ; Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Heidt, Margareta ; Gerlach, Jin (2018):
The Influence of SME Constraints in an Organizational IT Security Context.
San Francisco, USA, International Conference on Information Systems (ICIS), San Francisco, USA, 13.-16.12.2018, [Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Conference or Workshop Item]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelor Thesis]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Master Thesis]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master Thesis]

Heidt, Margareta (2018):
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress], [Article]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Master Thesis]

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017,
Karlstad, Sweden, [Conference or Workshop Item]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Auckland, New Zealand, [Conference or Workshop Item]

Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2, In: 2017 IEEE Symposium on Security and Privacy (SP 2017), pp. 1.109,
Curran Associates, Inc, San Jose, CA, USA, ISBN 978-1-5090-5534-0,
[Conference or Workshop Item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master Thesis]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW),
Vienna, Austria, [Conference or Workshop Item]

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala,
ACM, [Conference or Workshop Item]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelor Thesis]

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy,
Melbourne, Australia, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO,
[Conference or Workshop Item]

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES),
Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, pp. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), pp. 1-10,
ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19), pp. 80-84. [Article]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC, In: 30th Annual Computer Security Applications Conference, pp. 356-365,
New Orleans, LA, USA, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC),
ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014):
SAML Privacy-Enhancing Profile.
In: LNI, P-237, In: Open Identity Summit 2014, pp. 11-22,
GI, Stuttgart, Germany, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11), pp. 2185-2200. DOI: 10.1002/sec.748,
[Article]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014,
Berlin, Germany, [Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014):
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4), pp. 237-241. DOI: 10.1007/s11623-014-0098-5,
[Article]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158. [Article]

Herzberg, Amir ; Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: ARES 2013, In: 2013 International Conference on Availability, Reliability and Security, pp. 236-241,
IEEE Computer Society, Regensburg, Germany, DOI: 10.1109/ARES.2013.138,
[Conference or Workshop Item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 459-468,
IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]

Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 565-576,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 391-403,
SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference or Workshop Item]

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: LNCS, In: MoCrySEn 2013, pp. 194-208, Springer, [Book Section]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
pp. 1963-1965, ACM, Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13), Coimbra, Portugal, March 2013, ISBN 978-1-4503-1656-9,
DOI: 10.1145/2480362.2480727,
[Conference or Workshop Item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), pp. 772-783,
ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: LNCS, In: SAC2012 - Conference on Selected Areas in Cryptography, pp. 66-80,
Springer Berlin Heidelberg, Windsor, Canada, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Henß, Stefan ; Monperrus, Martin ; Mezini, Mira (2012):
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
In: ICSE '12, In: Proceedings of the 34th International Conference on Software Engineering, pp. 793-803,
IEEE Press, Zurich, Switzerland, ISBN 978-1-4673-1067-3,
[Conference or Workshop Item]

Hauke, Sascha ; Volk, Florian ; Habib, Sheikh Mahbub ; Mühlhäuser, Max
Dimitrakos, Theo ; Moona, Rajat ; Patel, Dhiren ; McKnight, D. Harrison (eds.) (2012):
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models.
pp. 158-173, Springer, Proceedings of the 6th International Conference on Trust Management (IFIPTM 2012), Surat, India, 21.-25.05., ISBN 978-3-642-29851-6,
DOI: 10.1007/978-3-642-29852-3_11,
[Conference or Workshop Item]

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max (2012):
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2513-2518,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223828,
[Conference or Workshop Item]

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max (2012):
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 1897-1900,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1015-4,
DOI: 10.1145/2208276.2208328,
[Conference or Workshop Item]

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389,
Springer, [Conference or Workshop Item]

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit,
Darmstadt, [Conference or Workshop Item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September,
[Conference or Workshop Item]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Darmstadt, Technische Universität, [Master Thesis]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011):
Towards a Trust Management System for Cloud Computing.
In: Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933-939,
IEEE, 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16.-18.11.2011, ISBN 978-1-4577-2135-9,
DOI: 10.1109/TrustCom.2011.129,
[Conference or Workshop Item]

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
In: MobiSys PhD Forum '18, pp. 1-2, New York, NY, USA, ACM, Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor Thesis]

J

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Article]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19),
[Conference or Workshop Item]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), pp. 3-22,
Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Conference or Workshop Item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Darmstadt, Technische Universität, [Master Thesis]

Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Jayalath, Chamikara ; Stephen, Julian James ; Eugster, Patrick (2013):
Atmosphere: A Universal Cross-Cloud Communication Infrastructure.
In: Lecture Notes in Computer Science, In: Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Beijing, China. December 2013. Proceedings., pp. 163-182,
Springer, Beijing, China, ISBN 978-3-642-45064-8,
DOI: 10.1007/978-3-642-45065-5_9,
[Conference or Workshop Item]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec,
ACM, [Conference or Workshop Item]

K

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08.07.2021, [Conference or Workshop Item]

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Privacy - Preserving Clustering.
In: crypto day matters : Beiträge vom 32. Kryptotag,
Gesellschaft für Informatik e.V. / FG KRYPTO, 32. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik, virtual Conference, 15.01.2021, DOI: 10.18420/cdm-2021-32-42,
[Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Nina ; Hilt, Annika ; Volkamer, Melanie (2020):
Has the GDPR hype affected users’ reaction to cookie disclaimers?
In: Journal of Cybersecurity, 6 (1), Oxford Academic, ISSN 2057-2085,
DOI: 10.1093/cybsec/tyaa022,
[Article]

Kaufhold, Marc-André ; Haunschild, Jasmin ; Reuter, Christian (2020):
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
In: Proceedings of the 28th European Conference on Information Systems (ECIS),
AIS, 28th European Conference on Information Systems, Marrakech, Morocco, 15.-17.06.2020, ISBN 978-1-7336325-1-5,
[Conference or Workshop Item]

Krämer, Juliane ; Struck, Patrick (2020):
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020), Lugano, Switzerland, 05.-07.10.2020, [Conference or Workshop Item]

Krämer, Juliane ; Struck, Patrick (2020):
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020), virtual Conference, 21.-23.09.2020, [Conference or Workshop Item]

Kaufhold, Marc-André ; Bayer, Markus ; Reuter, Christian (2020):
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, 57 (1), Elsevier ScienceDirect, ISSN 0306-4573,
DOI: 10.1016/j.ipm.2019.102132,
[Article]

Krüger, Stefan ; Ali, Karim ; Bodden, Eric (2020):
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.
International Symposium on Code Generation and Optimization, San Diego, CA, USA, February 22.-26., 2020, [Conference or Workshop Item]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Conference or Workshop Item]

Krämer, Juliane ; Struck, Patrick (2020):
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020), virtual Conference, 13.-16.12., [Conference or Workshop Item]

Krämer, Juliane ; Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security,
ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.-29.08.2019, ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Conference or Workshop Item]

Köhler, Mirco ; Salvaneschi, Guido (2019):
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering, San Diego, Ca, USA, November 10.-15.,2019, DOI: 10.1109/ASE.2019.00082,
[Conference or Workshop Item]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2019):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: IEEE Transactions on Software Engineering, 2019, Institute of Electrical and Electronics Engineers, ISSN 1939-3520,
DOI: 10.1109/TSE.2019.2948910,
[Article]

Krämer, Juliane (2019):
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5), pp. 343-344. Springer Heidelberg, ISSN 0170-6012,
DOI: 10.1007/s00287-019-01200-2,
[Article]

Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf
David, Klaus (ed.) (2019):
Resilience in Security and Crises through Adaptions and Transitions.
In: GI-Edition. Proceedings, 294, Bonn, Gesellschaft für Informatik e. V., 49. Jahrestagung der Gesellschaft für Informatik, Kassel, Germany, 23.-26. September 2019, ISBN 978-3-88579-688-6,
DOI: 10.18420/inf2019_ws60,
[Conference or Workshop Item]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Conference or Workshop Item]

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2, De Gruyter Open, [Article]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19),
SciTePress, [Conference or Workshop Item]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Conference or Workshop Item]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Conference or Workshop Item]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38, pp. 1-24. Taylor & Francis, DOI: 10.1080/0144929X.2019.1620334,
[Article]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Conference or Workshop Item]

Krüger, Stefan ; Hermann, Ben (2019):
Can an online service predict gender?: on the state-of-the-art in gender identification from texts.
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering, Montreal, Canada, May 27, 2019, DOI: 10.1109/GE.2019.00012,
[Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, pp. 1-11. [Article]

Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), pp. 66-70,
ACM, DOI: 10.1145/3267323.3268963,
[Conference or Workshop Item]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Master Thesis]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-22,
[Conference or Workshop Item]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Master Thesis]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
27. USENIX Security Symposium: USENIX Security'18 : Poster Session, Baltimore, MD, USA, August 15–17, 2018, [Conference or Workshop Item]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Master Thesis]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 329-342,
Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Conference or Workshop Item]

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: LNCS, 10815, pp. 168-188, Springer, 9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018), Singapore, 23.-24.04., ISBN 978-3-319-89640-3,
DOI: 10.1007/978-3-319-89641-0_10,
[Conference or Workshop Item]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), pp. 10:1-10:27,
Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Conference or Workshop Item]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Master Thesis]

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
pp. 309-312, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
pp. 579-586, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), pp. 1-19. DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
pp. accepted, Portsmouth, UK, Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, [Conference or Workshop Item]

Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), pp. 1-16. DOI: 10.1111/1468-5973.12249,
[Article]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
Darmstadt, Technische Universität, [Master Thesis]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Conference or Workshop Item]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelor Thesis]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops,
Springer, Oslo, Norway, [Conference or Workshop Item]

Karuppayah, Shankar ; Böck, Leon ; Grube, Tim ; Manickam, Selvakumar ; Mühlhäuser, Max ; Fischer, Mathias (2017):
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
In: International Conference on Availability, Reliability and Security (ARES), pp. 1-6,
New York, USA, ACM, Reggio Calabria, Italy, DOI: 10.1145/3098954.3098991,
[Conference or Workshop Item]

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security,
ACM, Reggio Calabria, Italy, [Conference or Workshop Item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569,
IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292, In: International Conference on Human-Computer Interaction (HCII), pp. 675-690,
Springer, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 75-86,
ACM, [Conference or Workshop Item]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), pp. 177-197. De Gruyter Open, DOI: 10.1515/popets-2017-0044,
[Article]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), pp. 24-29. DOI: 10.1109/MSP.2017.70,
[Article]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Denver, CO, USA, [Conference or Workshop Item]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM),
Atlanta, GA, USA, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, pp. 419-433,
Springer, [Conference or Workshop Item]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Article]

Kaufhold, Marc-André ; Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1), pp. 78-88. [Article]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Eibl, Maximilian ; Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
pp. 1325-1338, Bonn, INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), pp. 603-612,
Albi, France, ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, pp. 51-58,
Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0386,
[Conference or Workshop Item]

Kogan, Kirill ; Nikolenko, Sergey I. ; Eugster, Patrick ; Shalimov, Alexander ; Rottenstreich, Ori (2016):
FIB efficiency in distributed platforms.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1-10,
IEEE, Singapore, Singapore, DOI: 10.1109/ICNP.2016.7784452,
[Conference or Workshop Item]

Kohnhäuser, Florian ; Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), pp. 320-338,
Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference or Workshop Item]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, pp. 98 - 106,
IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, pp. 509--518,
Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, pp. 3-16,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Kiss, Ágnes ; Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, pp. 699-728,
Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Conference or Workshop Item]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, pp. 1-7,
IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference or Workshop Item]

Kogan, Kirill ; Menikkumbura, Danushka ; Petri, Gustavo ; Noh, Youngtae ; Nikolenko, Sergey I. ; Eugster, Patrick (2016):
BASEL (Buffer mAnagement SpEcification Language).
In: ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, pp. 69-74,
ACM, Santa Clara, CA, ISBN 978-1-4503-4183-7,
DOI: 10.1145/2881025.2881027,
[Conference or Workshop Item]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, pp. 209-233,
Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), pp. 181-196,
Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, pp. 57-73,
Springer, Bern, Switzerland, [Conference or Workshop Item]

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), pp. 3-21,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Conference or Workshop Item]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), pp. 181-190,
Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, pp. 224-229,
IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558), pp. 1-19. International Association for Cryptologic Research (IACR), [Article]

Krauß, Christoph ; Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39 (6), pp. 383-387. [Article]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, pp. 25-35,
Scottsdale, AZ, USA, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, pp. 1-10,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Kogan, Kirill ; Nikolenko, Sergey I. ; Rottenstreich, Ori ; Culhane, William ; Eugster, Patrick (2014):
SAX-PAC (scalable and expressive packet classification).
In: SIGCOMM '14, 44, In: Proceedings of the 2014 ACM conference on SIGCOMM, pp. 15-26,
ACM, ACM SIGCOMM Computer Communication Review, Chicago, Illinois, USA, ISBN 978-1-4503-2836-4,
DOI: 10.1145/2619239.2626294,
[Conference or Workshop Item]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, pp. 1-6,
ACM Press, [Conference or Workshop Item]

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
8533, In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science,
Springer, Cham, Heraklion, Greece, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Kremer, Steve ; Künnemann, Robert (2014):
Automated analysis of security protocols with global state.
In: SP '14, In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 163-178,
IEEE Computer Society, San Jose, CA, USA, ISBN 978-1-4799-4686-0,
DOI: 10.1109/SP.2014.18,
[Conference or Workshop Item]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys),
ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Klos, Christian (2013):
Design and deployment of a public key infrastructure.
TU Darmstadt, [Master Thesis]

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8), pp. 512-516. DOI: 10.1007/s11623-013-0209-8,
[Article]

Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar (2013):
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
In: ASIA CCS '13, In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security table of contents, pp. 529-534,
ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484384,
[Conference or Workshop Item]

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE),
Interactive Presentation, [Conference or Workshop Item]

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
Marinos, Louis ; Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Lecture Notes in Computer Science, 8030, In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, pp. 100-109,
Springer, First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, ISBN ISBN 978-3-642-39345-7,
[Conference or Workshop Item]

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
20. Network and Distributed System Security Symposium (NDSS'13), San Diego, CA, 24-27 February, 2013, [Conference or Workshop Item]

Katzenbeisser, Stefan ; Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885. [Article]

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4), pp. 305-308. [Article]

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), pp. 189-279, Springer Verlag Heidelberg, ISBN 978-3-642-31942-6,
[Book Section]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS), 7428, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 283-301,
Springer, [Conference or Workshop Item]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12),
Las Vegas, USA, [Conference or Workshop Item]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012):
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
In: Lecture notes in computer science, 7344, Berlin, Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max (2012):
Occlusion-aware Interaction Techniques for Tabletop Systems.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2531-2536,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223831,
[Conference or Workshop Item]

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI, 195, In: Sicherheit, pp. 187-198,
GI, Darmstadt, Germany, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Kalabis, Lukas ; Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9), pp. 670--675. DOI: 10.1007/s11623-012-0224-1,
[Article]

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von (eds.) Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
18, In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, pp. 215-220, Berlin, Duncker & Humblot, ISBN 978-3-428-13887-6,
[Book Section]

L

Lauinger, Johannes ; Baumgärtner, Lars ; Wickert, Anna-Katharina ; Mezini, Mira (2020):
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 410-417,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020):
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain, virtual Conference, 02.-06.11.2020, [Conference or Workshop Item]

Langer, Amanda ; Kaufhold, Marc-André ; Runft, Elena ; Reuter, Christian ; Grinko, Margarita ; Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
Wien, 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19. Februar 2019, [Conference or Workshop Item]

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: LNCS, In: Frontiers of Information Technology & Electronic Engineering, 18 (9), pp. 1348-1369. Springer, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Article]

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94, pp. 45-67. Elsevier, ISSN 2352-2216,
[Article]

Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. (2017):
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security,
DOI: 10.1145/3133956.3134056,
[Conference or Workshop Item]

Langfeld, Benedikt (2017):
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
Darmstadt, Technische Universität, [Bachelor Thesis]

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
pp. 45-66, Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), 102 (C), pp. 103-121. DOI: 10.1016/j.ijhcs.2016.09.008,
[Article]

Leopold, Inken ; Reuter, Christian
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
pp. 361-364, Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0350,
[Conference or Workshop Item]

Lato, Ellen (2016):
Fault Attacks on Lattice-Based Encryption Schemes.
Darmstadt, Technische Universität, [Master Thesis]

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5), pp. 64-75. [Article]

Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Conference or Workshop Item]

Liu, Hui ; Liu, Qiurong ; Staicu, Cristian-Alexandru ; Pradel, Michael ; Luo, Yue (2016):
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 1063-1073,
ACM, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884841,
[Conference or Workshop Item]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 619-629,
Washington, DC, USA, IEEE Computer Society, Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Conference or Workshop Item]

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York,
[Conference or Workshop Item]

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Darmstadt, Technische Universität, [Master Thesis]

Lillack, Max ; Kästner, Christian ; Bodden, Eric (2014):
Tracking Load-time Configuration Option.
In: ASE '14, In: Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, pp. 445-456,
ACM, Vasteras, Sweden, ISBN 978-1-4503-3013-8,
DOI: 10.1145/2642937.2643001,
[Conference or Workshop Item]

Lagerspetz, E. ; Truong, Hien Thi Thu ; Tarkoma, S. ; Asokan, N. (2014):
MDoctor: A Mobile Malware Prognosis Application.
In: Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on, pp. 201-206,
DOI: 10.1109/ICDCSW.2014.36,
[Conference or Workshop Item]

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2013):
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9, pp. 752-771. DOI: 10.1016/j.pmcj.2013.07.014,
[Article]

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Mühlhäuser, Max (2013):
EarPut: Augmenting Behind-the-Ear Devices for Ear-based Interaction.
In: CHI EA '13: Proceedings of the 2013 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, pp. 1323-1328,
ACM, ISBN 978-1-4503-1952-2,
DOI: 10.1145/2468356.2468592,
[Conference or Workshop Item]

Lissermann, Roman ; Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2013):
Permulin: Personal In- and Output on Interactive Surfaces.
In: CHI '13 Interactivity, pp. 3083-3086,
ACM, ISBN 978-1-4503-1952-2,
[Conference or Workshop Item]

Lissermann, Roman ; Olberding, Simon ; Steimle, Jürgen ; Mühlhäuser, Max (2012):
Interacting with Videos On Paper-like Displays.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2579-2584,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223839,
[Conference or Workshop Item]

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh-Minh-Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2012):
The Mobile Data Challenge: Big Data for Mobile Computing Research.
In: Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing,
[Conference or Workshop Item]

M

Möllering, Helen ; Schneider, Thomas (2021):
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), virtual Conference, 07.-11.06.2021, [Conference or Workshop Item]

Meurisch, Christian ; Mühlhäuser, Max (2021):
Data Protection in AI Services: A Survey.
In: ACM Computing Surveys, 54 (2), ACM, ISSN 0360-0300,
DOI: 10.1145/3440754,
[Article]

Meurisch, Christian ; Mihale-Wilson, Cristina ; Hawlitschek, Adrian ; Giger, Florian ; Müller, Florian ; Hinz, Oliver ; Mühlhäuser, Max (2020):
Exploring User Expectations of Proactive AI Systems.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4 (4), ACM, e-ISSN 24749567,
DOI: 10.1145/3432193,
[Article]

Mazaheri, Sogol (2020):
Cryptographic Primitives that Resist Backdooring and Subversion. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00014550,
[Ph.D. Thesis]

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference or Workshop Item]

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, pp. 694-705,
ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0,
DOI: 10.1145/3427228.3427277,
[Conference or Workshop Item]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Maier, Christine ; Brydges, Tiff ; Jurcevic, Petar ; Trautmann, Nils ; Hempel, Cornelius ; Lanyon, Ben P. ; Hauke, Philipp ; Blatt, Rainer ; Roos, Christian F. (2019):
Environment-Assisted Quantum Transport in a 10-qubit Network.
In: PHYSICAL REVIEW LETTERS, 122 (5), pp. 050501. American Physical Society, DOI: 10.1103/PhysRevLett.122.050501,
[Article]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

McCracken, Gabriel (2018):
A Field Theory for Quantum Markov Processes.
TU Darmstadt, [Bachelor Thesis]

Marakis, Vassilios (2018):
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
TU Darmstadt, [Master Thesis]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Master Thesis]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Master Thesis]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelor Thesis]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), pp. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
In: EMSOFT '18, pp. 16:1-16:7, Piscataway, NJ, USA, IEEE Press, International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Master Thesis]

Müller, Patrick (2017):
Reconstruction of Obfuscated Strings.
TU Darmstadt, [Master Thesis]

Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. (2017):
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
66, In: The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017), pp. 1717 - 1733,
DOI: 10.1109/TC.2017.2703808,
[Conference or Workshop Item]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security,
DOI: 10.1145/3098954.3098986,
[Conference or Workshop Item]

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), pp. 14-21. DOI: 10.1109/MSP.2017.3151325,
[Article]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
DOI: 10.1109/ICDCS.2017.283,
[Conference or Workshop Item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters,
[Conference or Workshop Item]

Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1), pp. 405-426. DOI: 10.13154/tosc.v2017.i1.405-426,
[Article]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2017):
A Parallel Variant of LDSieve for the SVP on Lattices.
In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP),
IEEE, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), DOI: 10.1109/PDP.2017.60,
[Conference or Workshop Item]

Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2), pp. 137-151. DOI: 10.1108/ICS-03-2017-0014,
[Article]

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
pp. 213-230, Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6), pp. 959-1003. DOI: 10.1007/s10606-017-9291-z,
[Article]

Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords,
Springer LNCS, [Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1817-1819,
ACM, Vienna, Austria, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Bansarkhani, Rachid El ; Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, pp. 426-440,
Springer LNCS, Honolulu, Hi, USA, [Conference or Workshop Item]

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016),
Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 67-77,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Mariano, Artur ; Correia, Fabio ; Bischof, Christian (2016):
A vectorized, cache efficient LLL implementation.
In: VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science,
Porto, Portugal, [Conference or Workshop Item]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, pp. 46-48,
CEUR Workshop Proceedings, [Conference or Workshop Item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Müller, Florian ; Günther, Sebastian ; Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Mühlhäuser, Max (2016):
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
In: CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems,
ACM New York, NY, USA, DOI: 10.1145/2851581.2892450,
[Conference or Workshop Item]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Article]

Mariano, Artur ; Bischof, Christian (2016):
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
In: PDP2016,
Conference Publishing Services (CPS), Heraklion Crete, Greece, [Conference or Workshop Item]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),
Darmstadt, Germany, [Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015, In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 431-440,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Mantel, Heiko ; Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: LNCS, In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, p. 20,
Springer, Vienna, Austria, [Conference or Workshop Item]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2015):
Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP.
pp. 590-599, IEEE, 44th International Conference on Parallel Processing (ICPP 2015), Beijing, China, 01.-04.09., ISSN 01903918,
DOI: 10.1109/ICPP.2015.68,
[Conference or Workshop Item]

Mineraud, Julien ; Lancerin, Federico ; Balasubramaniam, Sasitharan ; Conti, Mauro ; Tarkoma, Sasu (2015):
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15),
Helsinki, Finland, [Conference or Workshop Item]

Meskanen, Tommi ; Ramezanian, Sara ; Liu, Jian ; Niemi, Valtteri (2015):
Private Membership Test for Bloom Filters.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15),
Helsinki, Finland, [Conference or Workshop Item]

Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit (2015):
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
In: European Conference on Object-Oriented Programming, pp. 999-1022,
Prague, Czech Republic, [Conference or Workshop Item]

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, pp. 505-516,
SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Lecture notes in computer science, 8880, In: Information Systems Security : International Conference on Information Systems Security (ICISS), pp. 204-225,
Berlin, Cham, Springer International Publishing, International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
Darmstadt, Technische Universität, [Master Thesis]

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security,
ACM, DOI: 10.1145/2660267.2660334,
[Conference or Workshop Item]

Mitschke, Ralf ; Erdweg, Sebastian ; Köhler, Mirko ; Mezini, Mira ; Salvaneschi, Guido (2014):
i3QL: Language-Integrated Live Data Views.
In: OOPSLA '14, In: Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, pp. 417-432,
ACM, Portland, Oregon, USA, ISBN 978-1-4503-2585-1,
DOI: 10.1145/2714064.2660242,
[Conference or Workshop Item]

Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik (2014):
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14, In: Proceedings of the 23rd USENIX conference on Security Symposium, pp. 733-748,
USENIX Association, San Diego, CA, USA, ISBN 978 -1- 931971-15 -7,
[Conference or Workshop Item]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014),
Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Mittelbach, Arno
Oswald, Elisabeth ; Nguyen, Arno Q. (eds.) (2014):
Salvaging Indifferentiability in a Multi-stage Setting.
In: LNCS 8441, In: Advances in Cryptology – EUROCRYPT 2014. 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings., pp. 603–621,
Springer, Copenhagen, Denmark, ISBN 978-3-642-55219-9,
DOI: 10.1007/978-3-642-55220-5_33,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer,
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Moecke, Cristian Thiago ; Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21, pp. 41-52. DOI: 10.1108/09685221311314419,
[Article]

Mühlbach, Sascha ; Koch, Andreas (2012):
Malacoda: towards high-level compilation of network security applications on reconfigurable hardware.
In: ANCS '12, In: Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, pp. 247-258,
ACM, Austin, Texas, USA, ISBN 978-1-4503-1685-9,
DOI: 10.1145/2396556.2396604,
[Conference or Workshop Item]

Moecke, Cristian Thiago ; Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85. DOI: 10.1108/09685221311314419,
[Article]

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: LNCS, In: AfricaCrypt 2012,
Springer, Al Akhawayn University, Ifran, Morocco, [Conference or Workshop Item]

Meziani, Mohammed ; Bansarkhani, Rachid El (2012):
An Efficient and Secure Coding-based Authenticated Encryption.
In: LNCS, In: 7th DPM International Workshop on Data Privacy Management (DPM 2012),
Springer, Pisa, Italy, [Conference or Workshop Item]

Meziani, Mohammed (2012):
SBS: A Fast and Secure Syndrome Based Stream Cipher.
[Other]

N

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021):
FLGUARD: Secure and Private Federated Learning.
In: arXiv-Computer Science, In: Crytography and Security, (Preprint), [Article]

Niesler, Christian ; Surminski, Sebastian ; Davi, Lucas (2021):
HERA: Hotpatching of Embedded Real-time Applications.
Internet Society, 28th Network and Distributed System Security Symposium (NDSS) 2021, virtual Conference, 21.-25.02.2021, [Conference or Workshop Item]

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense,
ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0,
DOI: 10.1145/3411496.3421229,
[Conference or Workshop Item]

Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020):
LegIoT: Ledgered Trust Management Platform for IoT.
In: Lecture Notes in Computer Science, 12308, In: Computer Security - ESORICS 2020, pp. 377-396,
Springer, 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09.2020, ISBN 978-3-030-58950-9,
DOI: 10.1007/978-3-030-58951-6_19,
[Conference or Workshop Item]

Nieminen, Raine ; Järvinen, Kimmo (2020):
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing, IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2020.2990871,
[Article]

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Conference or Workshop Item]

Nguyen, Giang Nam (2019):
Developing Performance Models for Codes with Exponential Runtime Behavior.
Darmstadt, TU Darmstadt, [Master Thesis]

Nikolopoulos, Georgios M. (2019):
Optical scheme for cryptographic commitments with physical unclonable keys.
In: Optical Express, 27 (20), pp. 29367-29379. DOI: 10.1364/OE.27.029367,
[Article]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Conference or Workshop Item]

Nikolopoulos, Georgios M. (2019):
Cryptographic one-way function based on boson sampling.
18, In: Quantum Information Processing, 2019 (8), p. 259. Springer Nature, ISSN 1570-0755, e-ISSN 1573-1332,
DOI: 10.1007/s11128-019-2372-9,
[Article]

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Article]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Conference or Workshop Item]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Conference or Workshop Item]

Nanjunde Gowda, Vidyashree (2018):
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt, [Master Thesis]

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE,
ACM, [Conference or Workshop Item]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor Thesis]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Article]

Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus
Wiemeyer, Josef (ed.) (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, pp. 71-89, Darmstadt, [Book Section]

Neumann, Klara Maria (2017):
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelor Thesis]

Nauth, Julian (2017):
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
TU Darmstadt, [Bachelor Thesis]

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502, In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, pp. 371-382,
Springer, Rome, Italy, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23075,
[Conference or Workshop Item]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Article]

Nobach, Leonhard ; Rimac, I. ; Hilt, V. ; Hausheer, David (2016):
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1-2,
IEEE, Singapore, Singapore, ISBN 978-1-5090-3281-5/16,
DOI: 10.1109/ICNP.2016.7784459,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16. DOI: 10.1007/s12243-016-0520-0,
[Article]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
Jumping through hoops: why do Java developers struggle with cryptography APIs?
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 935-946,
ACM, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884790,
[Conference or Workshop Item]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering,
ACM, Austin, Texas, USA, [Conference or Workshop Item]

Nadi, Sarah ; Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, [Conference or Workshop Item]

Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2015):
Universality in random quantum networks.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062335,
[Article]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11), pp. 747-752. DOI: 10.1007/s11623-015-0512-7,
[Article]

Nyman, Thomas ; McGillion, Brian ; Asokan, N. (2015):
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: Lecture Notes in Computer Science, 9229, In: 8th International Conference on Trust & Trustworthy Computing, pp. 58-67,
Springer International Publishing, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_4,
[Conference or Workshop Item]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015,
[Conference or Workshop Item]

Nguyen, The An Binh ; Englert, Frank ; Farr, Simon ; Gottron, Christian ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015):
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
In: International Workshop on Pervasive Networks for Emergency Management (PerNEM),
IEEE, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 69 - 72,
TUT Press, Lochau, [Conference or Workshop Item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science, 8650, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, pp. 246-260,
Springer, München, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, pp. 198-207,
IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. (2014):
Citizen Electronic Identities using {TPM} 2.0.
In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pp. 37-48,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 76-91, IGI Global, [Book Section]

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 27-61, IGI Global, [Book Section]

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013),
New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 804-818,
Koblenz, [Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science, 8075, In: 5th International Conference on eParticipation (ePart 2013), pp. 49-56,
Springer, Koblenz, Germany, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464), pp. 1-12. International Association for Cryptologic Research (IACR), [Article]

Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Conference or Workshop Item]

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
pp. 1-2, Menlo Park, California, [Conference or Workshop Item]

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13),
[Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), pp. 277-284,
Salzburg, Austria, [Conference or Workshop Item]

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, pp. 155-164,
Springer, Limoges, France, [Conference or Workshop Item]

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS, In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, pp. 91-104,
Regensburg, Germany, [Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), pp. 180-185,
IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
ICIMP 2012, The Seventh I, In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 30-39,
ThinkMind Digital Library, Stuttgart. Germany, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

O

Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021):
Language Support for Secure Software Development with Enclaves.
34th IEEE Computer Security Foundations Symposium (CSF 2021), virtual Conference, 21.-24.06.2021, [Conference or Workshop Item]

Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020):
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
ACM, Annual Computer Security Applications Conference (ACSAC 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Olt, Christian M. ; Mesbah, Neda (2019):
Weary of Watching Out? - Cause and Effect of Security Fatigue.
European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Conference or Workshop Item]

OConnor, TJ ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Oak, Aditya ; Mezini, Mira ; Salvaneschi, Guido (2019):
Language Support for Multiple Privacy Enhancing Technologies.
ACM, Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming, [Conference or Workshop Item]

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master Thesis]

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS), 8068, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 107-125,
Springer, [Conference or Workshop Item]

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: SEC'13, In: Proceedings of the 22nd USENIX Conference on Security, pp. 543-558, Berkeley, Calif, USENIX Association, ISBN 978-1-931971-03-4,
[Book Section]

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 142 - 155,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
pp. 172 - 201, IGI Global, ISBN 978-1-4666-3640-8,
DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), pp. 91-100,
[Conference or Workshop Item]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master Thesis]

Olembo, Maina ; Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Kripp, Melanie J ; Volkamer, Melanie ; Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics, 205, In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), pp. 95-109,
Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

P

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Putz, Florentin ; Álvarez, Flor ; Classen, Jiska (2020):
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication.
pp. 31-41, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3399420,
[Conference or Workshop Item]

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019,
Springer, [Conference or Workshop Item]

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, pp. 125-157,
Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), pp. 7:1-7:35. DOI: 10.1145/3154794,
[Article]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017,
Malta, [Conference or Workshop Item]

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, pp. 17-31,
Springer, [Conference or Workshop Item]

Pottebaum, Jens ; Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4), pp. iv-vii. IGI Global, ISSN 1937-9420,
[Article]

Pinatti de Carvalho, Aparecido Fabiano ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
pp. 41-47, Sheffield, UK, Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK, [Conference or Workshop Item]

Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian
Eibl, Maximilian ; Gaedke, Martin (eds.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
pp. 1281-1282, Bonn, INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16, pp. 117-122, New York, NY, USA, ACM, 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, DOI: 10.1145/2994459.2994463,
[Conference or Workshop Item]

Pellegrino, Giancarlo ; Tschürtz, Constantin ; Bodden, Eric ; Rossow, Christian
Bos, Herbert ; Monrose, Fabian ; Blanc, Gregory (eds.) (2015):
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Lecture Notes in Computer Science 9404, In: Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., pp. 295-316,
Springer Cham, Kyoto, Japan, ISBN 978-3-319-26361-8,
DOI: 10.1007/978-3-319-26362-5,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: LNCS, In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, pp. 1-24,
Springer, Auckland, New Zealand, [Conference or Workshop Item]

Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris,
[Conference or Workshop Item]

Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), pp. 515-530,
USENIX, [Conference or Workshop Item]

Pradel, Michael ; Schuh, Parker ; Sen, Koushik (2015):
TypeDevil: dynamic type inconsistency analysis for JavaScript.
1, In: Proceedings of the 37th International Conference on Software Engineering, pp. 314-324,
IEEE Press, Florence, Italy, ISBN 978-1-4799-1934-5,
DOI: 10.1109/ICSE.2015.51,
[Conference or Workshop Item]

Pradel, Michael ; Schuh, Parker ; Necula, George ; Sen, Koushik (2014):
EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation.
In: OOPSLA '14, 49, In: Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, pp. 33-47,
ACM, Portland, OR, USA, ISBN 978-1-4503-2585-1,
DOI: 10.1145/2714064.2660233,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, pp. 797-812,
USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Pradel, Michael ; Gross, Thomas R. (2013):
Automatic testing of sequential and concurrent substitutability.
In: ICSE '13, In: Proceedings of the 2013 International Conference on Software Engineering, pp. 282-291,
IEEE Press, San Francisco, CA, USA, ISBN 978-1-4673-3076-3,
DOI: 10.1109/ICSE.2013.6606574,
[Conference or Workshop Item]

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]

Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), pp. 79-84,
IEEE, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference or Workshop Item]

Pradel, Michael ; Jaspan, Ciera ; Aldrich, Jonathan ; Gross, Thomas R. (2012):
Statically checking API protocol conformance with mined multi-object specifications.
In: ICSE '12, In: Proceedings of the 34th International Conference on Software Engineering, pp. 925-935,
IEEE Press, Zurich, Switzerland, ISBN 978-1-4673-1067-3,
DOI: 10.1109/ICSE.2012.6227127,
[Conference or Workshop Item]

Pradel, Michael ; Gross, Thomas R. (2012):
Leveraging test generation and specification mining for automated bug detection without false positives.
In: ICSE '12, In: Proceedings of the 34th International Conference on Software Engineering, pp. 288-298,
IEEE Press, Zurich, Switzerland, ISBN 978-1-4673-1067-3,
DOI: 10.1109/ICSE.2012.6227185,
[Conference or Workshop Item]

Piper, Thorsten ; Winter, Stefan ; Manns, Paul ; Suri, Neeraj (2012):
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework.
In: DSN '12, In: Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1-12,
IEEE Computer Society, Boston, MA, USA, ISBN 978-1-4673-1624-8,
DOI: 10.1109/DSN.2012.6263913,
[Conference or Workshop Item]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
WWW '12 Companion, In: Proceedings of the 21st international conference companion on World Wide Web, pp. 585--586,
ACM, Lyon, France, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan (2012):
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
In: International Conference on Information Security (ISC 2012), pp. 242-257,
Springer, [Conference or Workshop Item]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Lecture Notes in Computer Science, In: Social Informatics 4th International Conference, SocInfo 2012, proceedings, pp. 188-201, Berlin, Heidelberg, Springer, ISBN 978-3-642-35385-7,
DOI: 10.1007/978-3-642-35386-4_15,
[Book Section]

R

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2021):
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
30th USENIX Security Symposium, Vancouver, Canada, 11.-13.08.2021, [Conference or Workshop Item]

Renaud, Karen ; Zimmermann, Verena (2020):
How to nudge in cyber security.
In: Network Security, 2020 (11), p. 20. Elsevier, DOI: 10.1016/S1353-4858(20)30132-X,
[Article]

Reuter, Christian ; Kaufhold, Marc-André ; Spahr, Fabian ; Spielhofer, Thomas ; Hahne, Anna Sophie (2020):
Emergency Service Staff and Social Media – A Comparative Empirical Study of the Perception by Emergency Services Members in Europe in 2014 and 2017.
In: International Journal of Disaster Risk Reduction (IJDRR), 46, Elsevier ScienceDirect, ISSN 2212-4209,
DOI: 10.1016/j.ijdrr.2020.101516,
[Article]

Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020):
TACAI: An Intermediate Representation Based on Abstract Interpretation.
pp. 2-7, SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, London, UK, June 2020, ISBN 9781450379977,
DOI: 10.1145/3394451.3397204,
[Conference or Workshop Item]

Reuter, Christian ; Haunschild, Jasmin ; Hollick, Matthias ; Mühlhäuser, Max ; Vogt, Joachim ; Kreutzer, Michael (2020):
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities.
Gesellschaft für Informatik e.V., Mensch und Computer 2020 - Digitaler Wandel im Fluss der Zeit, virtual Conference, 06.-09.09., [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Comes, Tina ; Knodt, Michèle ; Mühlhäuser, Max (2020):
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020), virtual Conference, 05.-09.10., [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2020):
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen.
In: BBK Bevölkerungsschutz, 2, pp. 14-17. Bundesamt für Bevölkerungs-schutz und Katastrophenhilfe, ISSN 0940-7154,
[Article]

Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020):
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020), virtual Conference, 18.-19.11., [Conference or Workshop Item]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Conference or Workshop Item]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Conference or Workshop Item]

Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
pp. 251-261, 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Conference or Workshop Item]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises.
39, (3), Taylor & Francis, ISSN 0144-929X,
DOI: 10.1080/0144929X.2019.1629025,
[Journal]

Renaud, Karen ; Zimmermann, Verena (2019):
Encouraging Password Manager Reuse.
In: Network Security, 2019 (6), Elsevier, DOI: 10.1016/S1353-4858(19)30075-3,
[Article]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Roth, Kai (2019):
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Darmstadt, TU Darmstadt, [Master Thesis]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2019):
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS),
26th Annual Network & Distributed System Security Symposium (NDSS), Catamaran Resort Hotel & Spa, San Diego, CA, [Conference or Workshop Item]

Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André
Reuter, Christian (ed.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Conference or Workshop Item]

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (ed.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Riebe, Thea ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Conference or Workshop Item]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Social Media in Conflicts and Crises.
In: Behaviour & Information Technology (BIT), 38, DOI: 10.1080/0144929X.2019.1629025.,
[Article]

Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Ludwig, Thomas ; Pottebaum, Jens ; Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian ; Häusser, Katja ; Bien, Mona ; Herbert, Franziska
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (eds.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
ACM, Mensch und Computer 2019, Hamburg, Germany, 8.-11.0.2019, ISSN ISSN 2510-2672,
[Conference or Workshop Item]

Riebe, Thea ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Book]

Reuter, Christian
Ückert, Sandra (ed.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Book Section]

Riebe, Thea ; Kaufhold, Marc-André ; Kumar, Tarun ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Reuter, Christian
Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (eds.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, pp. accepted, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book Section]

Riebe, Thea ; Langer, Amanda ; Kaufhold, Marc-André ; Kretschmer, Nina Katharina ; Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian ; Riebe, Thea ; Aldehoff, Larissa ; Kaufhold, Marc-André ; Reinhold, Thomas
Werkner, Ines-Jacqueline (ed.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, pp. akzeptiert, Springer VS, [Book Section]

Riebe, Thea ; Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, (1), pp. 46-48. [Article]

Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker
Reuter, Christian (ed.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25652-4,
DOI: 10.1007/978-3-658-25652-4_19,
[Book Section]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Bachelor Thesis]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelor Thesis]

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 107-112,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Conference or Workshop Item]

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), pp. 1-6,
IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Conference or Workshop Item]

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), pp. 707-721,
ACM, DOI: 10.1145/3196494.3196522,
[Conference or Workshop Item]

Renaud, Karen ; Zimmermann, Verena (2018):
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2), pp. 102-118. [Article]

Reif, Michael ; Eichberg, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (eds.) (2018):
Call Graph Construction for Java Libraries.
pp. 119-120, Bonn, Gesellschaft für Informatik, Software Engineering und Software Management 2018, Bonn, [Conference or Workshop Item]

Reuter, Christian ; Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1), pp. in press. [Article]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
pp. 623-632, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
pp. 595-603, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
pp. 565-569, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, pp. 60-61. [Article]

Reuter, Christian ; Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), pp. v-viii. [Article]

Reuter, Christian ; Pottebaum, Jens (2018):
International Journal of Information Systems for Crisis Response and Management : Special Issue on IT Support for Crisis and Continuity Management.
10, (1), IGI Global, ISSN 1937-9390, e-ISSN 1937-9420,
[Journal]

Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Conference or Workshop Item]

Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick (2018):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), [Article]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, 2, pp. 22-24. [Article]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 1, pp. 64-66. [Article]

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), pp. 277-279. DOI: 10.1080/10447318.2018.1427833,
[Article]

Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), pp. 280-294. DOI: 10.1080/10447318.2018.1427832,
[Article]

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 621-630, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_30,
[Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 3-14, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_1,
[Book Section]

Reuter, Christian ; Mentler, Tilo (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), pp. 2-3. Wiley, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Article]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 379