TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 | 1990 | 1989 | 1988 | 1987 | 1986 | 1985
Number of items at this level: 2071.

2020

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
In: 23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

2019

Degabriele, Jean Paul and Janson, Christian and Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December, 8-12, [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference or Workshop Item]

Das, Poulami and Faust, Sebastian and Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
In: ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference or Workshop Item]

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference or Workshop Item]

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Bein, Nicole S. and Machado, Pamela and Coll, Mariona and Chen, Feng and Makarovic, Maja and Rojac, Tadej and Klein, Andreas (2019):
Electrochemical Reduction of Undoped and Cobalt-Doped BiFeO3 Induced by Water Exposure: Quantitative Determination of Reduction Potentials and Defect Energy Levels Using Photoelectron Spectroscopy.
In: The Journal of Physical Chemistry Letters, American Chemical Society (ACS), pp. 7071-7076, 10, ISSN 1948-7185,
DOI: 10.1021/acs.jpclett.9b02706,
[Online-Edition: https://doi.org/10.1021/acs.jpclett.9b02706],
[Article]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference or Workshop Item]

Lehr, François-Xavier and Hanst, Maleen and Vogel, Marc and Kremer, Jennifer and Göringer, H. Ulrich and Suess, Beatrix and Koeppl, Heinz (2019):
Cell-free prototyping of AND-logic gates based on heterogeneous RNA activators.
In: ACS Synthetic Biology, ACS Publications, pp. 2163-2173, 8, (9), ISSN 2161-5063,
DOI: 10.1021/acssynbio.9b00238,
[Online-Edition: https://pubs.acs.org/doi/abs/10.1021/acssynbio.9b00238],
[Article]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka (2019):
Social Media Use in Emergencies of Citizens in the United Kingdom.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/thomasspielhofer2/2019/1748_Thom...],
[Conference or Workshop Item]

Reif, Michael and Kübler, Florian and Eichberg, Michael and Helm, Dominik and Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
In: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3293882&picked=prox],
[Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostáková, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference or Workshop Item]

Papsdorf, Daniel and Velumani, Sakthivel and Klein, Anja (2019):
MIMO Multi-Group Multi-Way Relaying: Interference Alignment in a Partially Connected Network.
Cannes, Frankreich, In: IEEE 20th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, Frankreich, 02.-05.07.2019, [Conference or Workshop Item]

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, 2, [Online-Edition: https://encrypto.de/papers/KNLAS19.pdf],
[Article]

Schneider, Thomas and Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, In: 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Online-Edition: https://encrypto.de/papers/ST19ASIACCS.pdf],
[Conference or Workshop Item]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19), SciTePress, [Online-Edition: https://encrypto.de/papers/KSS19.pdf],
[Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2019):
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol.
In: GetMobile: Mobile Computing and Communications, ACM, pp. 30-33, 23, (1), ISSN 23750529,
DOI: 10.1145/3351422.3351432,
[Article]

Mantz, Dennis and Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, Jun 17, 2019 - Jun 21, 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
In: 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/],
[Conference or Workshop Item]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8998],
[Ph.D. Thesis]

Järvinen, Kimmo and Leppäkoski, Helena and Lohan, Elena Simona and Richter, Philipp and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), [Online-Edition: https://encrypto.de/papers/JLLRSTY19.pdf],
[Conference or Workshop Item]

Mantel, Heiko and Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
In: The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Nautsch, Andreas and Jiménez, Abelino and Treiber, Amos and Kolberg, Jascha and Jasserand, Catherine and Kindt, Els and Delgado, Héctor and Todisco, Massimiliano and Hmani, Mohamed Amine and Mtibaa, Aymen and Abdelraheem, Mohammed Ahmed and Abad, Alberto and Teixeira, Francisco and Matrouf, Driss and Gomez-Barrero, Marta and Petrovska-Delacrétaz, Dijana and Chollet, Gérard and Evans, Nicholas and Schneider, Thomas and Bonastre, Jean-François and Raj, Bhiksha and Trancoso, Isabel and Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Online-Edition: https://encrypto.de/papers/NJTKHMAATMGPCESBRTB19.pdf],
[Article]

Batina, Lejla and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Conference or Workshop Item]

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Kohnhäuser, Florian and Püllen, Dominik and Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
In: IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Online-Edition: https://www.ieee-security.org/TC/SPW2019/SafeThings/],
[Conference or Workshop Item]

Classen, Jiska and Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
In: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), Miami, FL, USA, May 15, 2019 - May 17, 2019, DOI: https: //doi.org/10.1145/3317549.3319727,
[Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Hesse, Julia and Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019, Darmstadt, IACR, In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Online-Edition: https://eurocrypt.iacr.org/2019/],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Tkachenko, Oleksandr and Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019, Springer, [Online-Edition: https://encrypto.de/papers/PSTY19.pdf],
[Conference or Workshop Item]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Carrasco Subieta, Alvaro German (2019):
Entwicklung neuartiger wimpernbasierter piezoelektrischer Antriebe.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8648],
[Ph.D. Thesis]

Hohmann, Fabian and Ortiz Jimenez, Andrea Patricia and Klein, Anja (2019):
Optimal Resource Allocation Policy forMulti-Rate Opportunistic Forwarding.
Marrakesch, Marokko, In: IEEE Wireless Communications and Networking (WCNC), Marrakesch, Marokko, 15.-18.04.2019, [Conference or Workshop Item]

Krämer, Juliane and Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
In: COSADE 2019, Springer, Darmstadt, [Online-Edition: https://www.cosade.org/index.html],
[Conference or Workshop Item]

Wickert, Anna-Katharina and Reif, Michael and Eichberg, Michael and Dodhy, Anam and Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Conference or Workshop Item]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
IEEE Computer Society, In: 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Online-Edition: https://www.ieee-security.org/TC/SP2018/],
[Conference or Workshop Item]

Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André
Reuter, Christian (ed.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Online-Edition: https://www.gil-net.de/tagungen.php],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian
Reuter, Christian (ed.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian (2019):
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
Wiesbaden, Germany, Springer Vieweg, [Book]

Reinhold, Thomas and Reuter, Christian
Reuter, Christian (ed.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad (2019):
Special Issue on Social Media in Conflicts and Crises.
accepted, [Book]

Riebe, Thea and Reuter, Christian
Reuter, Christian (ed.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reinhold, Thomas and Reuter, Christian
Reuter, Christian (ed.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Conference or Workshop Item]

Stute, Milan and Narain, Sashank and Mariotto, Alex and Heinrich, Alexander and Kreitschmann, David and Noubir, Guevara and Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Santa Clara, CA, USA, In: 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, USA, August 14–16, 2019, [Online-Edition: https://www.usenix.org/conference/usenixsecurity19/presentat...],
[Conference or Workshop Item]

Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/larissaaldehoff/2019/1798_Lariss...],
[Conference or Workshop Item]

Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/amandalanger1/2019/1757_AmandaLa...],
[Conference or Workshop Item]

Riebe, Thea and Reuter, Christian
Reuter, Christian (ed.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad (2019):
Social Media in Conflicts and Crises.
In: Behaviour & Information Technology (BIT), 38, DOI: 10.1080/0144929X.2019.1629025.,
[Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38, [Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Ludwig, Thomas and Pottebaum, Jens and Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska
Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.0.2019, ISSN ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Book]

Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian (2019):
Resilience in Security and Crises through Adaptions and Transitions.
Kassel, Germany, Gesellschaft für Informatik e. V., In: Informatik 2019, Lecture Notes in Informatics (LNI), Kassel, Germany, 23.-26. September, [Conference or Workshop Item]

Hartwig, Katrin and Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Carvalho, Pinatti De (2019):
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, pp. 63564-63577, 7, (1), DOI: 10.1109/ACCESS.2019.2916903,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=871...],
[Article]

Reuter, Christian
Ückert, Sandra (ed.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Book Section]

Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reuter, Christian
Reuter, Christian (ed.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian
Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
Hamburg, Germany, ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8. bis 11. September 2019, [Conference or Workshop Item]

Reuter, Christian
Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (eds.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, pp. accepted, [Book Section]

Kaufhold, Marc-André and Reuter, Christian
Reuter, Christian (ed.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, pp. 1-11, [Online-Edition: https://arxiv.org/pdf/1907.07725.pdf],
[Article]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian
Reuter, Christian (ed.) (2019):
Privacy vs. Security: Privacy Enhancing Technologies in Social Media in Security relevant Situations.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas
Werkner, Ines-Jacqueline (ed.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, Springer VS, pp. akzeptiert, [Book Section]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria:, 18.-19.2.2019, [Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Kamp, Laurenz and Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
In: 2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Álvarez, Flor and Almon, Lars and Radtki, Hauke and Hollick, Matthias (2019):
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
In: 9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019), Seattle, WA, 17-20, Oktober, 2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReutereta...],
[Conference or Workshop Item]

Linsner, Sebastian and Varma, Rashmi and Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna. Austria, 18.-19. Februar 2019, [Online-Edition: http://gil-net.de/Publikationen/139_119.pdf],
[Conference or Workshop Item]

Hartwig, Katrin and Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTwe...],
[Conference or Workshop Item]

Riebe, Thea and Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, pp. 46-48, (1), [Online-Edition: http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF...],
[Article]

Reuter, Christian and Altmann, Jürgen and Aal, Konstantin and Aldehoff, Larissa and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker
Reuter, Christian (ed.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, DOI: 10.1007/978-3-658-25652-4_19,
[Online-Edition: https://www.springer.com/de/book/9783658256517],
[Book Section]

Schneider, Thomas and Treiber, Amos (2019):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, [Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Dziembowski, Stefan and Faust, Sebastian and Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, In: The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Schneider, Katharina Ruth (2019):
Technological Availability and Employees' Well-being: A Pathway to Responsible Digitization.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9096],
[Ph.D. Thesis]

Álvarez, Flor and Almon, Lars and Hahn, Ann-Sophie and Hollick, Matthias (2019):
Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept.
In: Security Standardisation Research Conference 2019 (ACM CCS Workshop), London, UK, 11.November 2019, [Conference or Workshop Item]

2018

Steinmetzer, Daniel and Stute, Milan and Hollick, Matthias (2018):
TPy: A Lightweight Framework for Agile Distributed Network Experiments.
ACM, In: 12th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH '18), Neu Delhi, India, November 2, 2018, DOI: 10.1145/3267204.3267214,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3267214],
[Conference or Workshop Item]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, In: LNCS, [Online-Edition: http://fps2018.encs.concordia.ca/],
[Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3267716,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3267716],
[Conference or Workshop Item]

Gil Dantas, Yuri and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3241566,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3241566],
[Conference or Workshop Item]

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Liu, Jiquan and Xu, Yeping and Groszewicz, Pedro B. and Brodrecht, Martin and Fasel, Claudia and Hofmann, Kathrin and Tan, Xijuan and Gutmann, Torsten and Buntkowsky, Gerd (2018):
Novel dirhodium coordination polymers: the impact of side chains on cyclopropanation.
In: Catalysis Science & Technology, The Royal Society of Chemistry, pp. 5190-5200, 8, (20), ISSN 2044-4753,
DOI: 10.1039/c8cy01493k,
[Online-Edition: https://pubs.rsc.org/en/Content/ArticleLanding/2018/CY/C8CY0...],
[Article]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Lieser, Patrick and Meuser, Tobias and Schaller, Fabian (2018):
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt.
In: Die Fortentwicklung des Datenschutzes, Vieweg, Wiesbaden, Springer, pp. 77-98, DOI: 10.1007/978-3-658-23727-1_5,
[Book Section]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference or Workshop Item]

Schneider, Thomas and Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268956,
[Online-Edition: https://encrypto.de/papers/TS18.pdf],
[Conference or Workshop Item]

Dziembowski, Stefan and Faust, Sebastian and Hostakova, Kristina (2018):
General State Channel Networks.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Álvarez, Flor and Almon, Lars and Lieser, Patrick and Meuser, Tobias and Dylla, Yannick and Richerzhagen, Björn and Hollick, Matthias and Steinmetz, Ralf (2018):
Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response.
In: CHANTS '18 Proceedings of the 13th Workshop on Challenged Networks, ACM, In: CHANTS '18 Proceedings of the 13th Workshop on Challenged Networks, Neu Delhi, India, October 29, 2018, DOI: 10.1145/3264844.3264845,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3264845],
[Conference or Workshop Item]

Böck, Leon and Vasilomanolakis, Emmanouil and Mühlhäuser, Max and Karuppayah, Shankar (2018):
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
In: Research in Attacks, Intrusions, and Defenses, Springer International Publishing, In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, In: Lecture Notes in Computer Science, 11050, DOI: 10.1007/978-3-030-00470-5_24,
[Online-Edition: https://www.raid2018.org/],
[Conference or Workshop Item]

Ortiz Jimenez, Andrea Patricia and Weber, Tobias and Klein, Anja (2018):
A Two-Layer Reinforcement Learning Solution for Energy Harvesting Data Dissemination Scenarios.
In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, 15.-20.02.2018, [Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Palacios, Joan and Steinmetzer, Daniel and Loch, Adrian and Hollick, Matthias and Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, ACM, In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Online-Edition: https://sigmobile.org/mobicom/2018/],
[Conference or Workshop Item]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Online-Edition: https://encrypto.de/papers/JKSTY18.pdf],
[Conference or Workshop Item]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference or Workshop Item]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Helm, Dominik and Kübler, Florian and Eichberg, Michael and Reif, Michael and Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ACM, In: ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226],
[Conference or Workshop Item]

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference or Workshop Item]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master Thesis]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session, [Online-Edition: https://encrypto.de/papers/KSS18.pdf],
[Other]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544],
[Conference or Workshop Item]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference or Workshop Item]

Classen, Jiska and Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon, [Other]

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 159-178, DOI: 10.1515/popets-2018-0037,
[Article]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelor Thesis]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Master Thesis]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelor Thesis]

Eichberg, Michael and Kübler, Florian and Helm, Dominik and Reif, Michael and Salvaneschi, Guido and Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509],
[Conference or Workshop Item]

Reif, Michael and Eichberg, Michael and Kübler, Florian and Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236503],
[Conference or Workshop Item]

Schaad, Andreas and Grohmann, Bjoern and Winzenried, Oliver and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, k.A., SciTePress, In: Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference or Workshop Item]

Richter, Philipp and Yang, Zheng and Tkachenko, Oleksandr and Leppäkoski, Helena and Järvinen, Kimmo and Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Online-Edition: https://encrypto.de/papers/RYTLJSL18.pdf],
[Conference or Workshop Item]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

van der Wijden, Marius (2018):
Payment and State Channels in practice.
TU Darmstadt, [Master Thesis]

Deaconescu, Razvan and Carabas, Costin and Manda, Iulia and Enck, William and Chiroiu, Mihai and Li, Ninghui and Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: 13th ASIA Conference on Information, Computer and Communications Security, In: AsiaCCS, [Conference or Workshop Item]

Riazi, M. Sadegh and Weinert, Christian and Tkachenko, Oleksandr and Songhori, Ebrahim M. and Schneider, Thomas and Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196522,
[Online-Edition: https://encrypto.de/papers/RWTSSK18.pdf],
[Conference or Workshop Item]

Tkachenko, Oleksandr and Weinert, Christian and Schneider, Thomas and Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196541,
[Online-Edition: https://encrypto.de/papers/TWSH18.pdf],
[Conference or Workshop Item]

Steinmetzer, Daniel and Yuan, Yimin and Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Conference or Workshop Item]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Master Thesis]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

Nguyen, The An Binh and Rettberg-Päplow, Marius and Meurisch, Christian and Meuser, Tobias and Richerzhagen, Björn and Steinmetz, Ralf (2018):
Complex Services Offloading in Opportunistic Networks.
In: IFIP Networking Conference (IFIP Networking) and Workshops, IEEE, Zurich, Switzerland, ISBN 978-3-903176-09-9,
DOI: 10.23919/IFIPNetworking.2018.8696915,
[Conference or Workshop Item]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master Thesis]

Asadi, Arash and Müller, Sabrina and Sim, G. H. and Klein, Anja and Hollick, Matthias (2018):
FMI: Fast Machine Learning for 5G mmWave Vehicular Communications.
Honolulu, Hawaii, In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, 15.-19.04.2018, [Conference or Workshop Item]

Kaup, Fabian and Hacker, Stefan and Mentzendorff, Eike and Meurisch, Christian and Hausheer, David (2018):
Energy Models for NFV and Service Provisioning on Fog Nodes.
In: IEEE/IFIP Network Operations and Management Symposium, IEEE, Taipei, Taiwan, 23.-27. April 2018, In: NOMS'18, ISSN 22374-9709,
DOI: 10.1109/NOMS.2018.8406158,
[Conference or Workshop Item]

Bielsa, Guillermo and Palacios, Joan and Loch, Adrian and Steinmetzer, Daniel and Cesari, Paolo and Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Online-Edition: https://encrypto.de/papers/PSWW18.pdf],
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max (2018):
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), IEEE, Taipei, Taiwan., DOI: 10.1109/NOMS.2018.8406119,
[Conference or Workshop Item]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Mezini, Mira
Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, Gesellschaft für Informatik, pp. 117-118, [Book Section]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor Thesis]

Classen, Jiska and Wegemer, Daniel and Patras, Paul and Spink, Tom and Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Conference or Workshop Item]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, pp. 83-98, [Book Section]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), pp. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Online-Edition: https://encrypto.de/papers/PSZ18.pdf],
[Article]

Wermund, Rahul (2018):
Privacy-Aware and Reliable Complex Event Processing in the Internet of Things - Trust-Based and Flexible Execution of Event Processing Operators in Dynamic Distributed Environments.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7213],
[Ph.D. Thesis]

Heuss, Oliver (2018):
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7337],
[Ph.D. Thesis]

Lemos, Marcilio O. O. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, Elsevier, pp. 45-67, 94, ISSN 2352-2216,
[Article]

Gil Dantas, Yuri and Gay, Richard and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Schulz, Matthias (2018):
Teaching Your Wireless Card New Tricks: Smartphone Performance and Security Enhancements Through Wi-Fi Firmware Modifications.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7243],
[Ph.D. Thesis]

Reif, Michael and Eichberg, Michael and Mezini, Mira
Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
Call Graph Construction for Java Libraries.
Bonn, Gesellschaft für Informatik, In: Software Engineering und Software Management 2018, Bonn, [Conference or Workshop Item]

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Reinke, Kathrin (2018):
Always Online: Boundary Management and Well-being of Knowledge Workers in the Age of Information and Communication Technology Use.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7578],
[Ph.D. Thesis]

Mogk, Ragnar and Salvaneschi, Guido and Mezini, Mira (2018):
Reactive Programming Experience with REScala.
In: Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming, New York, NY, USA, ACM, Nice, France, April 09 - 12, 2018, In: Programming'18 Companion, DOI: 10.1145/3191697.3214337,
[Conference or Workshop Item]

Reuter, Christian and Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, pp. in press, 2, (1), [Article]

Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...],
[Conference or Workshop Item]

Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...],
[Conference or Workshop Item]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...],
[Conference or Workshop Item]

Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...],
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Geisler, Stefan and Ludwig, Thomas and Pipek, Volkmar and Pottebaum, Jens
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...],
[Conference or Workshop Item]

Riebe, Thea and Nordmann, Alfred and Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, pp. 60-61, [Online-Edition: https://wissenschaft-und-frieden.de/seite.php?artikelID=2312],
[Article]

Ide, Tobias and Sumer, Vakur and Aldehoff, Larissa
Ojendal, Joakim and Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Reuter, Christian and Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), pp. v-viii, 10, (1), [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterPottebaum_Editori...],
[Article]

Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), pp. 1-19, 10, (1), DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
Portsmouth, UK, In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, [Conference or Workshop Item]

Reuter, Christian and Pottebaum, Jens (2018):
Special Issue on IT Support for Crisis and Continuity Management.
10, [Book]

Reuter, Christian and Backfried, Gerhard and Kaufhold, Marc-André and Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Online-Edition: http://idl.iscram.org/files/christianreuter/2018/1570_Christ...],
[Conference or Workshop Item]

Reuter, Christian and Ludwig, Thomas and Mischur, Patrick (2018):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), accepted, [Article]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, pp. 22-24, 2, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, pp. 64-66, 1, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpi...],
[Article]

Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), pp. 277-279, 34, (4), DOI: 10.1080/10447318.2018.1427833,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranP...],
[Article]

Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), pp. 280-294, 34, (4), DOI: 10.1080/10447318.2018.1427832,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_So...],
[Article]

Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker
Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 621-630, DOI: 10.1007/978-3-658-19523-6_30,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Mentler, Tilo (eds.) (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems - Special Issue.
Wiley, 26, (1), ISSN 0966-0879,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issu...],
[Journal]

Reuter, Christian
Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 3-14, DOI: 10.1007/978-3-658-19523-6_1,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Mentler, Tilo (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), Wiley, pp. 2-3, 26, (1), ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/a...],
[Article]

Reuter, Christian and Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Springer Vieweg, pp. 379-402, DOI: 10.1007/978-3-658-19523-6_19,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 573-595, DOI: 10.1007/978-3-658-19523-6_28,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André (2018):
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), Wiley, pp. 41-57, 26, (1), ISSN 0966-0879,
DOI: 10.1111/1468-5973.12196,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenY...],
[Article]

Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar
Reuter, Christian (ed.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 443-465, DOI: 10.1007/978-3-658-19523-6_22,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
Wiesbaden, Springer Vieweg (Lehrbuch/Fachbuch), ISBN 978-3-658-19522-9,
DOI: 10.1007/978-3-658-19523-6,
[Online-Edition: http://www.springer.com/de/book/9783658195229],
[Book]

Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda (eds.) (2018):
Social Media in Crisis Management - Special Issue.
Taylor & Francis Online, 34, ISSN 1532-7590,
[Online-Edition: https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList],
[Journal]

Reuter, Christian and Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 17-40, DOI: 10.1007/978-3-658-19523-6_2,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), pp. 1-16, DOI: 10.1111/1468-5973.12249,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...],
[Article]

Mogk, Ragnar and Baumgärtner, Lars and Salvaneschi, Guido and Freisleben, Bernd and Mezini, Mira
Millstein, Todd (ed.) (2018):
Fault-tolerant Distributed Reactive Programming.
Dagstuhl, Germany, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, July 16-21, 2018, In: Leibniz International Proceedings in Informatics (LIPIcs), 109, ISSN 1868-8969,
ISBN 978-3-95977-079-8,
DOI: 10.4230/LIPIcs.ECOOP.2018.1,
[Conference or Workshop Item]

Nordmann, Alfred and Reuter, Christian and Lederer, Markus (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, hrsg. von Josef Wiemeyer, Darmstadt, pp. 71-89, [Online-Edition: http://www.peasec.de/paper/2019/2019_LedererNordmannReuter_I...],
[Book Section]

2017

Schneider, Katharina and Reinke, Kathrin and Gerlach, Gisela and Anderson, Christoph and Wojtek, Sebastian and Neitzel, Svenja and Dwarakanath, Rahul and Boehnstedt, Doreen and Stock, Ruth (2017):
Aligning ICT-enabled Availability and Individual Availability Preferences: Design and Evaluation of Availability Management Applications.
In: Proceedings of the International Conference on Information Systems 2017, [Article]

Meurisch, Christian and Gedeon, Julien and Gogel, Artur and Nguyen, The An Binh and Kaup, Fabian and Kohnhäuser, Florian and Baumgärtner, Lars and Schmittner, Milan and Mühlhäuser, Max (2017):
Temporal Coverage Analysis of Router-based Cloudlets Using Human Mobility Patterns.
In: IEEE GLOBECOM, IEEE, [Conference or Workshop Item]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Master Thesis]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Master Thesis]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
London, UK, [Online-Edition: https://www.blackhat.com/eu-17/],
[Other]

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Online-Edition: https://encrypto.de/papers/GKS17.pdf],
[Conference or Workshop Item]

Schick, Oliver (2017):
Web application for privacy-preserving scheduling.
Darmstadt, Technische Universität, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Vasilomanolakis, Emmanouil and Wolf, Jan Helge and Böck, Leon and Mühlhäuser, Max and Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe, London, UK, [Conference or Workshop Item]

Stute, Milan and Maass, Max and Schons, Tom and Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: Proceedings of MSWiM '17, In: The 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, November 21-25, 2017, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7682],
[Conference or Workshop Item]

Meurisch, Christian and Gogel, Artur and Schmidt, Benedikt and Nolle, Timo and Janssen, Frederik and Schweizer, Immanuel and Mühlhäuser, Max (2017):
Capturing Daily Student Life by Recognizing Complex Activities Using Smartphones.
In: 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous), ACM, [Conference or Workshop Item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Bachelor Thesis]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Online-Edition: https://encrypto.de/papers/DHSS17.pdf],
[Conference or Workshop Item]

Li, Ximeng and Mantel, Heiko and Schickel, Johannes and Tasch, Markus and Weber, Alexandra and Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, pp. 88-99, 71, DOI: 10.1016/j.cose.2017.06.007,
[Article]

El Khoury, Mario and Duznovic, Ivana and Ali, Mubarak and Ensinger, Wolfgang and Schlaak, Helmut F. (2017):
Integration konischer Nanoporen in Lab-on-Chip-Systeme für die Histamin-Analyse.
In: Proceedings - Mikrosystemtechnik Kongress 2017, In: Mikrosystemtechnikkongress 2017, München, Unterschleißheim, Deutschland, 23.-25. Oktober 2017, [Conference or Workshop Item]

Nguyen, The An Binh and Agnihotri, Pratyush and Meurisch, Christian and Luthra, Manisha and Dwarakanath, Rahul and Blendin, Jeremias and Böhnstedt, Doreen and Zink, Michael and Steinmetz, Ralf (2017):
Efficient Crowd Sensing Task Distribution Through Context-aware NDN-based Geocast.
In: IEEE 42nd Conference on Local Computer Networks : LCN 2017 ; proceedings, IEEE, Singapore, 9-12 October 2017, DOI: 10.1109/LCN.2017.73,
[Conference or Workshop Item]

Kohnhäuser, Florian and Stute, Milan and Baumgärtner, Lars and Almon, Lars and Katzenbeisser, Stefan and Hollick, Matthias and Freisleben, Bernd (2017):
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
In: IEEE Conference on Local Computer Networks (LCN), IEEE, Singapore, [Conference or Workshop Item]

Baumgärtner, Lars and Kohlbrecher, Stefan and Euler, Juliane and Ritter, Tobias and Stute, Milan and Meurisch, Christian and Mühlhäuser, Max and Hollick, Matthias and Stryk, Oskar von and Freisleben, Bernd (2017):
Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, [Conference or Workshop Item]

Lakeman, Jeremy and Lloyd, Matthew and Challans, Romana and Wallace, Angus and Gardner-Stephen, Paul and Stute, Milan and Hollick, Matthias (2017):
A Practical and Secure Social Media Facility for Internet-Deprived Populations.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, San Jose, CA, USA, [Conference or Workshop Item]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelor Thesis]

Meister, Richard (2017):
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
Darmstadt, Technische Universität, [Master Thesis]

Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
Darmstadt, Technische Universität, [Master Thesis]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference or Workshop Item]

Lieser, Patrick and Richerzhagen, Nils and Feuerbach, Tim and Nguyen, The An Binh and Richerzhagen, Björn and Böhnstedt, Doreen and Steinmetz, Ralf (2017):
Decentralized Resource Allocation in Mobile Networks.
In: Demonstrations of the 42nd IEEE Conference on Local Computer Networks (LCN Demonstrations), IEEE, [Conference or Workshop Item]

Lieser, Patrick and Álvarez, Flor and Gardner-Stephen, Paul and Hollick, Matthias and Böhnstedt, Doreen (2017):
Architecture for Responsive Emergency Communication Networks.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, [Conference or Workshop Item]

Schulz, Matthias and Wegemer, Daniel and Hollick, Matthias (2017):
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
In: Proceedings of the 11th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH 2017), [Conference or Workshop Item]

Steinmetzer, Daniel and Loch, Adrian and García-García, Amanda and Widmer, Jörg and Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, In: Lecture Notes in Computer Science, 10707, [Conference or Workshop Item]

Hohmann, Fabian and Klein, Anja (2017):
Cooperative Forwarding using Distributed MISO in OFDMA Multihop Networks.
In: IEEE 86th Vehicular Technology Conference (VTC), Toronto, Canada, 24.-27. September 2017, [Conference or Workshop Item]

Ortiz Jimenez, Andrea Patricia and Al Shatri, Hussein and Li, Xiang and Weber, Tobias and Klein, Anja (2017):
Reinforcement Learning for Energy Harvesting Decode-and-Forward Two-Hop Communications.
In: IEEE Transactions on Green Communications and Networking, pp. 309-319, 1, (3), [Article]

Meurisch, Christian and Naeem, Usman and Scholl, Philipp and Azam, Muhammad Awais and Günther, Sebastian and Baumann, Paul and ur Réhman, Shafiq and Mühlhäuser, Max (2017):
SmartGuidance'17: 2nd Workshop on Intelligent Personal Support of Human Behavior.
In: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'17): Adjunct Publication, ACM, [Conference or Workshop Item]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Meurisch, Christian and Ionescu, Maria and Schmidt, Benedikt and Mühlhäuser, Max (2017):
Reference Model of Next-Generation Digital Personal Assistant: Integrating Proactive Behavior.
In: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'17): Adjunct Publication, ACM, [Conference or Workshop Item]

Schaller, A. and Schulz, S. and Kohnhäuser, F. and Katzenbeisser, S. (2017):
Boot Attestation: Secure Reporting for Off-The-Shelf IoT Sensors.
In: European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Hohmann, F. and Klein, A. (2017):
Cooperative Forwarding using Distributed MISO in OFDMA Multihop Networks.
In: IEEE Vehicular Technology Conference (VTC 2017-Fall), IEEE, [Conference or Workshop Item]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, p. 1, PP, DOI: 10.1109/COMST.2017.2748278,
[Article]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Traverso, Giulia and Cordero, Carlos Garcia and Nojoumian, Mehrdad and Azarderakhsh, Reza and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
In: 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, CA, 28.-30.8. 2017, [Online-Edition: https://www.ucalgary.ca/pst2017/],
[Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium, In: USENIX Security '17, [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Frieß, Tamara and Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session, Vancouver, Canada, [Other]

Lämmle, David (2017):
THz-Hohlleiter-Schalter basierend auf Nickel-Wanderkeilaktoren.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6649],
[Ph.D. Thesis]

Li, Xiang and Ortiz, A. and Al Shatri, Hussein and Klein, Anja and Weber, Tobias (2017):
Delay-Constrained Data Transmission for Energy Harvesting Traansmitter.
In: International ITG Conference on Systems, Communications and Coding SCC, Hamburg, Germany, 06.-09.02.2017, [Conference or Workshop Item]

Papsdorf, Daniel and Silva, Y. C. B. and Klein, Anja (2017):
Multicast Interference Alignment in a Multi-Group Multi-Way Relaying Network.
In: IEEE International Conference on Communications ICC, Paris, France, 21.-25.05.2017, [Conference or Workshop Item]

Ortiz Jimenez, Andrea Patricia and Al Shatri, Hussein and Li, Xiang and Weber, Tobias (2017):
Reinforcement Learning for Energy Harvesting Decode-and-Foreward Two-Hop Communications.
In: IEEE Transactions on Green Communications and Networking, [Article]

Meurisch, Christian and Nguyen, The An Binh and Gedeon, Julien and Kohnhäuser, Florian and Schmittner, Milan and Niemczyk, Stefan and Wullkotte, Stefan and Mühlhäuser, Max (2017):
Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge.
In: International Conference on Computer Communications and Networks (ICCCN'17): Posters, IEEE, [Conference or Workshop Item]

Meurisch, Christian and Gedeon, Julien and Nguyen, The An Binh and Kaup, Fabian and Mühlhäuser, Max (2017):
Decision Support for Computational Offloading by Probing Unknown Services.
In: ICCCN 2017, IEEE, In: International Conference on Computer Communications and Networks, Vancouver, Canada, July 31-August 3, 2017, DOI: 10.1109/ICCCN.2017.8038406,
[Conference or Workshop Item]

Gerber, Nina and Gerber, Paul and Hernando, Maria
Tryfonas, Theo (ed.) (2017):
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_44,
[Conference or Workshop Item]

Meurisch, Christian and Jeutter, Bennet and Schmidt, Wladimir and Gündling, Nickolas and Schmidt, Benedikt and Herrlich, Fabian and Mühlhäuser, Max (2017):
An Extensible Pervasive Platform for Large-scale Anticipatory Mobile Computing.
In: 41st Annual IEEE Computer Software and Applications Conference (COMPSAC'17), IEEE, [Conference or Workshop Item]

Meurisch, Christian and Nguyen, The An Binh and Wullkotte, Stefan and Niemczyk, Stefan and Kohnhäuser, Florian and Mühlhäuser, Max (2017):
NICER911: Ad-hoc Communication and Emergency Services Using Networking Smartphones and Wireless Home Routers.
In: International Symposium on Mobile Ad Hoc Netwroking and Computing (MobiHoc'17): Posters, ACM, [Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
In: International Conference on Human-Computer Interaction (HCII), Springer, 10292, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Zimmermann, Verena and Gerber, Nina
Tryfonas, Theo (ed.) (2017):
“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_18,
[Conference or Workshop Item]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Conference or Workshop Item]

Fuhry, Benny and Bahmani, Raad and Brasser, Ferdinand and Hahn, Florian and Kerschbaum, Florian and Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference or Workshop Item]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, [Conference or Workshop Item]

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 177-197, 2017, (4), DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],
[Article]

Kohnhäuser, F. and Büscher, N. and Gabmeyer, S. and Katzenbeisser, S. (2017):
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM, [Conference or Workshop Item]

Euler, J. and Stryk, Oskar von (2017):
Decentralized Data-Driven Control of Cooperating Sensor-Carrying UAVs in a Multi-Objective Monitoring Scenario.
In: World Congress of the International Federation of Automatic Control (IFAC), [Conference or Workshop Item]

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Schulz, Matthias and Hollick, Matthias and Gringoli, Francesco and Deligeorgopoulos, Efstathios (2017):
DEMO: Demonstrating Reactive Smartphone-Based Jamming.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), ACM, ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3106022,
[Conference or Workshop Item]

Schulz, Matthias and Gringoli, Francesco and Koch, Michael and Steinmetzer, Daniel and Hollick, Matthias (2017):
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3098253,
[Conference or Workshop Item]

Meurisch, Christian and Nguyen, The An Binh and Kromm, Martin and Ortiz, Andrea and Mogk, Ragnar and Mühlhäuser, Max (2017):
DisVis 2.0: Decision Support for Rescue Missions Using Predictive Disaster Simulations with Human-centric Models.
In: ICCCN 2017, IEEE, In: 26th International Conference on Computer Communications and Networks, Vancouver, Canada, July 31-August 3, 2017, DOI: 10.1109/ICCCN.2017.8038474,
[Conference or Workshop Item]

Yalame, Mohammad Hossein and Farzam, Mohammad Hossein and Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17), Springer, [Conference or Workshop Item]

Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, [Conference or Workshop Item]

Gedeon, Julien and Meurisch, Christian and Bhat, Disha and Stein, Michael and Wang, Lin and Mühlhäuser, Max (2017):
Router-based Brokering for Surrogate Discovery in Edge Computing.
In: The 9th International Workshop on Hot Topics in Planet-­Scale Mobile Computing and ​Online Social Networking (HotPOST'17), Atlanta, GA, USA, June 5, 2017, [Conference or Workshop Item]

Schmittner, Milan and Asadi, Arash and Hollick, Matthias (2017):
SEMUD: Secure Multi-hop Device-to-Device Communication for 5G Public Safety Networks.
In: IFIP Networking Conference, IFIP, Stockholm, Sweden, [Conference or Workshop Item]

Sterz, A. and Baumgärtner, L. and Mogk, R. and Mezini, M. and Freisleben, B. (2017):
DTN-RPC: Remote Procedure Calls for Disruption-Tolerant Networking.
In: IFIP Networking 2017 Conference, IFIP, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, pp. 24-29, 15, (3), DOI: 10.1109/MSP.2017.70,
[Article]

Weickhmann, Christian (2017):
Liquid Crystals Towards Terahertz: Characterisation and Tunable Waveguide Phase Shifters for Millimetre-Wave and Terahertz Beamsteering Antennas.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6216],
[Ph.D. Thesis]

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Springer, Rome, Italy, 502, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Dwarakanath, R. and Koldehofe, B. and Bharadwaj, Y. and Nguyen, T. A. B. and Steinmetz, R. (2017):
TrustCEP: Adopting a Trust-based Approach for Distributed Complex Event Processing.
In: IEEE International Conference on Mobile Data Management (MDM), IEEE, [Conference or Workshop Item]

Euler, J. and Stryk, Oskar von (2017):
Optimized Vehicle-Specific Trajectories for Cooperative Process Estimation by Sensor-Equipped UAVs.
In: IEEE International Conference on Robotics and Automation (ICRA), IEEE, [Conference or Workshop Item]

Papsdorf, D. and Silva, Y. and Klein, A. (2017):
Multicast Interference Alignment in a Multi-Group Multi-Way Relaying Network.
In: IEEE International Conference on Communications (ICC), IEEE, [Conference or Workshop Item]

Dwarakanath, Rahul and Koldehofe, Boris and Bharadwaj, Yashas and Nguyen, The An Binh and Eyers, David and Steinmetz, Ralf (2017):
TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing.
In: IEEE International Conference on Mobile Data Management (MDM), IEEE, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, [Conference or Workshop Item]

Zimmermann, Verena and Volkamer, Melanie and Vogt, Joachim and Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, pp. 308-313, 41, [Article]

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Portela, Bernardo and Barbosa, Manuel and Scerri, Guillaume and Warinschi, Bogdan and Bahmani, Raad and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Seeliger, Alexander and Nolle, Timo and Mühlhäuser, Max
Mühlhäuser, Max and Zehbold, Cornelia (eds.) (2017):
Detecting Concept Drift in Processes using Graph Metrics on Process Graphs.
In: Proceedings of the 9th International Conference on Subject-oriented Business Process Management (S-BPM-ONE), New York, NY, USA, ACM, Darmstadt, Germany, In: S-BPM ONE '17, 9, ISBN 978-1-4503-4862-1/17/03,
DOI: 10.1145/3040565.3040566,
[Conference or Workshop Item]

Nguyen, The An Binh and Meurisch, Christian and Niemczyk, Stefan and Böhnstedt, Doreen and Geihs, Kurt and Mühlhäuser, Max and Steinmetz, Ralf (2017):
Adaptive Task-Oriented Message Template for In-Network Processing.
In: 2017 International Conference on Networked Systems (NetSys), IEEE, In: International Conference on Networked Systems ; NetSys, Göttingen, 13-16 März 2017, DOI: 10.1109/NetSys.2017.7903952,
[Conference or Workshop Item]

Nguyen, The An Binh and Meurisch, Christian and Niemczyk, Stefan and Klos, Christian and Böhnstedt, Doreen and Steinmetz, Ralf (2017):
Facilitating Volunteer Computing Resources for In-Network Processing through Message Template.
In: 2017 International Conference on Networked Systems (NetSys), IEEE, Göttingen, DOI: 10.1109/NetSys.2017.7931515,
[Online-Edition: http://netsys17.uni-goettingen.de/?page_id=870],
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Pascoal, Túlio A. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, Springer, [Conference or Workshop Item]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Online-Edition: https://encrypto.de/papers/NST17.pdf],
[Conference or Workshop Item]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Conference or Workshop Item]

Li, X. and Ortiz, A. and Al-Shatri, Hussein and Klein, Anja and Weber, Tobias (2017):
Delay-Constrained Data Transmission for Energy Harvesting Transmitter.
In: ITG Conference on Systems, Communications and Coding (SCC), [Conference or Workshop Item]

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Online-Edition: https://encrypto.de/papers/RSSSK17.pdf],
[Article]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference or Workshop Item]

Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937],
[Ph.D. Thesis]

Schneider, Christopher (2017):
Design, implementation and characterization of synthetic riboswitches in Saccharomyces cerevisiae.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6133],
[Ph.D. Thesis]

Deckwerth, Frederik (2017):
Static Verification Techniques for Attributed Graph Transformations.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6150],
[Ph.D. Thesis]

Gerber, Paul and Volkamer, Melanie and Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Asadi, Arash and Mancuso, Vincenzo and Gupta, Rohit (2017):
DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks.
In: IEEE/ACM Transactions on Networking, [Article]

Sim, Gek Hong and Asadi, Arash and Loch, Adrian and Hollick, Matthias and Widmer, Jörg (2017):
mm-Broker: Managing Directionality and Mobility Issues of Millimeter-Wave via D2D Communication.
In: International Conference on Communication Systems & Networks, IEEE, [Conference or Workshop Item]

Loch, Adrian and Asadi, Arash and Sim, Gek Hong and Widmer, Jörg and Hollick, Matthias (2017):
mm-Wave on Wheels: Practical 60 GHz Vehicular Communication Without Beam Training.
In: International Conference on Communication Systems & Networks, IEEE, [Conference or Workshop Item]

Baumgärtner, L. and Graubner, P. and Höchst, J. and Klein, A. and Freisleben, B. (2017):
Speak Less Hear Enough: On Dynamic Announcement Intervals in Wireless On-demand Networks.
In: IEEE/IFIP Conference on Wireless On-demand Network Systems and Services Conference (WONS), IEEE, [Conference or Workshop Item]

Graubner, Pablo and Sommer, Markus and Hollick, Matthias and Freisleben, Bernd (2017):
Dynamic Role Assignment in Software-Defined Wireless Networks.
In: IEEE Symposium on Computers and Communication (ISCC), IEEE, [Conference or Workshop Item]

Lampe, P. and Baumgärtner, L. and Steinmetz, R. and Freisleben, B. (2017):
SmartFace: Efficient Face Detection on Smartphones for Wireless On-demand Emergency Networks.
In: International Conference on Telecommunications (ICT), [Conference or Workshop Item]

Lieser, P. and Richerzhagen, N. and Feuerbach, T. and Böhnstedt, D. and Steinmetz, R. (2017):
Take it or Leave it: Decentralized Resource Allocation in Mobile Networks.
In: IEEE Conference on Local Computer Networks (LCN), IEEE, [Conference or Workshop Item]

Mdhaffar, Afef and Chaari, Tarak and Larbi, Kaouthar and Jmaiel, Mohamed and Freisleben, Bernd (2017):
IoT-based Health Monitoring via LoRaWAN.
In: IEEE International Conference on Smart Technologies (EUROCON), IEEE, [Conference or Workshop Item]

Mogk, Ragnar and Drechsler, Joscha (2017):
REScala – Principled Distributed Reactive Programming.
In: Poster <Programming>, [Conference or Workshop Item]

Mogk, Ragnar and Drechsler, Joscha (2017):
Demo: Reactive Programming with REScala.
In: Demo <Programming>, [Conference or Workshop Item]

Meuser, T. and Lieser, P. and Nguyen, T. A. B. and Böhnstedt, D. and Steinmetz, R. (2017):
Adaptive Information Aggregation for Application-specific Demands.
In: First International Balkan Conference on Communications and Networking (BalkanCom), [Conference or Workshop Item]

Niemczyk, Stefan and Fredivianus, Nugroho and Geihs, Kurt (2017):
On-the-Fly Transformation Synthesis for Information Sharing in Heterogeneous Multi-Agent Systems.
In: Intelligent Robotics and Multi-Agent Systems (IRMAS), ACM, [Conference or Workshop Item]

Niemczyk, Stefan and Opfer, Stephan and Fredivianus, Nugroho and Geihs, Kurt (2017):
ICE – Self-Configuration of Information Processing in Heterogeneous Agent Teams.
In: ACM Dependable, Adaptive, and Trustworthy Distributed Systems (DADS), ACM, [Conference or Workshop Item]

Schmidt, Nils and Baumgärtner, Lars and Lampe, Patrick and Geihs, Kurt and Freisleben, Bernd (2017):
MiniWorld: Resource-aware Distributed Network Emulation via Full Virtualization.
In: IEEE Symposium on Computers and Communications, IEEE, [Conference or Workshop Item]

Teklehaymanot, F. and Muma, M. and Zoubir, A. M. (2017):
Adaptive Diffusion-Based Track Assisted Multi-Object Labeling in Distributed Camera Networks.
In: European Signal Processing Conference (EUSIPCO), [Conference or Workshop Item]

Ortiz, Andrea and Al-Shatri, H. and Li, X. and Weber, T. and Klein, A. (2017):
Reinforcement Learning for Energy Harvesting Decode-and-Forward Two-Hop Communications.
In: IEEE Transactions on Green Communications and Networking (accepted for publication), [Article]

Tundis, Andrea and Cordero, Carlos Garcia and Egert, Rolf and Garro, Alfredo and Mühlhäuser, Max (2017):
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
In: ICCPS 2017: 19th International Conference on Cyber-Physical Systems, WASET, [Conference or Workshop Item]

Borges, Fábio and Lara, Pedro and Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, pp. 406--416, 292, DOI: 10.1016/j.amc.2016.07.036,
[Article]

Li, Ximeng and Mantel, Heiko and Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Hermann, Ben and Li, Ximeng and Mantel, Heiko and Mezini, Mira and Tasch, Markus and Wendel, Florian and Weber, Friedrich (2017):
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
[Report]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Dewald, Florian and Mantel, Heiko and Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Mantel, Heiko and Weber, Alexandra and Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Pottebaum, Jens and Reuter, Christian (eds.) (2017):
Special Issue on IT-Support for Critical Infrastructure Protection.
Hershey, Pa., IGI Global, 9, (4), ISSN 1937-9420,
[Journal]

Pottebaum, Jens and Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), IGI Global, pp. iv-vii, 9, (4), ISSN 1937-9420,
[Online-Edition: http://www.peasec.de/paper/2017/2017_PottebaumReuter_Editori...],
[Article]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...],
[Article]

Reinhold, Thomas and Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...],
[Other]

von Drachenfels, Magdalena and Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de, Frankfurt a.M., [Other]

Riebe, Thea and Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de, Frankfurt a.M., [Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...],
[Other]

Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), pp. 103-121, 102, (C), DOI: 10.1016/j.ijhcs.2016.09.008,
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016_Ludwigetal_Situa...],
[Article]

Leopold, Inken and Reuter, Christian
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0350,
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", pp. 78-88, 7, (1), [Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...],
[Article]

Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah
Klafft, Michael (ed.) (2017):
Informing the Population: Mobile Warning Apps.
In: Risk and Crisis Communication in Disaster Prevention and Management, Wilhelmshaven, epubli, pp. 31-41, [Online-Edition: http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-45272...],
[Book Section]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon
Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...],
[Conference or Workshop Item]

Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), pp. 959-1003, 26, (4-6), DOI: 10.1007/s10606-017-9291-z,
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z],
[Article]

Reuter, Christian and Pätsch, Katja and Runft, Elena
Leimeister, J. M. and Brenner, W. (eds.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
St. Gallen, Switzerland, In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, [Online-Edition: https://aisel.aisnet.org/wi2017/track06/paper/6/],
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0380,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS0...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas
Paterno, Fabio and Wulf, Volker (eds.) (2017):
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development, Springer, pp. 307-332, DOI: 10.1007/978-3-319-60291-2_12,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLudwig_EU...],
[Book Section]

Kaufhold, Marc-André and Reuter, Christian
Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), Albi, France, In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker
Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela (eds.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), Göttingen, Vandenhoeck & Ruprecht, pp. 207-224, DOI: 10.14220/digo.2017.38.1.207,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchet...],
[Book Section]

Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0352,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI...],
[Conference or Workshop Item]

Reuter, Christian and Pätsch, Katja and Runft, Elena (2017):
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, pp. 181-195, 16, (2), DOI: 10.1515/icom-2017-0013,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITfo...],
[Article]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2017):
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, pp. 1-19, 1, (Issue CSCW), DOI: 10.1145/3134725,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian
Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen (eds.) (2017):
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, Berlin, Germany, Springer, pp. 75-88, DOI: 10.1007/978-3-319-44711-7_7,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_...],
[Book Section]

Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0386,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236],
[Conference or Workshop Item]

Reuter, Christian and Spielhofer, Thomas (2017):
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Journal Technological Forecasting and Social Change (TFSC), pp. 168-180, 121, DOI: 10.1016/j.techfore.2016.07.038,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2016/2016_reuterspiel...],
[Article]

Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah (2017):
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
Guimar\~es, Portugal, In: European Conference on Information Systems (ECIS), Guimar\~es, Portugal, [Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKn...],
[Conference or Workshop Item]

Pinatti de Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
Sheffield, UK, In: Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK, [Online-Edition: https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-...],
[Conference or Workshop Item]

Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws17-0416,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3243],
[Conference or Workshop Item]

Pottebaum, Jens and Erfurth, Christian and Reuter, Christian
Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Steinfort, René
Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
Albi, France, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France, [Online-Edition: http://idl.iscram.org/files/christianreuter/2017/1492_Christ...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws01-0384,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3214],
[Conference or Workshop Item]

Almon, Lars and Riecker, Michael and Hollick, Matthias (2017):
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
IEEE, In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9-12 Oct. 2017, DOI: 10.1109/LCN.2017.110,
[Online-Edition: https://ieeexplore.ieee.org/document/8109386],
[Conference or Workshop Item]

2016

Seeliger, Alexander and Nolle, Timo and Schmidt, Benedikt and Mühlhäuser, Max (2016):
Process Compliance Checking using Taint Flow Analysis.
In: Proceedings of the 37th International Conference on Information Systems (ICIS), AIS, Dublin, Ireland, 37, [Conference or Workshop Item]

Gerber, Paul and Renaud, Karen and Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, pp. 8-26, 34, (1), DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Ortiz, A. and Al-Shatri, H. and Li, X. and Weber, T. and Klein, A. (2016):
A Learning Based Solution for Energy Harvesting Decode-and-Forward Two-Hop Communications.
In: IEEE Global Communications Conference (Globecom), IEEE, [Conference or Workshop Item]

Cordero, Carlos Garcia and Hauke, Sascha and Mühlhäuser, Max and Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Moschner, K. and Blazhev, A. and Jolie, J. and Warr, N. and Boutachkov, P. and Bednarczyk, P. and Sieja, K. and Algora, A. and Ameil, F. and Bentley, M. A. and Brambilla, S. and Braun, N. and Camera, F. and Cederkaell, J. and Corsi, A. and Danchev, M. and DiJulio, D. and Fahlander, C. and Gerl, J. and Giaz, A. and Golubev, P. and Gorska, M. and Grebosz, J. and Habermann, T. and Hackstein, M. and Hoischen, R. and Kojouharov, I. and Kurz, N. and Margincan, N. and Merchan, E. and Moeller, T. and Naqvi, F. and Singh, B. S. Nara and Nociforo, C. and Pietralla, N. and Pietri, S. and Podolyak, Zs. and Prochazka, A. and Reese, M. and Reiter, P. and Rudigier, M. and Rudolph, D. and Sava, T. and Schaffner, H. and Scruton, L. and Taprogge, J. and Thomas, T. and Weick, H. and Wendt, A. and Wieland, O. and Wollersheim, H.-J. (2016):
Relativistic Coulomb excitation of Kr-88.
In: PHYSICAL REVIEW C, 94, (5), ISSN 2469-9985,
[Article]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Zhang, Xiaoyi (2016):
Development of a sensor electronic for chemical and biological sensors based on ion conducting nanopores.
TU Darmstadt, [Master Thesis]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Conference or Workshop Item]

Werner, M. and Kratschmann, D. and Hollick, Matthias (2016):
Panopticon: Supervising Network Testbed Resources.
In: 41st Conference on Local Computer Networks (IEEE LCN, Demo Track), [Conference or Workshop Item]

El Khoury, Mario and Quednau, Sebastian and Duznovic, Ivana and Ensinger, Wolfgang and Schlaak, Helmut F. (2016):
Integration of Nanochannels for Lab-on-Chip-Systems.
In: GMM-Fachbericht 86: Mikro-Nano-Integration, Duisburg, 05.- 06. Oktober 2016, [Online-Edition: http://ieeexplore.ieee.org/document/7776085/],
[Conference or Workshop Item]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, pp. 64-75, 3, (5), [Article]

Kauschke, Sebastian and Fürnkranz, Johannes and Janssen, Frederik (2016):
Predicting Cargo Train Failures: A Machine Learning Approach for a Lightweight Prototype.
In: Discovery Science - 19th International Conference, DS 2016, Bari, Italy, October 19-21, 2016, Proceedings, Cham, Springer, Bari, Italy, October 19–21, 2016, ISBN 978-3-319-46306-3,
DOI: 10.1007/978-3-319-46307-0_10,
[Conference or Workshop Item]

Nolle, Timo and Seeliger, Alexander and Mühlhäuser, Max
Calders, Toon and Ceci, Michelangelo and Malerba, Donato (eds.) (2016):
Unsupervised Anomaly Detection in Noisy Business Process Event Logs Using Denoising Autoencoders.
In: Discovery Science: 19th International Conference, DS 2016, Bari, Italy, Proceedings, Calders, Toon Ceci, Michelangelo Malerba, Donato, Bari, Italy, ISBN 978-3-319-46307-0,
DOI: 10.1007/978-3-319-46307-0_28,
[Conference or Workshop Item]

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, pp. 400-415, 24, (4), DOI: 10.1108/ICS-06-2015-0024,
[Article]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Ibrahim, Ahmad and Conti, Mauro and Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Stahn, Michael and Cordero, Carlos Garcia and Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, Vienna, Austria, In: CCS '16, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Meurisch, Christian (2016):
Intelligent Personal Guidance of Human Behavior Utilizing Anticipatory Models.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'16): Adjunct Publication, ACM, Heidelberg, [Conference or Workshop Item]

Papsdorf, D. and Li, X. and Weber, T. and Klein, A. (2016):
Inter-Subnetwork Interference Minimization in Partially Connected Two-Way Relaying Networks.
In: IEEE Vehicular Technology Conference (VTC 2016-Fall), IEEE, [Conference or Workshop Item]

Kohnhäuser, Florian and Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference or Workshop Item]

Kolb, Nina
Prinz, Wolfgang and Borchers, Jan and Jarke, Matthias (eds.) (2016):
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
In: Mensch und Computer 2016 - Tagungsband, Gesellschaft für Informatik e.V., Aachen, DOI: 10.18420/muc2016-mci-0075,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, pp. 372-385, 24, (4), DOI: 10.1108/ICS-07-2015-0032,
[Article]

Reinheimer, Benjamin and Braun, Kristoffer and Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“, Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Mohan, Vaishnavi and Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), [Conference or Workshop Item]

Ali, Azmzt and Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Conference or Workshop Item]

Meurisch, Christian and Naeem, Usman and Azam, Muhammad Awais and Janssen, Frederik and Schmidt, Benedikt and Mühlhäuser, Max (2016):
Smarticipation2016: First Workshop on Intelligent Personal Guidance of Human Behavior Utilizing Anticipatory Models.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'16): Adjunct Publication, ACM, Heidelberg, [Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

McGrew, David and Kampanakis, Panos and Fluhrer, Scott and Gazdag, Stefan-Lukas and Butin, Denis and Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016), Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Zheng, Yao and Schulz, Matthias and Lou, Wenjing and Hou, Thomas and Hollick, Matthias (2016):
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2939933,
[Conference or Workshop Item]

Gagliardoni, Tommaso and Hülsing, Andreas and Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: Advances in Cryptology – CRYPTO 2016, Springer, In: LNCS, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, 10., [Conference or Workshop Item]

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Schulz, Matthias and Loch, Adrian and Hollick, Matthias (2016):
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942418,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Frassetto, Tommaso and Homescu, Andrei and Koppen, Georg and Larsen, Per and Liebchen, Christopher and Perry, Mike and Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference or Workshop Item]

Schulz, Matthias and Klapper, Patrick and Hollick, Matthias and Tews, Erik (2016):
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2940650,
[Conference or Workshop Item]

Schulz, Matthias and Wegemer, Daniel and Hollick, Matthias (2016):
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942419,
[Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Lettner, Julian and Kollenda, Benjamin and Homescu, Andrei and Larsen, Per and Schuster, Felix and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Conference or Workshop Item]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Darmstadt, Technische Universität, [Bachelor Thesis]

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), ACM, DOI: 10.1145/2897937.2898027,
[Online-Edition: https://encrypto.de/papers/SZDSSK16.pdf],
[Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
Springer, In: SpringerBriefs in Computer Science, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Book]

Fernando, Ruchith and Ranchal, Rohit and An, Byungchan and Othmane, Lotfi Ben and Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud, [Conference or Workshop Item]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie and Mayer, Peter and Kunz, Alexandra and Rack, Philipp and Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Schmittner, Milan and Hollick, Matthias (2016):
Xcastor: Secure and Scalable Group Communication in Ad Hoc Networks.
In: IEEE Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, [Conference or Workshop Item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, [Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Werner, M. and Schwandke, J. and Hollick, Matthias and Hohlfeld, O. and Zimmermann, T. and Wehrle, K. (2016):
STEAN: A Storage and Transformation Engine for Advanced Networking Context.
In: IFIP Networking Conference (IFIP Networking), Vienna, DOI: 10.1109/IFIPNetworking.2016.7497203,
[Conference or Workshop Item]

Kiss, Ágnes and Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Online-Edition: https://encrypto.de/papers/KS16.pdf],
[Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, pp. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
In: Datenschutz und Datensicherheit, 5/2016, DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Fischer, Mathias and Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering, ACM, Austin, Texas, USA, [Conference or Workshop Item]

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, 1575, [Conference or Workshop Item]

Rauzy, Pablo and Kiss, Ágnes and Krämer, Juliane and Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference or Workshop Item]

Valipour, Siavash and Volk, Florian and Grube, Tim and Böck, Leon and Mühlhäuser, Max (2016):
A Formal Holon Model for Operating Future Energy Grids During Blackouts.
In: 5th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Rome, Italy, IEEE, Rome, Italy, 1, ISBN 978-989-758-184-7,
DOI: 10.5220/0005768801460153,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7951346],
[Conference or Workshop Item]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, pp. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Vasilomanolakis, Emmanouil and Cordero, Carlos Garcia and Milanov, Nikolay and Mühlhäuser, Max (2016):
Towards the creation of synthetic, yet realistic, intrusion detection datasets <b>(best paper award)</b>.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), IEEE, Istanbul, Turkey, ISBN 978-1-5090-0223-8,
DOI: 10.1109/NOMS.2016.7502989,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Srinivasa, Shreyas and Cordero, Carlos Garcia and Mühlhäuser, Max (2016):
Multi-stage Attack Detection and Signature Generation with ICS Honeypots.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), IEEE, ISBN 978-1-5090-0223-8,
DOI: 10.1109/NOMS.2016.7502992,
[Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters), San Francisco, [Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

Zeitouni, Shaza and Oren, Yossef and Wachsmann, Christian and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Article]

McLaughlin, Stephen and Konstantinou, Charalambos and Wang, Xueyang and Davi, Lucas and Sadeghi, Ahmad-Reza and Maniatakos, Michail and Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP, (99), DOI: 10.1109/JPROC.2015.2512235,
[Article]

Binder, P. and Muma, M. and Zoubir, A. M. (2016):
Robust and Adaptive Diffusion-based Classification in Distributed Networks.
In: EURASIP Journal on Advances in Signal Processing: Advances in adaptive filtering theory and applications to acoustic and speech signal processing, [Article]

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kulyk, Oksana and Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, [Conference or Workshop Item]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master Thesis]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference or Workshop Item]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Strohbach, Martin and Daubert, Jörg and Ravkin, Herman and Lischka, Mario
Curry, Edward and Wahlster, Wolfgang (eds.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, Springer, pp. 119-141, DOI: 10.1007/978-3-319-21569-3,
[Book Section]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference or Workshop Item]

Heuser, Stephan (2016):
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663],
[Ph.D. Thesis]

Engel, Andreas (2016):
A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-Intensive Distributed Applications.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5778],
[Ph.D. Thesis]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Cham, Springer, pp. 47-71, [Online-Edition: https://doi.org/10.1007/978-3-319-49175-2],
[Book Section]

Sadeghi, Ahmad-Reza and Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference, [Conference or Workshop Item]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference, ACM, In: DAC '16, [Conference or Workshop Item]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Vigil, Martín and Demirel, Denise and Habib, Sheikh Mahbub and Hauke, Sascha and Buchmann, Johannes and Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Grube, Tim and Schiffner, Stefan and Kikiras, Panayotis and Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), Elsevier, pp. 42-53, 76, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

Asadi, Arash and Mancuso, Vincenzo (2016):
Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice.
In: IEEE Transactions on Mobile Computing, [Article]

Sim, Gek Hong and Loch, Adrian and Asadi, Arash and Mancuso, Vincenzo and Widmer, Jörg (2016):
5G Millimeter-Wave and D2D Symbiosis: 60 GHz for Proximity-based Services.
In: IEEE Wireless Communication Magazine, [Article]

Mancuso, Vincenzo and Asadi, Arash and Jacko, Peter (2016):
Tie-breaking Can Maximize Fairness without Sacrificing Throughput in D2D-assisted Networks.
In: International Symposium on a World of Wireless, Mobile and Multimedia Networks, IEEE, [Conference or Workshop Item]

Sim, Gek Hong and Nitsche, Thomas and Widmer, Jörg (2016):
Addressing MAC Layer Inefficiency and Deafness of IEEE802.11ad Millimeter Wave Networks using a Multi-Band Approach.
In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), [Conference or Workshop Item]

Sim, Gek Hong and Li, Rui and Cano, Cristina and Patras, Paul and Malone, David and Widmer, Jörg (2016):
Learning from Experience: Efficient Decentralized Scheduling for 60GHz Mesh Networks.
In: The 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2016), [Conference or Workshop Item]

Loch, Adrian and Sim, Gek Hong (2016):
Millimeter-Wave Blind Spots: Mitigating Deafness Collisions Using Frame Aggregation.
In: Millimeter-wave Networking Workshop 2016, in conjunction with the 35th IEEE International Conference on Computer Communications (IEEE INFOCOM 2016), [Article]

Sim, Gek Hong and Widmer, Jörg (2016):
Finite Horizon Opportunistic Multicast Beamforming.
In: IEEE Transactions on Wireless Communications, [Article]

Baumgärtner, Lars and Gardner-Stephen, Paul and Graubner, Pablo and Lakeman, Jeremy and Höchst, Jonas and Lampe, Patrick and Schmidt, Nils and Schulz, Stefan and Sterz, Artur and Freisleben, Bernd (2016):
An Experimental Evaluation of Delay-Tolerant Networking with Serval.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, [Conference or Workshop Item]

Kohlbrecher, S. and Stryk, Oskar von (2016):
From RoboCup Rescue to supervised autonomous mobile robots for remote inspection of industrial plants.
In: KI - Künstliche Intelligenz, p. 311, 30, (3), [Article]

Ortiz, A. and Al-Shatri, H. and Li, X. and Weber, T. and Klein, A. (2016):
Reinforcement Learning for Energy Harvesting Point-to-Point Communications.
In: IEEE International Conference on Communications (ICC), IEEE, [Conference or Workshop Item]

Opfer, Stephan and Geihs, Kurt and Niemczyk, Stefan (2016):
Multi-Agent Plan Verification with Answer Set Programming.
In: ACM Workshop on Model-Driven Robot Software Engineering (MORSE), ACM, [Conference or Workshop Item]

Halvani, Oren and Winter, Christian and Pflug, Anika (2016):
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, pp. S33–S43, 16, (supplement), DOI: 10.1016/j.diin.2016.01.006,
[Article]

2015

Davi, Lucas and Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Larsen, Per and Brunthaler, Stefan and Davi, Lucas and Sadeghi, Ahmad-Reza and Franz, Michael (2015):
Automated Software Diversity.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie (2015):
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance, 1, [Book]

Vasilomanolakis, Emmanouil and Kruegl, Matthias and Cordero, Carlos Garcia and Fischer, Mathias and Mühlhäuser, Max (2015):
SkipMon: a Locality-Aware Collaborative Intrusion Detection System.
In: International Performance Computing and Communications Conference (IPCCC), IEEE, Nanjing, China, ISBN 978-1-4673-8590-9,
DOI: 10.1109/PCCC.2015.7410282,
[Conference or Workshop Item]

Mayer, Peter and Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: Proceedings of the 31st Annual Computer Security Applications Conference, ACM, Los Angeles, CA, USA, In: ACSAC 2015, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Meurisch, Christian and Yakkundimath, Ashwinkumar and Schmidt, Benedikt and Mühlhäuser, Max (2015):
Upgrading Wireless Home Routers as Emergency Cloudlet: A Runtime Measurement.
In: Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Springer, Berlin, Germany, November 12-13, 2015, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 162, ISBN 978-3-319-29002-7,
[Conference or Workshop Item]

Volk, Florian and Trüschler, Nadine and Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, IARIA, Barcelona, Spain, ISBN 978-1-61208-440-4,
[Conference or Workshop Item]

Krämer, Juliane and Kiss, Ágnes and Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Coudert, Fanny and Butin, Denis and Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), pp. 749-762, 31, (6), [Article]

Dagdelen, Özgür and Gajek, Sebastian and Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, In: LNCS, [Conference or Workshop Item]

Othmane, Lotfi Ben and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim (2015):
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
[Report]

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015, [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Kühne, Alexander and Klein, Anja (2015):
OFDMA for wireless multihop networks: From theory to practice.
In: Pervasive and Mobile Computing, pp. 104--121, 23, DOI: 10.1016/j.pmcj.2015.07.003,
[Article]

Saissi, Habib and Bokor, Peter and Suri, Neeraj (2015):
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, [Conference or Workshop Item]

Ta, Vinh-Thong and Butin, Denis and Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: Annual Privacy Forum (APF2015), Springer, Luxembourg, In: LNCS, [Conference or Workshop Item]

Steinebach, Martin and Schäfer, Marcel and Winter, Christian (2015):
Datenschutz im Zeitalter von Big Data.
In: Wissensmanagement – Das Magazin für Führungskräfte, pp. 29–31, 17. Jahrgang, (Heft 7/2015 (Ausgabe Okto), [Article]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, pp. 747-752, 11/2015, DOI: 10.1007/s11623-015-0512-7,
[Article]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Crane, Stephen and Volckaert, Stijn and Schuster, Felix and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Sutter, Bjorn De and Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Negro, Marco and Qunaibit, Mohaned and Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Falzon, Kevin and Bodden, Eric
Lopez, Javier and Mitchell, Chris J. (eds.) (2015):
Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Information Security, In: Information Security Conference, Trondheim, In: Lecture Notes in Computer Science, 9290, [Conference or Workshop Item]

Meurisch, Christian and Schmidt, Benedikt and Scholz, Michael and Schweizer, Immanuel and Mühlhäuser, Max (2015):
Labels - Quantified Self App for Human Activity Sensing.
In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'15): Adjunct Publication, ACM, Osaka, Japan, ISBN 978-1-4503-3575-1,
DOI: 10.1145/2800835.2801612,
[Conference or Workshop Item]

Schmidt, Benedikt and Benchea, Sebastian and Eichin, Rüdiger and Meurisch, Christian (2015):
Fitness Tracker or Digital Personal Coach: How to Personalize Training.
In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'15): Adjunct Publication, ACM, Osaka, Japan, ISBN 978-1-4503-3575-1,
DOI: 10.1145/2800835.2800961,
[Conference or Workshop Item]

Funke, Sebastian and Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis and Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), poster proceedings, IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Steinmetzer, Daniel and Chen, Joe and Classen, Jiska and Knightly, Edward and Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS), Florence, DOI: 10.1109/CNS.2015.7346844,
[Conference or Workshop Item]

Kolb, Nina and Diefenbach, Sarah and Niklas, Susanne
Endmann, Anja and Fischer, Holger and Krökel, Malte (eds.) (2015):
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
In: Mensch und Computer 2015 – Usability Professionals, De Gruyter Oldenbourg, Stuttgart, [Conference or Workshop Item]

Othmane, Lotfi Ben and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim and Miseldine, Philip (2015):
Factors Impacting the Effort Required to Fix Security Vulnerabilities.
In: Proc. of the 18th Information Security Conference (ISC 2015), [Conference or Workshop Item]

Lilien, Leszek and Othmane, Lotfi Ben and Angin, Pelin and Bhargava, Bharat and Salih, Raed and DeCarlo, Andrew (2015):
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
In: Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW), [Conference or Workshop Item]

Germanus, Daniel and Ismail, Hatem and Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, [Conference or Workshop Item]

Piper, Thorsten and Suri, Neeraj and Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, [Conference or Workshop Item]

Tao, Chengdong and Xiang, Hong and Petzoldt, Albrecht and Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, pp. 352-368, (35), [Article]

Steinebach, Martin and Yannikos, York and Zmudzinski, Sascha and Winter, Christian
Ho, Anthony and Li, Shujun (eds.) (2015):
Advanced Multimedia File Carving.
In: Handbook of Digital Forensics of Multimedia Data and Devices, Wiley—IEEE Press, pp. 219–269, [Book Section]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, Springer, [Conference or Workshop Item]

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, [Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Daubert, Jörg and Luthra, Manisha and Gazis, Vangelis and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
On the Security and Privacy of Internet of Things Architectures and Systems.
In: International Workshop on Secure Internet of Things (SIoT) 2015, ESORICS, IEEE, Vienna, Austria, ISBN 978-1-4673-7769-0,
DOI: 10.1109/SIOT.2015.9,
[Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max (2015):
ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Srinivasa, Shreyas and Mühlhäuser, Max (2015):
Did you really hack a nuclear power plant? An industrial control mobile honeypot.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346907,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Stahn, Michael and Cordero, Carlos Garcia and Mühlhäuser, Max (2015):
Probe-response attacks on collaborative intrusion detection systems: effectiveness and countermeasures.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346892,
[Conference or Workshop Item]

Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), [Online-Edition: http://dx.doi.org/10.1145/2804322.2804325],
[Article]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: OOPSLA Onward!, Piitsburgh, 25.10.2015, In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Online-Edition: https://encrypto.de/papers/PSSZ15.pdf],
[Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Online-Edition: https://encrypto.de/papers/KPRSSZ15.pdf],
[Conference or Workshop Item]

Ortiz, A. and Al-Shatri, Hussein and Li, X. and Weber, Tobias and Klein, Anja (2015):
Throughput Maximization in Two-Hop Energy Harvesting Communications.
In: IEEE International Symposium on Wireless Communication Systems (ISWCS), IEEE, [Conference or Workshop Item]

Papsdorf, D. and Li, X. and Weber, T. and Klein, A. (2015):
Interference Alignment in Partially Connected Multi-user Two-Way Relay Networks.
In: IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE, [Conference or Workshop Item]

Kohnhäuser, Florian and Schaller, André and Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Conference or Workshop Item]

Huang, Jialin and Vaudenay, Serge and Lai, Xuejia and Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference or Workshop Item]

Al-Hadhrami, Nasser and Aziz, Benjamin and Sardesai, Shantanu and Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015), [Conference or Workshop Item]

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C, [Conference or Workshop Item]

Horsch, Moritz and Hülsing, Andreas and Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Halvani, Oren and Winter, Christian
Cappellato, Linda and Ferro, Nicola and Jones, Gareth and Juan, Eric San (eds.) (2015):
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
In: CLEF2015 Working Notes, Working Notes of CLEF 2015 – Conference and Labs of the Evaluation forum, Toulouse, France, September 8–11, 2015, Sun SITE Central Europe, Toulouse, France, In: CEUR Workshop Proceedings, Vol-1391, [Conference or Workshop Item]

Gazis, Vangelis and Görtz, Manuel and Huber, Marco and Leonardi, Alessandro and Mathioudakis, Kostas and Wiesmaier, Alexander and Zeiger, Florian and Vasilomanolakis, Emmanouil (2015):
A Survey of Technologies for the Internet of Things.
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, IEEE, Dubrovnik, Croatia, ISBN 978-1-4799-5343-1,
DOI: 10.1109/IWCMC.2015.7289234,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
How Current Android Malware Seeks to Evade Automated Code Analysis.
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015), [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, In: Trust and Trustworthy Computing, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference or Workshop Item]

Luna, Jesus and Suri, Neeraj and Iorga, Michaela and Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York, [Conference or Workshop Item]

Loruenser, Thomas and Rodriguez, Charles Bastos and Demirel, Denise and Fischer-Hübner, Simone and Gross, Thomas R. and Langer, Thomas and des Noes, Mathieu and Poehls, Henrich and Rozenberg, Boris and Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Do, Lisa Nguyen Quang and Ali, Karim and Bodden, Eric and Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, In: Weiterdenken, [Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Hahn, Robert and Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]

Stohr, Denny and Schulz, Matthias and Hollick, Matthias and Effelsberg, Wolfgang (2015):
APP and PHY in Harmony: Demonstrating Scalable Video Streaming Supported by Flexible Physical Layer Control.
In: International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), [Conference or Workshop Item]

Songhori, Ebrahim and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Nagy, Marcin and Bui, Thanh Phong and Cristofaro, Emiliano De and Asokan, N. and Ott, Jörg and Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Volk, Florian and Hauke, Sascha and Mühlhäuser, Max
Ko, Ryan and Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, Amsterdam Heidelberg, Elsevier Syngress, pp. 463-493, DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Demirel, Denise and Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Cabarcas, Daniel and Demirel, Denise and Göpfert, Florian and Lancrenon, Jean and Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Fischer, Mathias and Mühlhäuser, Max (2015):
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: International Conference in Distributed Computing Systems, IEEE, Columbus, Ohio, ISBN 978-1-4673-7214-5,
[Conference or Workshop Item]

Steinebach, Martin and Winter, Christian and Halvani, Oren and Schäfer, Marcel and Yannikos, York (2015):
Big Data und Privatheit – Chancen durch Big Data und die Frage des Privatsphärenschutzes.
(SIT-TR-2015-06), [Report]

Struck, Patrick (2015):
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt, [Master Thesis]

Othmane, Lotfi Ben and Ranchal, Rohit and Fernando, Ruchith and Bhargava, Bharat and Bodden, Eric (2015):
Incorporating Attacker Capabilities in Risk Estimation and Mitigation.
In: Computers & Security, pp. 41–61, 51, DOI: 10.1016/j.cose.2015.03.001,
[Article]

Steinmetzer, Daniel and Schulz, Matthias and Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Conference or Workshop Item]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Maass, Max and Müller, Uwe and Schons, Tom and Wegemer, Daniel and Schulz, Matthias (2015):
NFCGate: An NFC Relay Application for Android.
In: Proceedings of the 8th ACM Conference on Security \& Privacy in Wireless and Mobile Networks, In: ACM WiSec'15, New York, June 24-26th, 2015, In: WiSec, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/5414/],
[Conference or Workshop Item]

Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE, In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Hasan, T. and Kikiras, Panayotis and Leonardi, Alessandro and Ziekow, Holger and Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Songhori, Ebrahim and Hussain, Siam and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), IEEE, DOI: 10.1109/SP.2015.32,
[Online-Edition: https://encrypto.de/papers/SHSSK15.pdf],
[Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Golling, Mario and Baier, Harald and Pras, Aiko (2015):
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols.
p. 9, [Article]

Winter, Stefan and Schwahn, Oliver and Natella, Roberto and Suri, Neeraj and Cotroneo, Domenico (2015):
No PAIN, No Gain? The utility of PArallel fault INjections.
In: International Conference on Software Engineering (ICSE), 2015, International Conference on Software Engineering, [Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Baier, Harald and Pras, Aiko (2015):
Collaborative Attack Mitigation and Response: A Survey.
In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management, Ottawa (Canada), ISBN 978-3-901882-76-0,
[Conference or Workshop Item]

Ossenbühl, Sven and Steinberger, Jessica and Baier, Harald (2015):
Towards automated incident handling: How to select an appropriate response against a network-based attack?
p. 17, In Proceedings of 9th Int, [Article]

Winter, Stefan and Piper, Thorsten and Schwahn, Oliver and Natella, Roberto and Suri, Neeraj and Cotroneo, Domenico (2015):
GRINDER: On Reusability of Fault Injection Tools.
In: Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz, [Conference or Workshop Item]

Shirazi, Fatemeh and Goehring, Matthias and Diaz, Claudia (2015):
Tor Experimentation Tools.
In: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy, IEEE, FAIRMONT, SAN JOSE, CA, [Conference or Workshop Item]

Vigil, Martín and Buchmann, Johannes and Cabarcas, Daniel and Weinert, Christian and Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, pp. 16-32, 50, [Article]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, In: IFIP Advances in Information and Communication Technology, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Schuster, Felix and Tendyck, Thomas and Liebchen, Christopher and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Ghiglieri, Marco and Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Kulcsar, Geza and Deckwerth, Frederik and Lochau, Malte and Varró, Gergely and Schürr, Andy
Rensink, Arend and Zambon, Eduardo (eds.) (2015):
Improved Conflict Detection for Graph Transformation with Attributes.
In: Graphs as Models, In: Graphs as Models, GaM 2015, In: Electronic Proceedings in Theoretical Computer Science, 181, [Online-Edition: http://dx.doi.org/10.4204/EPTCS.181.7],
[Conference or Workshop Item]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Online-Edition: https://encrypto.de/papers/ARSTZ15.pdf],
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Online-Edition: https://encrypto.de/papers/ALSZ15.pdf],
[Conference or Workshop Item]

Piper, Thorsten and Winter, Stefan and Schwahn, Oliver and Bidarahalli, Suman and Suri, Neeraj (2015):
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems.
In: ISORC, [Conference or Workshop Item]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.
[Report]

Bucicoiu, Mihai and Davi, Lucas and Deaconescu, Razvan and Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Ortiz Jimenez, Andrea Patricia and Degenhardt, Holger and Klein, Anja (2015):
A Resource Requirement Aware Transmit Strategy for Non-Regenerative Multi-Way Relaying.
IEEE, In: IEEE Wireless Communication and Networking Conference WCNC, New Orleans, March 2015, [Conference or Workshop Item]

Nguyen, The An Binh and Englert, Frank and Farr, Simon and Gottron, Christian and Böhnstedt, Doreen and Steinmetz, Ralf (2015):
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
In: International Workshop on Pervasive Networks for Emergency Management (PerNEM), IEEE, [Conference or Workshop Item]

Schulz, Matthias and Stohr, Denny and Wilk, Stefan and Rudolph, Benedikt and Effelsberg, Wolfgang and Hollick, Matthias (2015):
APP and PHY in Harmony: A Framework Enabling Flexible Physical Layer Processing to Address Application Requirements.
In: Proceedings of the International Conference on Networked Systems (NetSys 2015), [Conference or Workshop Item]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Diploma Thesis or Magisterarbeit]

Jörg, Daubert and Fischer, Mathias and Mühlhäuser, Max and Grube, Tim (2015):
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
IEEE Computer Society, In: International Conference on Networked Systems (NetSys), [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Online-Edition: https://encrypto.de/papers/DSZ15.pdf],
[Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015, Internet Society, San Diego, [Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric (2015):
Harvesting Runtime Data in Android Applications for Identifying Malware and Enhancing Code Analysis.
(TUD-CS-2015-0031), [Report]

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, pp. 16-21, 45, (1), DOI: 10.1145/2738210.2738214,
[Article]

Gerber, Paul and Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, pp. 108 - 113, 2/2015, DOI: 10.1007/s11623-015-0375-y,
[Article]

Davi, Lucas and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Snow, Kevin and Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Sascha, Hauke (2015):
On the Statistics of Trustworthiness Prediction.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4991],
[Ph.D. Thesis]

Busold, Christoph and Heuser, Stephan and Rios, Jon and Sadeghi, Ahmad-Reza and Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Tan, Feng and Wang, Yufei and Wang, Qixin and Bu, Lei and Suri, Neeraj (2015):
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking.
In: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, [Article]

El Bansarkhani, Rachid and Dagdelen, Özgür and Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20, [Article]

Maseberg, Sönke and Bodden, Eric and Kus, Mehmet and Brucker, Achim and Rasthofer, Siegfried and Berger, Bernhard and Huber, Stephan and Sohr, Karsten and Gerber, Paul and Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Othmane, Lotfi Ben and Weffers, Harold and Mohamad, Mohd Murtadha and Wolf, Marko
Benhaddou, Driss and Al-Fuqaha, Ala (eds.) (2015):
Wireless Sensor and Mobile Ad-Hoc Networks.
Springer New York, pp. 217-247, [Book Section]

Othmane, Lotfi Ben and Cerqueus, Thomas and Thiery, Adrien and Salehie, Mazeiar and Noel, Nicolas and Labaere, Anthony and Domingues, Remi and Cordier, Arnaud and Ventresque, Anthony and Pasquale, Liliana and Perry, Philip and Nuseibeh, Bashar (2015):
Response to Emergency Situations in a Traffic Management System.
In: Proc. International Conference on Computer Information Systems, [Conference or Workshop Item]

Dmitrienko, Alexandra and Heuser, Stephan and Nguyen, Thien Duc and da Silva Ramos, Marcos and Rein, Andre and Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC, Las Vegas, NV, [Conference or Workshop Item]

Meurisch, Christian and Hussain, Tahir and Gogel, Artur and Schmidt, Benedikt and Schweizer, Immanuel and Mühlhäuser, Max (2015):
A Spatiotemporal Approach for Social Situation Recognition.
In: Proceedings of the 7th International Conference on Mobile Computing, Applications, and Services (MobiCASE’15), Springer, Berlin, Germany, ISBN 978-3-319-29002-7,
DOI: 10.1007/978-3-319-29003-4_18,
[Conference or Workshop Item]

Schulz, Axel and Guckelsberger, Christian and Schmidt, Benedikt (2015):
More Features Are Not Always Better: Evaluating Generalizing Models in Incident Type Classification of Tweets.
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2015, Lisbon, Portugal, September 17-21, 2015, Lisbon, Portugal, [Conference or Workshop Item]

Mannes, Elisa and Maziero, Carlos A. and Lassance, Luiz Carlos and Borges, Fábio (2015):
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks.
In: ISCC 2015 - The Twentieth IEEE Symposium on Computers and Communications, IEEE, Larnaca, Cyprus, [Conference or Workshop Item]

Baumgärtner, Lars and Graubner, Pablo and Schmidt, Nils and Freisleben, Bernd (2015):
AndroLyze: A Distributed Framework for Efficient Android App Analysis.
In: IEEE International Conference on Mobile Services (MS), IEEE, [Conference or Workshop Item]

Graubner, Pablo and Baumgärtner, Lars and Heckmann, Patrick and Müller, Marcel and Freisleben, Bernd (2015):
Dynalize: Dynamic Analysis of Mobile Apps in a Platform-as-a-Service Cloud.
In: IEEE International Conference on Cloud Computing (CLOUD), IEEE, [Conference or Workshop Item]

Mogk, Ragnar (2015):
Reactive Interfaces: Combining Events and Expressing Signals.
In: Workshop on Reactive and Event-based Languages & Systems (REBLS), [Conference or Workshop Item]

Mogk, R. (2015):
Concurrency Control for Multithreaded Reactive Programming.
In: ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity (SPLASH), ACM, [Conference or Workshop Item]

Niemczyk, Stefan and Geihs, Kurt (2015):
Adaptive Run-Time Models for Groups of Autonomous Robots.
In: IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), IEEE, [Conference or Workshop Item]

Zheng, Yao and Schulz, Matthias and Lou, Wenjing and Hou, Thomas and Hollick, Matthias (2015):
Highly Efficient Known-Plaintext Attacks against Orthogonal Blinding based Physical Layer Security.
In: IEEE Wireless Communications Letters, pp. 34--37, 4, (1), DOI: 10.1109/LWC.2014.2363176,
[Article]

Arias-Cabarcos, Patricia and Trapero, Ruben and Almenárez, Florina and Díaz-Sánchez, Daniel and Marín, Andrés (2015):
Blended Identity: Pervasive IdM for Continuous Authentication.
[Conference or Workshop Item]

Yang, Lei and Cao, Jiannong and Han, Di and Tang, Shaojie and Suri, Neeraj (2015):
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments.
In: IEEE Transactions on Cloud Computing,2015, [Conference or Workshop Item]

Zhang, Jiang and Zhang, Zhenfeng and Ding, Jintai and Snook, Michael and Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015, Sofia, Bulgaria, [Conference or Workshop Item]

Butin, Denis and Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Ganji, Fatemeh and Krämer, Juliane and Seifert, Jean-Pierre and Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, US, [Conference or Workshop Item]

Classen, Jiska and Braun, Johannes and Volk, Florian and Hollick, Matthias and Buchmann, Johannes and Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Karuppayah, Shankar and Kikiras, Panayotis and Mühlhäuser, Max (2015):
A honeypot-driven cyber incident monitor: lessons learned and steps ahead.
In: 8th International Conference on Security of Information and Networks, ACM, Sochi/Russia, ISBN 978-1-4503-3453-2,
DOI: 10.1145/2799979.2799999,
[Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security, Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie (2015):
Über die Wirksamkeit von Anti-Phishing-Training.
In: Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, A. Weisbecker, M. Burmester & A. Schmidt, Stuttgart, [Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), IEEE, [Conference or Workshop Item]

Follner, Andreas and Bodden, Eric (2015):
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
[Report]

Oueslati, Hela and Rahman, Mohammad Masudur and Othmane, Lotfi Ben (2015):
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
In: Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, [Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Fischer, Mathias and Mühlhäuser, Max (2015):
Community-based Collaborative Intrusion Detection.
In: International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm), Springer International Publishing, 164, ISBN 978-3-319-28865-9,
DOI: 10.1007/978-3-319-28865-9_44,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Davi, Lucas and Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Meurisch, Christian and Seeliger, Alexander and Schmidt, Benedikt and Schweizer, Immanuel and Kaup, Fabian and Mühlhäuser, Max (2015):
Upgrading Wireless Home Routers for Enabling Large-scale Deployment of Cloudlets.
In: Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Springer, Berlin, Germany, November 12-13, 2015, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 162, ISBN 978-3-319-29002-7,
DOI: 10.1007/978-3-319-29003-4_2,
[Conference or Workshop Item]

2014

Wachsmann, Christian and Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Morgan & Claypool Publishers, In: Synthesis Lectures on Information Security, Privacy, and Trust, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Book]

Paul, Thomas and Hornung, Marius and Strufe, Thorsten (2014):
Distributed Discovery of User Handles with Privacy.
In: GlobeCom, [Conference or Workshop Item]

Jamison, Emily and Gurevych, Iryna
Aroonmanakun, Wirote and Boonkwan, Prachya and Supnithi, Thepchai (eds.) (2014):
Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
In: Proceedings of the 28th Pacific Asia Conference on Language, Information and Computing, Department of Linguistics, Chulalongkorn University, Phuket, Thailand, [Online-Edition: http://www.aclweb.org/anthology/Y/Y14/Y14-1030.pdf],
[Conference or Workshop Item]

Vigil, Martín and Weinert, Christian and Demirel, Denise and Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Conference or Workshop Item]

Huang, Shin-Ying and Huang, Yennun and Suri, Neeraj (2014):
Event pattern discovery on IDS traces of Cloud Services.
In: IEEE International Conference on Big Data and Cloud Computing (BDCloud), [Conference or Workshop Item]

Jamison, Emily and Gurevych, Iryna
Aroonmanakun, Wirote and Boonkwan, Prachya and Supnithi, Thepchai (eds.) (2014):
Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
In: Proceedings of the The 28th Pacific Asia Conference on Language, Information and Computing, Department of Linguistics, Chulalongkorn University, Phuket, Thailand, [Online-Edition: http://www.arts.chula.ac.th/~ling/paclic28/program/pdf/479.p...],
[Conference or Workshop Item]

Mayer, Peter and Volkamer, Melanie and Kauer, Michaela
Prakash, Atul and Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Information Systems Security : International Conference on Information Systems Security (ICISS), Berlin, Cham, Springer International Publishing, In: International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, In: Lecture notes in computer science, 8880, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Faraon, Montathar and Stenberg, Georg J. H. and Budurushi, Jurlind and Kaipainen, Mauri
Parycek, Peter and Sachs, Michael and Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
ACM, In: 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Online-Edition: https://encrypto.de/papers/DHS14.pdf],
[Conference or Workshop Item]

Shirazi, Fatemeh and Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference or Workshop Item]

Habib, Sheikh Mahbub and Ries, Sebastian and Varikkattu, Prabhu and Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, pp. 2185-2200, 7, (11), DOI: 10.1002/sec.748,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.748],
[Article]

Vieten, Jannik (2014):
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
TU Darmstadt, [Master Thesis]

Canova, Gamze and Volkamer, Melanie and Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
Scottsdale, Arizona, [Other]

Othmane, Lotfi Ben and Angin, Pelin and Weffers, Harold and Bhargava, Bharat (2014):
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, pp. 497-509, 11, (6), [Article]

Ghiglieri, Marco
Schiele, Otto and Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 11/2014, [Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Böck, Leon and Kikiras, Panayotis and Mühlhäuser, Max (2014):
Twitterize: Anonymous Micro-Blogging.
In: Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), IEEE Computer Society, In: International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA), DOI: 10.1109/AICCSA.2014.7073285,
[Conference or Workshop Item]

Loch, Adrian and Quesada, Pablo and Hollick, Matthias and Kühne, Alexander and Klein, Anja (2014):
Building Cross-Layer Corridors in Wireless Multihop Networks.
In: 11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2014), DOI: 10.1109/MASS.2014.19,
[Conference or Workshop Item]

Stopczynski, Martin and Zugelder, Michael (2014):
Reducing User Tracking through Automatic Web Site State Isolations.
In: Information Security, Springer, In: Lecture Notes in Computer Science, 8783, ISBN 978-3-319-13256-3,
DOI: 10.1007/978-3-319-13257-0_18,
[Conference or Workshop Item]

Suri, Neeraj and Germanus, Daniel and Roos, Stefanie and Strufe, Thorsten (2014):
Mitigating Eclipse Attacks in Peer-to-Peer Networks.
In: In Proceedings of IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, USA, [Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin (2014):
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, pp. 33-43, (2014), [Article]

Ding, Jintai and Petzoldt, Albrecht and Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: PQCrypto 2014, Springer, Waterloo, Canada, In: LNCS, [Conference or Workshop Item]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, Springer, Istanbul, Turkey, In: LNCS, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Sahin, Perihan and Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), TUT Press, Lochau, [Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Kulyk, Oksana and Feier, Christian and Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Schlipf, Mario (2014):
Passwort-Richtlinien.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Loch, Adrian and Hollick, Matthias and Kühne, A. and Klein, A. (2014):
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN 2014), [Conference or Workshop Item]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias
Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Conrad, Bernd and Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, UK, [Conference or Workshop Item]

Loch, Adrian and Hong, Wei-Chih and Hollick, Matthias (2014):
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
In: 39th IEEE Conference on Local Computer Networks (LCN), DOI: 10.1109/LCN.2014.6925754,
[Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha
Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, In: Lecture Notes in Computer Science, 8650, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Riecker, Michael and Yuan, Dingwen and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Patrolling wireless sensor networks: Randomized intrusion detection.
In: 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, Montreal, QC, Canada, [Conference or Workshop Item]

Geihs, Matthias and Cabarcas, Daniel
Aranha, Diego F. and Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, Springer, Florianópolis, Brazil, In: LNCS, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Dagdelen, Özgür and El Bansarkhani, Rachid and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas and Sanchez, Ana Helena and Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014, Florianópolis, Brazil, [Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland
Mauw, Sjouke and Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, Springer International Publishing, Wroclaw, Poland, In: Lecture Notes in Computer Science, 8743, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Feier, Christian and Neumann, Stephan and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/PSZ14.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/DSZ14.pdf],
[Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Loch, Adrian and Schulz, Matthias and Hollick, Matthias (2014):
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
In: Proceedings of the 3rd Workshop of Software Radio Implementation Forum (SRIF 2014), co-located with ACM Sigcomm 2014, [Conference or Workshop Item]

Yannikos, York and Graner, Lukas and Steinebach, Martin and Winter, Christian
Peterson, Gilbert and Shenoi, Sujeet (eds.) (2014):
Data Corpora for Digital Forensics Education and Research.
In: Advances in Digital Forensics X, 10th IFIP WG 11.9 International Conference on Digital Forensics, Vienna, Austria, January 8–10, 2014, Springer, Vienna, Austria, In: IFIP Advances in Information and Communication Technology, 433, [Conference or Workshop Item]

Breitinger, Frank and Winter, Christian and Yannikos, York and Fink, Tobias and Seefried, Michael
Peterson, Gilbert and Shenoi, Sujeet (eds.) (2014):
Using Approximate Matching to Reduce the Volume of Digital Data.
In: Advances in Digital Forensics X, 10th IFIP WG 11.9 International Conference on Digital Forensics, Vienna, Austria, January 8–10, 2014, Springer, Vienna, Austria, In: IFIP Advances in Information and Communication Technology, 433, [Conference or Workshop Item]

Suri, Neeraj and Vateva-Gurova, Tsvetoslava and Luna, Jesus and Pellegrino, Giancarlo (2014):
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
In: Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, [Conference or Workshop Item]

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master Thesis]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, pp. 1189-1206, 102, (8), [Article]

Hiemenz, Benedikt (2014):
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, (4), [Article]

Suri, Neeraj and Lanzaro, Anna and Natella, Roberto and Winter, Stefan and Cotroneo, Domenico (2014):
An Empirical Study of Injected versus Actual Interface Errors.
In: Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA), San Jose, CA, USA, [Conference or Workshop Item]

Conrad, Bernd and Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014), Paris, France, [Conference or Workshop Item]

Renkema-Padmos, Arne and Baum, Jerome and Renaud, Karen and Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance, Lulu Press, Raleigh, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Privacy Enhancing Technologies - 14th International Symposium, PETS, Springer, Amsterdam, The Netherlands, In: Lecture Notes in Computer Science, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Nitsche, Thomas and Widmer, J. and Kühne, A. and Klein, A. (2014):
Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), DOI: 10.1109/WoWMoM.2014.6918922,
[Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Kühne, A. and Klein, A. (2014):
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), DOI: 10.1109/WoWMoM.2014.6919011,
[Conference or Workshop Item]

Kong, Joonho and Koushanfar, Farinaz and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, ACM Press, [Conference or Workshop Item]

Mustafa, Hossen and Sadeghi, Ahmad-Reza and Schulz, Steffen and Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference or Workshop Item]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Online-Edition: https://encrypto.de/papers/BCFPSZ14.pdf],
[Conference or Workshop Item]

Schneider, Matthias and Schneider, Thomas (2014):
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, DOI: 10.1145/2600918.2600927,
[Online-Edition: https://encrypto.de/papers/SS14.pdf],
[Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Loch, Adrian and Meier, David and Hollick, Matthias (2014):
How did you get here? PHY-Layer Path Signatures.
In: Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Schmachtenberg, Max and Strufe, Thorsten and Paulheim, Heiko (2014):
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
In: Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14), [Conference or Workshop Item]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Renaud, Karen and Volkamer, Melanie and Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: Human Aspects of Information Security, Privacy, and Trust, Springer, Heraklion, Crete, In: 8533, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference or Workshop Item]

Kolb, Nina and Bartsch, Steffen and Volkamer, Melanie and Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, Springer, Cham, Heraklion, Greece, 8533, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Davi, Lucas and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, [Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2014):
Automatic protocol selection in secure two-party computations.
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14), DOI: 10.1007/978-3-319-07536-5_33,
[Online-Edition: https://encrypto.de/papers/KSS14.pdf],
[Conference or Workshop Item]

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
San Jose, California, [Other]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Christin, Delphine and Pons-Sorolla, Daniel Rodriguez and Hollick, Matthias and Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

do Carmo, Rodrigo and Hollick, Matthias (2014):
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
In: Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014), IEEE/IFIP, [Conference or Workshop Item]

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems, ACM Digital Library, New York, [Conference or Workshop Item]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, pp. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Koeberl, Patrick and Schulz, Steffen and Sadeghi, Ahmad-Reza and Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin and Neitzel, Svenja
Katzenbeisser, Stefan and Lotz, Volkmar and Weippl, Edgar (eds.) (2014):
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 229-241, [Book Section]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Sohr, Karsten and Bartsch, Steffen and Volkamer, Melanie and Berger, Bernhard and Bodden, Eric and Brucker, Achim and Maseberg, Sönke and Kus, Mehmet and Heider, Jens (2014):
Zertifizierte Datensicherheit für mobile Anwendungen.
In: GI Sicherheit 2014, Gesellschaft für Informatik e.V., Wien, In: Lecture Notes in Informatics, 228, ISBN 978-3-88579-622-0,
[Conference or Workshop Item]

Senftleben, Marius and Bucicoiu, Mihai and Tews, Erik and Armknecht, Frederik and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra and Noack, David and Sadeghi, Ahmad-Reza and Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference or Workshop Item]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC&#039;14), Springer, [Conference or Workshop Item]

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael (2014):
Personal DLP for Facebook.
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, In: 6, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor Thesis]

Schulz, Matthias and Loch, Adrian and Hollick, Matthias (2014):
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2014), San Diego, [Conference or Workshop Item]

Schneider, Markus and Enzmann, Matthias and Stopczynski, Martin (2014):
Web-Tracking-Report 2014.
(SIT-TR-2014-01), ISBN 978-3-8396-0700-8,
[Report]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Liu, Huajian and Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Watermarking Textures in Video Games.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, [Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Rettig, Michael and Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Robust Hashing for 3D Models.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, Februar 2014, [Conference or Workshop Item]

Suri, Neeraj and Ghani, Hamza and Garcia, Jesus Luna and Petkov, Ivaylo (2014):
User-Centric Security Assessment of Software Configurations: A Case Study.
In: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 2014, Munich, Germany, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, pp. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Patzina, Sven (2014):
Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4132],
[Ph.D. Thesis]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Ghiglieri, Marco and Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Ali, Karim and Rapoport, Marianna and Lhoták, Ondřej and Dolby, Julian and Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: Proceedings of the 28th European Conference on Object-Oriented Programming, In: ECOOP '14, [Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Fritz, Christian and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, [Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric (2014):
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS), [Article]

Li, Li and Bartel, Alexandre and Klein, Jacques and Traon, Yves Le and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and McDaniel, Patrick (2014):
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Online-Edition: http://www.abartel.net/static/p/tr-iccta.pdf],
[Report]

Arzt, Steven and Huber, Stephan and Rasthofer, Siegfried and Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, [Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Lovat, Enrico and Bodden, Eric (2014):
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES), [Article]

Patzina, Lars (2014):
Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4133],
[Ph.D. Thesis]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad, [Conference or Workshop Item]

Werner, M. and Lange, T. and Hollick, Matthias and Zimmermann, T. and Wehrle, K. (2014):
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols.
In: 1st KuVS Workshop on Anticipatory Networks, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Schaller, André and Arul, Tolga and van der Leest, Vincent and Katzenbeisser, Stefan (2014):
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
In: International Conference on Trust & Trustworthy Computing ( TRUST), [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications, 38, [Conference or Workshop Item]

Riecker, Michael and Biedermann, Sebastian and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, Springer, pp. 155-167, 14, (2), ISSN 1615-5270,
[Article]

Riecker, Michael and Thies, D. and Hollick, Matthias (2014):
Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Yuan, Dingwen and Riecker, Michael and Hollick, Matthias (2014):
Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks.
In: 11th European Conference on Wireless Sensor Networks (EWSN), [Conference or Workshop Item]

Noisternig, M. and Hollick, Matthias (2014):
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
In: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14), Montreal, Canada, [Conference or Workshop Item]

Bagci, Ibrahim Ethem and Roedig, Utz and Schulz, Matthias and Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]

Breitinger, Frank and Liu, Huajian and Winter, Christian and Baier, Harald and Rybalchenko, Alexey and Steinebach, Martin
Gladyshev, Pavel and Marrington, Andrew and Baggili, Ibrahim (eds.) (2014):
Towards a Process Model for Hash Functions in Digital Forensics.
In: Digital Forensics & Cyber Crime (ICDF2C 2013), 5th ICST International Conference, September 26–27, 2013, Moscow, Russia, Springer, Moscow, Russia, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 132, ISBN 978-3-319-14288-3 (print) and 978-3-319-14289-0 (e-book),
DOI: 10.1007/978-3-319-14289-0_12,
[Conference or Workshop Item]

Winter, Christian and Steinebach, Martin and Yannikos, York (2014):
Fast Indexing Strategies for Robust Image Hashes.
In: Digital Investigation (Elsevier), pp. S27–S35, 11, (Supplement 1), DOI: 10.1016/j.diin.2014.03.004,
[Article]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2014):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., pp. 267-297, 12, (4), [Article]

Suri, Neeraj and Taha, Ahmed and Trapero, Ruben and Luna, Jesus (2014):
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security.
In: Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, China, [Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014, Marrakech, Morocco, [Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin
Cappellato, Linda and Ferro, Nicola and Halvey, Martin and Kraaij, Wessel (eds.) (2014):
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
In: Working Notes for CLEF 2014 Conference, Sheffield, UK, September 15-18, 2014., Sheffield, UK, [Conference or Workshop Item]

Biedermann, Sebastian and Karvelas, Nikolaos and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, pp. 114-125, 8327, [Article]

Roos, Stefanie and Strufe, Thorsten (2014):
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165, [Article]

Shulman, Haya and Waidner, Michael (2014):
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
In: International Conference on Applied Cryptography and Network Security (ACNS 2014), [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu HI USA, [Conference or Workshop Item]

Christin, Delphine and Engelmann, Franziska and Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107, [Article]

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Kieseberg, Peter and Huber, Markus and Leithner, Manuel and Mulazzani, Martin and Weippl, Edgar (2014):
Covert Computation - Hiding code in code through compile-time obfuscation.
In: Computers & Security, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes
Pointcheval, David and Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Springer, Marrakesh, Morocco, In: LNCS, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

Franz, Martin and Holzer, Andreas and Katzenbeisser, Stefan and Schallhart, Christian and Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, 8409, [Conference or Workshop Item]

Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Public-Key Cryptography PKC 2014, In: Lecture Notes in Computer Science, 8383, [Conference or Workshop Item]

Biedermann, Sebastian and Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja and Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
In: J. Cryptology, 27, DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference or Workshop Item]

Vigil, Martín and Weinert, Christian and Braden, Kjell and Demirel, Denise and Buchmann, Johannes (2014):
A performance analysis of long-term archiving techniques.
In: IEEE - High Performace Computing and Communications (HPCC 2014), Paris, France, [Conference or Workshop Item]

Volk, Florian and Pitzschel, Janette and Mühlhäuser, Max
Berntzen, Lasse and Böhm, Stephan (eds.) (2014):
Making the Most of Customer Product Reviews.
In: 7th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2014), IARIA, Nice, France, 1, ISBN 978-1-61208-369-8,
[Conference or Workshop Item]

Mannes, Elisa and Maziero, Carlos and Lassance, Luiz Carlos and Borges, Fábio (2014):
Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação.
In: XIV Brazilian Symposium on Information Security and Computer Systems (SBSeg), Belo Horizonte - Brazil, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference or Workshop Item]

Nautsch, Andreas and Rathgeb, Christian and Busch, Christoph and Reininger, Herbert and Kasper, Klaus (2014):
Towards Duration Invariance of i-Vector-based Adaptive Score Normalization.
In: Odyssey: The Speaker and Language Recognition Workshop, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
IGI Global, pp. 76-91, [Book Section]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158, [Article]

Othmane, Lotfi Ben and Angin, Pelin and Bhargava, Bharat (2014):
Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
In: Proc. of the 9th International Conference on Availability, Reliability and Security (ARES), Fribourg, Switzerland, [Conference or Workshop Item]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, Springer Gabler Verlag, pp. 98-102, 38, (2), [Article]

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
IGI Global, pp. 27-61, [Book Section]

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

2013

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: In: Cryptology ePrint Archive: Report 2013/464, 2013., Koblenz, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: Asiacrypt 2013, Springer, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias (2013):
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), pp. 695-707, 9, (5), [Article]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, Berlin, November 04 - 08, 2013, DOI: 10.1145/2508859.2516738,
[Online-Edition: https://encrypto.de/papers/ALSZ13.pdf],
[Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Bodden, Eric and Rasthofer, Siegfried and Richter, Philipp and Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, pp. 720 - 725, 11/2013, DOI: 10.1007/s11623-013-0300-1,
[Article]

Albrecht, Martin and Fitzpatrick, Robert and Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography, Springer Berlin Heidelberg, pp. 255-280, DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), Springer, pp. 364-381, [Article]

Stancill, Blaine and Snow, Kevin and Otterness, Nathan and Monrose, Fabian and Davi, Lucas and Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, [Conference or Workshop Item]

Pham, Thieu Nga and Hoang, Dang Hai and Strufe, Thorsten and Le, Quang Duc and Bui, Phong Thanh and Thai, Nguyet Thi and Le, Thuy Duong and Schweizer, Immanuel (2013):
Processing and Visualizing Traffic Pollution Data in Hanoi City From a Wireless Sensor Network.
In: IEEE SenseApp, [Conference or Workshop Item]

Weinert, Christian (2013):
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
TU Darmstadt, [Bachelor Thesis]

Trick, Daniel and Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
3D Watermarking in the Context of Video Games.
In: Proceeding IEEE 15th International Workshop on Multimedia Signal Processing 2013 (MMSP 2013), Pula, Italy, September 30 - October 2, 2013, [Conference or Workshop Item]

Yannikos, York and Schlüßler, Jonathan and Steinebach, Martin and Winter, Christian and Graffi, Kalman
Peterson, Gilbert and Shenoi, Sujeet (eds.) (2013):
Hash-Based File Content Identification Using Distributed Systems.
In: Advances in Digital Forensics IX – 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 28–30, 2013, Revised Selected Papers, Springer, USA, Florida, Orlando, National Center for Forensic Science, In: IFIP Advances in Information and Communication Technology, 410, ISBN 978-3-642-41147-2,
[Conference or Workshop Item]

Yannikos, York and Ashraf, Muhammad-Nadeen and Steinebach, Martin and Winter, Christian
Peterson, Gilbert and Shenoi, Sujeet (eds.) (2013):
Automation of Video File Carving and Content Identification.
In: Advances in Digital Forensics IX – 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 28–30, 2013, Revised Selected Papers, Springer, USA, Florida, Orlando, National Center for Forensic Science, In: IFIP Advances in Information and Communication Technology, 410, ISBN 978-3-642-41147-2,
[Conference or Workshop Item]

Gutmann, Andreas and Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
Kagawa, Japan, [Other]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 10/2013, [Conference or Workshop Item]

Falzon, Kevin and Bodden, Eric and Purandare, Rahul (2013):
Distributed Finite-State Runtime Monitoring with Aggregated Events.
In: Runtime Verification 2013 (RV'13), Springer, LNCS, [Article]

Arzt, Steven and Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf],
[Report]

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2013):
Reducing human factors in software security architectures.
In: Future Security Conference 2013, [Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf],
[Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive, [Article]

Vasilomanolakis, Emmanouil and Fischer, Mathias and Ebinger, Peter and Kikiras, Panayotis and Schmerl, Sebastian and Mühlhäuser, Max
Janicke, Helge and Jones, Kevin (eds.) (2013):
Collaborative Intrusion Detection in Smart Energy Grids.
In: 1st International Symposium for ICS & SCADA Cyber Security Research, BCS, Leicester, United Kingdom, eWiC, ISBN 978-1-78017-232-3,
[Conference or Workshop Item]

Wachsmann, Christian (2013):
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt, [Ph.D. Thesis]

Halvani, Oren and Steinebach, Martin and Zimmermann, Ralf
Forner, Pamela and Navigli, Roberto and Tufis, Dan and Ferro, Nicola (eds.) (2013):
Authorship Verification via k-Nearest Neighbor Estimation.
In: Working Notes for CLEF 2013 Conference , Valencia, Spain, September 23-26, 2013., CEUR-WS.org, In: CEUR - Workshop Proceedings, [Conference or Workshop Item]

Breitinger, Frank and Stivaktakis, Georgios and Roussev, Vassil (2013):
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Schehlmann, Lisa and Baier, Harald (2013):
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
In: INFORMATIK 2013: 43. Jahrestagung der Gesellschaft für Informatik, Darmstadt, [Conference or Workshop Item]

Buchmann, Nicolas and Peeters, Roel and Baier, Harald and Pashalidis, Andreas (2013):
Security considerations on extending PACE to a biometric-based connection establishment.
In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the, In: 1, [Conference or Workshop Item]

Braun, Johannes and Kiefer, Franziskus and Hülsing, Andreas
Katsikas, Sokratis and Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, In: LNCS, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Steinebach, Martin and Liu, Huajian and Yannikos, York (2013):
FaceHash: Face Detection and Robust Hashing.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and El Bansarkhani, Rachid and Cayrel, Pierre-Louis and Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Renaud, Karen and Mayer, Peter and Volkamer, Melanie and Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, Krakow, [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie
Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: 5th International Conference on eParticipation (ePart 2013), Springer, Koblenz, Germany, In: Lecture Notes in Computer Science, 8075, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Strenzke, Falko (2013):
Efficiency and Implementation Security of Code-based Cryptosystems.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3690],
[Ph.D. Thesis]

Oren, Yossef and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes on Computer Science (LNCS), 8068, [Conference or Workshop Item]

Rynkowski, Gregor (2013):
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
Darmstadt, Technische Universität, [Bachelor Thesis]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor Thesis]

Klose, Robin and Loch, Adrian and Hollick, Matthias (2013):
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
In: Proceedings of the 2nd Workshop of Software Radio Implementation Forum (SRIF 2013), co-located with ACM Sigcomm 2013, [Conference or Workshop Item]

Kalabis, Lukas and Wolf, Ruben and Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, pp. 512-516, 37, (8), DOI: 10.1007/s11623-013-0209-8,
[Article]

Breitinger, Frank and Stivaktakis, Georgios and Baier, Harald (2013):
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13, [Article]

Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar
Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing, Springer, pp. 157 - 158, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, pp. 255 - 275, 24, (3 - 4), DOI: 10.1007/s00200-013-0190-3,
[Article]

El Bansarkhani, Rachid and Buchmann, Johannes
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: Selected Areas in Cryptography 2013 (SAC'13), Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Octeau, Damien and McDaniel, Patrick and Jha, Somesh and Bartel, Alexandre and Bodden, Eric and Klein, Jacques and Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security, Berkeley, Calif, USENIX Association, pp. 543-558, [Book Section]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA, [Conference or Workshop Item]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw, [Article]

Vigil, Martín and Cabarcas, Daniel and Huang, Jingwei and Buchmann, Johannes (2013):
Assessing Trust in the Long-Term Protection of Documents.
In: 18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013), Split, Croatia, [Conference or Workshop Item]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Beckerle, Matthias and Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, [Conference or Workshop Item]

Northrop, Erik and Lipford, Heather Richter and Bartsch, Steffen and Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Other]

Nas, Aysegül and Filyanov, Atanas and Volkamer, Melanie and Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
Menlo Park, California, [Other]

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13), [Conference or Workshop Item]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Olembo, Maina and Bartsch, Steffen and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Demmler, Daniel (2013):
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
Springer, In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Online-Edition: https://encrypto.de/papers/ADNRSSS13.pdf],
[Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf],
[Conference or Workshop Item]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
Darmstadt, Technische Universität, [Bachelor Thesis]

Daubert, Jörg and Fischer, Mathias and Schiffner, Stefan and Mühlhäuser, Max
Lopez, Javier and Huang, Xinyi and Sandhu, Ravi (eds.) (2013):
Distributed and Anonymous Publish-Subscribe.
In: The 7th International Conference on Network and System Security (NSS 2013), Springer, Madrid, Spain, LNCS 7873, ISBN 978-3-642-38630-5,
DOI: 10.1007/978-3-642-38631-2_57,
[Conference or Workshop Item]

Klose, Robin and Loch, Adrian and Hollick, Matthias (2013):
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
In: Proceedings of the 2013 IEEE International Conference on Sensing, Communication, and Networking (SECON 2013), [Conference or Workshop Item]

Loch, Adrian and Klose, Robin and Hollick, Matthias and Kuehne, Alexander and Klein, Anja (2013):
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013, Demo Session), [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Nitsche, Thomas and Widmer, Jörg and Kuehne, Alexander and Klein, Anja (2013):
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013), [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin and Wolf, Patrick and Zimmermann, Ralf (2013):
Natural Language Watermarking for German Texts.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, Montpellier, France, In: IH&MMSec '13, ISBN 978-1-4503-2081-8,
DOI: 10.1145/2482513.2482522,
[Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, [Conference or Workshop Item]

Buchmann, Johannes (ed.) (2013):
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition, ISBN 978-3642379123,
[Book]

Strenzke, Falko (2013):
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Nitsche, Thomas and Widmer, Jörg and Loch, Adrian and Hollick, Matthias (2013):
EVM and RSSI Link Quality Measurements in Frequency Selective Fading Channels.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013), [Conference or Workshop Item]

Volkamer, Melanie and Stockhardt, Simon and Bartsch, Steffen and Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Werner, M. and Kaiser, J. and Hollick, Matthias and Weingärtner, E. and Wehrle, K. (2013):
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
In: Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop), [Conference or Workshop Item]

Fritz, Christian and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2013):
Highly Precise Taint Analysis for Android Applications.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Henecka, Wilko and Schneider, Thomas (2013):
Faster Secure Two-Party Computation with Less Memory.
In: ASIA CCS '13 : Proceedings, New York, ACM, In: 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), Hangzhou, China, May 08 - 10, 2013, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484369,
[Online-Edition: https://encrypto.de/papers/HS13.pdf],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas and Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz and Hühnlein, Detlef and Breitenstrom, Christian and Wieland, Thomas and Wiesmaier, Alexander and Biallowons, Benedikt and Petrautzki, Dirk and Potzernheim, Simon and Schmölz, Johannes and Wesner, Alexander and Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, pp. 209-232, 67, (2), [Article]

Volkamer, Melanie and Bartsch, Steffen and Kauer, Michaela
University, Plymouth (ed.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), Lisbon, Spain, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Schneider, Thomas and Zohner, Michael (2013):
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
In: Financial Cryptography and Data Security, Berlin, Springer, In: 17. International Conference on Financial Cryptography and Data Security (FC'13), Okinawa, Japan, April 1-5,2013, ISBN Print ISBN 978-3-642-39883-4 Online ISBN 978-3-642-39884-1,
DOI: 10.1007/978-3-642-39884-1_23,
[Online-Edition: https://encrypto.de/papers/SZ13.pdf],
[Conference or Workshop Item]

do Carmo, Rodrigo and Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187,
[Article]

Kühne, Alexander and Loch, Adrian and Hollick, Matthias and Klein, Anja (2013):
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
In: Wireless Communications and Networking Conference (WCNC'13), DOI: 10.1109/WCNC.2013.6554877,
[Conference or Workshop Item]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Kauer, Michaela and Günther, Sebastian and Storck, Daniel and Volkamer, Melanie
Marinos, Louis and Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Springer, In: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, In: Lecture Notes in Computer Science, 8030, ISBN ISBN 978-3-642-39345-7,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39345-7_11],
[Conference or Workshop Item]

Loch, Adrian and Frey, Hannes and Hollick, Matthias (2013):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing, DOI: 10.1016/j.pmcj.2013.03.004,
[Article]

Kocabas, Unal and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference or Workshop Item]

Breitinger, Frank and Astebøl, Knut Petter and Baier, Harald and Busch, Christoph (2013):
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF), [Article]

Grimm, Marco and Anderl, Reiner (2013):
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Proceedings of the 11th Annual Conference on Systems Engineering Research (CSER 2013), Elsevier, In: Procedia Computer Science, [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias (2013):
Face the Enemy: Attack Detection for Planar Graph Routing.
In: Proceedings of the 2013 Conference on Networked Systems (NetSys 2013), [Conference or Workshop Item]

Sepehrdad, Pouyan and Susil, Petr and Vaudenay, Serge and Vuagnoux, Martin (2013):
Smashing WEP in a Passive Attack.
In: 20th International Workshop on Fast Software Encryption (FSE), [Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13), [Other]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, pp. 117-128, 17, (3), [Article]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
In: Computer Communications, pp. 468-480, 36, (4), [Article]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias and Martucci, Leonardo and Kanhere, Salil (2013):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, pp. 353-371, 9, (3), [Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, In: Lecture Notes in Computer Science, 7779, [Conference or Workshop Item]

Arzt, Steven and Falzon, Kevin and Follner, Andreas and Rasthofer, Siegfried and Bodden, Eric and Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
Gesellschaft für Informatik, In: 6. Arbeitstagung Programmiersprachen (ATPS 2013), In: GI Lecture Notes in Informatics, [Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf],
[Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, [Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie
Saeed, Saqib and Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
IGI Global, pp. 172 - 201, DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Wälde, Julian (2013):
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
Darmstadt, Technische Universität, [Bachelor Thesis]

Berchtold, Waldemar and Schäfer, Marcel and Liu, Huajian and Takahashi, Fabio Touceira and Schmitz, Andre and Zmudzinski, Sascha and Steinebach, Martin and Wieneke, Jonas (2013):
Video Game Watermarking.
In: Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013, [Conference or Workshop Item]

Breitinger, Frank and Petrov, Kaloyan (2013):
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), [Article]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Christin, Delphine and Sánchez López, P. and Reinhardt, Andreas and Hollick, Matthias and Kauer, Michaela (2013):
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), pp. 105–116, 17, (3), [Article]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), IOS Press, pp. 283-315, 21, (2), DOI: 10.3233/JCS-130464,
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464],
[Article]

Moecke, Cristian Thiago and Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, pp. 41-52, 21, DOI: 10.1108/09685221311314419,
[Article]

Ali, Karim and Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: Proceedings of the 27th European Conference on Object-Oriented Programming, In: ECOOP '13, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16],
[Conference or Workshop Item]

Popovici, C. and Fischer, C. S. and von Smekal, L. (2013):
Fermi velocity renormalization and dynamical gap generation in graphene.
In: Physical Review B, 88, (20), ISSN 1098-0121,
[Online-Edition: http://dx.doi.org/10.1103/PhysRevB.88.205429],
[Article]

Smith, Dominik and von Smekal, Lorenz (2013):
Hybrid Monte-Carlo simulation of interacting tight-binding model of graphene.
In: PoS, pp. 048, (LATTICE 2013), [Article]

Smith, Dominik and Dumitru, Adrian and Pisarski, Robert and von Smekal, Lorenz (2013):
Effective potential for SU(2) Polyakov loops and Wilson loop eigenvalues.
In: Physical Review D, 88, (5), ISSN 1550-7998,
[Online-Edition: http://dx.doi.org/10.1103/PhysRevD.88.054020],
[Article]

Kauer, M. and Franz, B. and Pfeiffer, T. and Heine, M. and Christin, Delphine (2013):
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
In: Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress), [Conference or Workshop Item]

Yuan, Dingwen and Hollick, Matthias (2013):
Let's Talk Together: Understanding Concurrent Transmission in Wireless Sensor Networks.
In: 38th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Janicke, Helge and Jones, Kevin (eds.) (2013):
Collaborative Intrusion Detection in Smart Energy Grids.
Leicester, [Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013, Springer, pp. 194-208, [Book Section]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, pp. 84-96, 3, (1), [Article]

Clauß, Sebastian and Schiffner, Stefan and Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Christin, Delphine and Büchner, C. and Leibecke, N. (2013):
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
In: Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop), [Conference or Workshop Item]

Riecker, Michael and Hollick, Matthias (2013):
Weniger ist Mehr: Leichtgewichtige Metriken zur Erkennung von Denial-of-Service Angriffen in Drahtlosen Sensornetzen.
In: Proceedings of the 12th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN13), [Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Steinebach, M. and Klöckner, P. and Reimers, Nils and Wienand, D. and Wolf, Patrick (2013):
Robust Hash Algorithms for Text.
In: Proceeding of 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security -- CMS'2013, September 25-26, 2013, Magdeburg, Germany, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Liu, H. and Li, Y. and Steinebach, M. (2013):
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
In: Proceeding of 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security -- CMS'2013, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Patzina, Lars and Patzina, Sven and Piper, Thorsten and Manns, Paul
Gorp, Pieter Van and Ritter, Tom and Rose, Louis (eds.) (2013):
Model-Based Generation of Run-Time Monitors for AUTOSAR.
In: Modelling Foundations and Applications, Springer, Montpellier, In: Lecture Notes in Computer Science, 7949, ISBN 978-3-642-39012-8,
DOI: 10.1007/978-3-642-39013-5_6,
[Conference or Workshop Item]

Winter, Stefan and Tretter, Michael and Sattler, Benjamin and Suri, Neeraj (2013):
Software Fault Injections: From Single to Simultaneous Faults.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS), [Conference or Workshop Item]

Feng, Tan and Wang, Qixin and Bu, Lei and Zheng, Rong and Wang, Yufei and Suri, Neeraj (2013):
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS), [Conference or Workshop Item]

Luna, Jesus and Vateva-Gurova, Tsvetoslava and Suri, Neeraj and Rak, Massimiliano and Liccardo, Loredana (2013):
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
In: Proc. of the International Conference on Cloud Computing and Services Science (CLOSER), [Conference or Workshop Item]

Winter, Christian and Schneider, Markus and Yannikos, York (2013):
F2S2: Fast forensic similarity search through indexing piecewise hash signatures.
In: Digital Investigation (Elsevier), pp. 361–371, 10, (4), DOI: 10.1016/j.diin.2013.08.003,
[Article]

Elovici, Yuval and Fire, Michael and Herzberg, Amir and Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]

Busch, C. and Brömme, A. and Pflug, A. and Zhou, X. and Dose, M. and Brauckmann, M. and Weber, F. and Opel, A. and Neugebauer, P. and Leowsky, K. (2013):
Multi-Biometrische Gesichtserkennung.
In: the 13. Deutscher IT-Sicherheitskongress, Bonn, Germany, [Conference or Workshop Item]

Stein, C. and Bouatou, V. and Busch, C. (2013):
Video-based Fingerphoto Recognition with Anti-spoofing Techniques with Smartphone Cameras.
In: the IEEE 12th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, [Conference or Workshop Item]

Raghavendra, R. and Raja, K. and Yang, B. and Busch, C. (2013):
Combining Iris and Periocular for Robust Person Verification using Light Field Camera.
In: the 2nd IAPR Asian Conference on Pattern Recognition (ACPR 2013), Japan, [Conference or Workshop Item]

Raghavendra, R. and Raja, K. and Yang, B. and Busch, C. (2013):
Improved Face Recognition At A Distance Using Light Field Camera & Super Resolution Schemes.
In: the 6th International Conference on Security of Information and Networks (SIN 2013), Turkey, [Conference or Workshop Item]

Fontein, Felix and Schneider, Michael and Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013, Bergen (Norway), [Conference or Workshop Item]

Schneider, Michael (2013):
Sieving for Shortest Vectors in Ideal Lattices.
In: Africa Crypt 2013, Cairo, Egypt, [Conference or Workshop Item]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013, Cairo, Egypt, [Conference or Workshop Item]

Nie, Xuyun and Xu, Zhaohu and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and van de Graaf, Jeroen and Ryan, Peter Y. A. and Buchmann, Johannes
Heather, James and Schneider, Steve and Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, In: LNCS, [Conference or Workshop Item]

Shirazi, Fatemeh and Diaz, Claudia and Mullan, Ciaran and Wright, Joss and Buchmann, Johannes (2013):
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013, [Article]

Steinberger, Jessica and Schehlmann, Lisa and Abt, Sebastian and Baier, Harald
Doyen, Guillaume and Waldburger, Martin and Čeleda, Pavel and Sperotto, Anna and Stiller, Burkhard (eds.) (2013):
Anomaly Detection and Mitigation at Internet Scale: A Survey.
In: Emerging Management Mechanisms for the Future Internet, Springer Berlin Heidelberg, pp. 49-60, DOI: 10.1007/978-3-642-38998-6_7,
[Book Section]

Steinberger, Jessica and Baier, Harald
Horster, Patrick (ed.) (2013):
CADEMI - Cooperative Anomaly Detection and Mitigation.
In: D-A-CH Security 2013, pp. 313-323, [Book Section]

Nie, Xuyun and Petzoldt, Albrecht and Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, Regensburg, Germany, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Cabarcas, Daniel and Göpfert, Florian and Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
[Other]

Weiden, Patrick and Hülsing, Andreas and Cabarcas, Daniel and Buchmann, Johannes (2013):
Instantiating Treeless Signature Schemes.
[Other]

Werlang, Felipe and Vigil, Martín and Custódio, Ricardo Felipe (2013):
A User-Centric Digital Signature Scheme.
In: EuroPKI 2013, [Conference or Workshop Item]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Advances in Cryptology - ASIACRYPT 2013, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Applied Cryptography and Network Security, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Braun, Johannes and Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference or Workshop Item]

Yannikos, York and Winter, Christian (2013):
Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing.
In: Availability, Reliability and Security (ARES 2013), Eighth International Conference, September 2–6, 2013, Regensburg, Germany, IEEE Computer Society, Regensburg, Germany, E5008, DOI: 10.1109/ARES.2013.65,
[Conference or Workshop Item]

Fischlin, Marc and Onete, Cristina (2013):
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: ACNS, Springer, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013, Springer, In: LNCS, [Conference or Workshop Item]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Buchegger, Sonja and Crowcroft, Jon and Krishnamurthy, Balachander and Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, pp. 22 -- 44, 3, (2), DOI: 10.4230/DagRep.3.2.22,
[Article]

Schulz, Stephan and Strufe, Thorsten (2013):
d^2 Deleting Diaspora: Practical Attacks for Profile Discovery and Deletion.
In: IEEE International Conference on Communications (ICC), [Conference or Workshop Item]

Reinhardt, Andreas and Christin, Delphine and Steinmetz, Ralf (2013):
Pre-Allocating Code Mappings for Energy-Efficient Data Encoding in Wireless Sensor Networks.
In: Proceedings of the 9th IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerCom Workshops), [Conference or Workshop Item]

Christin, Delphine and Hollick, Matthias
Gutwirth, Serge and Leenes, Ronald and Hert, Paul De and Poullet, Yves (eds.) (2013):
European Data Protection: Coming of Age.
Springer Netherlands, pp. 203–222, [Book Section]

Reinhardt, Andreas and Christin, Delphine and Kanhere, Salil (2013):
Predicting the Power Consumption of Electric Appliances through Time Series Pattern Matching.
In: accepted for publication in Proceedings of 5th ACM Workshop on Embedded Systems for Energy-Efficient Buildings (BuildSys posters), [Conference or Workshop Item]

Reinhard, Alexander and Christin, Delphine and Li, Kai and Kanhere, Salil and Zhang, Jin (2013):
Smarter Building for the Smart Grid? Let them Forecast Their Power Consumption.
In: Accepted for publication in Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN demo), [Conference or Workshop Item]

Reinhardt, Andreas and Englert, F. and Christin, Delphine (2013):
Enhancing User Privacy by Prepocessing Distributed Smart Meter Data.
In: Accepted for publication in Proceedings of the 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), [Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Hollick, Matthias (2013):
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
In: Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Effelsberg, Wolfgang and Steinmetz, Ralf and Strufe, Thorsten (eds.) (2013):
Benchmarking Peer-to-Peer Systems - Understanding Quality of Service in Large-Scale Distributed Systems.
Springer, In: LNCS State of the Art Surveys, ISBN 978-3-642-38673-2,
[Book]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
In: Proceedings of 28th ACM SAC 2013, New York, NY, USA, ACM, pp. 1963-1965, DOI: 10.1145/2480362.2480727,
[Online-Edition: http://doi.acm.org/10.1145/2480362.2480727],
[Book Section]

Roos, Stefanie and Strufe, Thorsten (2013):
A Contribution to Analyzing and Enhancing Darknet Routing.
In: Proceedings of International Conference on Computer Communications (INFOCOM), [Conference or Workshop Item]

Tschofenig, Hannes and Volkamer, Melanie and Jentzsch, Nicola and Fischer-Hübner, Simone and Schiffner, Stefan and Tirtea, Rodica (2013):
On the security, privacy and usability of online seals.
[Report]

Simić-Draws, Daniela and Neumann, Stephan and Kahlert, Anna and Richter, Philipp and Grimm, Rüdiger and Volkamer, Melanie and Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), pp. 16-35, 7, (3), DOI: 10.4018/jisp.2013070102,
[Article]

Hauke, Sascha and Biedermann, Sebastian and Heider, Dominik and Mühlhäuser, Max (2013):
On the Application of Supervised Machine Learning to Trustworthiness Assessment.
(TR-014), DOI: 10.1109/TrustCom.2013.5,
[Report]

Olembo, Maina and Stockhardt, Simon and Hülsing, Andreas and Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), [Conference or Workshop Item]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Werthmann, Tim and Hund, Ralf and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Ghiglieri, Marco and Kalabis, Lukas and Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Huss, Sorin A. and Stöttinger, Marc and Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, [Conference or Workshop Item]

2012

Schneider, Thomas and Zohner, Michael (2012):
Efficient Secure Two-Party Computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Online-Edition: https://encrypto.de/papers/SZ12.pdf],
[Conference or Workshop Item]

El Bansarkhani, Rachid and Cabarcas, Daniel and Kuo, Po-Chun and Schmidt, Patrick and Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, pp. 81-102, 53, [Article]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Katzenbeisser, Stefan and Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885, [Article]

Peter, Andreas and Hartmann, T. and Müller, S. and Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), IEEE, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Hollick, Matthias and Trumpold, K. (2012):
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
In: Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), [Conference or Workshop Item]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master Thesis]

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference or Workshop Item]

Bodden, Eric and Tolêdo, Társis and Ribeiro, Márcio and Brabrand, Claus and Borba, Paulo and Mezini, Mira (2012):
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf],
[Report]

Walter, Michael and Bulygin, Stanislav and Buchmann, Johannes
Kutylowski, Miroslaw and Yung, Moti (eds.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), Springer, Beijing, China, In: Lecture Notes in Computer Science, 7763, ISBN 978-3-642-38518-6,
[Conference or Workshop Item]

Vigil, Martín and Custódio, Ricardo Felipe (2012):
Cleaning up the PKI for Long-term Signatures.
In: 12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, Brazilian Computer Society, Curitiba PR, Brazil, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Springer 2013, Seoul, Korea, In: Lecture Notes in Computer Science, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, pp. 305-308, 35, (4), [Article]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Stopczynski, Martin and Ghiglieri, Marco (2012):
Smart Home Dashboard – Das intelligente Energiemanagement.
In: VDE KONGRESS 2012 Smart Grid, VDE Verlag GmbH, ISBN 978-3-8007-3446-7,
[Conference or Workshop Item]

Bodden, Eric and Falzon, Kevin and Pun, Ka I. and Stolz, Volker (2012):
Delta-oriented Monitor Specification.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf],
[Conference or Workshop Item]

Bodden, Eric and Follner, Andreas and Rasthofer, Siegfried (2012):
Challenges in defining a programming language for provably correct dynamic analyses.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]

Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
Darmstadt, Technische Universität, [Bachelor Thesis]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4, [Article]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander
Ryan, Mark and Smyth, Ben and Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Schröder, Dominik and Schröder, Heike (2012):
Verifiable Data Streaming.
[Conference or Workshop Item]

Lauinger, Tobias and Laoutaris, Nikolaos and Rodriguez, Pablo and Strufe, Thorsten and Biersack, Ernst and Kirda, Engin (2012):
Privacy Risks in Named Data Networking: What is the Cost of Performance?
DOI: 2378956.2378966,
[Other]

Reinhardt, Andreas and Baumann, Peter and Burgstahler, D. and Hollick, Matthias and Chonov, H. and Werner, Marc and Steinmetz, R. (2012):
On the Accuracy of Appliance Identification Based on Distributed Load Metering Data.
In: Proceedings of the 2nd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), [Conference or Workshop Item]

Garcia-Saavedra, Andres and Serrano, Pablo and Banchs, Albert and Hollick, Matthias (2012):
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, pp. 631-645, 8, (5), [Article]

do Carmo, R. and Werner, M. and Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), [Conference or Workshop Item]

Christin, Delphine and Büttner, C. and Repp, Nicolas (2012):
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
In: Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), [Conference or Workshop Item]

Schläpfer, Michael and Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, In: ACM, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Falzon, Kevin and Pace, Gordon J.
Machado, Ricardo J. and Maciel, Rita Suzana and Rubin, Julia and Botterweck, Goetz (eds.) (2012):
Combining Testing and Runtime Verification.
In: 8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, Essen, Germany, September 04, 2012, [Online-Edition: http://www.di.uminho.pt/mompes],
[Conference or Workshop Item]

Demirel, Denise and Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Online-Edition: https://jusletter-it.weblaw.ch/redaktion.html],
[Article]

Katzenbeisser, Stefan and Kocabaş, Ünal and Rožic, Vladimir and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 7428, [Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Vigil, Martín and Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Volkamer, Melanie
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: EuroPKI 2012, September 13-14, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Kelbert, Florian and Shirazi, Fatemeh and Simo, Hervais and Wüchner, Tobias and Buchmann, Johannes and Pretschner, Alexander and Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, pp. 189-279, [Book Section]

Knauer, Julian and Baier, Harald (2012):
Zur Sicherheit von ATA-Festplattenpasswörtern.
In: DACH Security 2012, [Conference or Workshop Item]

Yuan, Dingwen and Hollick, Matthias (2012):
Optimization and Scheduling of Wireless Sensor Networks for Periodic Control Systems.
In: 11. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze" (FGSN), [Conference or Workshop Item]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes
Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012, Birmingham, UK, [Conference or Workshop Item]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Roos, Björn and Baier, Harald (2012):
IT-Forensik im Wandel - Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Smartphones mit dem Windows Phone Betriebssystem.
In: DACH Security 2012, ISBN 978-3-00-039221-4,
[Conference or Workshop Item]

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Information Security, In: 15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, In: Lecture Notes in Computer Science, 7483, ISSN 0302-9743,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11],
[Conference or Workshop Item]

Kononenko, Kirill (2012):
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
In: International Conference on Mobile Computing and Networking, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Véron, Pascal and Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
In: WAIFI 2012, pp. 45 - 63, LNCS, (7369), [Article]

Winter, Christian and Schneider, Markus and Yannikos, York (2012):
Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis.
In: Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic, IEEE Computer Society, Prague, Czech Republic, E4775, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.37,
[Conference or Workshop Item]

Stelle, Stanislaus and Manulis, Mark and Hollick, Matthias (2012):
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
In: In Proceedings of Seventh International Conference on Availability, Reliability and Security (ARES 2012), IEEE Computer Society, Prague, Czech Republic, [Conference or Workshop Item]

Breitinger, Frank and Baier, Harald and Beckingham, Jesse (2012):
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo), [Article]

Breitinger, Frank and Baier, Harald (2012):
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA), [Article]

Halvani, Oren (2012):
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Darmstadt, Technische Universität, [Bachelor Thesis]

Hülsing, Andreas and Busold, Christoph and Buchmann, Johannes
Knudsen, Lars and Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: SAC2012 - Conference on Selected Areas in Cryptography, Springer Berlin Heidelberg, Windsor, Canada, In: LNCS, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Schreiner, Steffen and Grigoras, Costin and Grigoras, Alina and Betev, Latchezar and Buchmann, Johannes (2012):
A Grid security architecture for AliEn.
In: Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012, Taipei, Taiwan, [Conference or Workshop Item]

Demirel, Denise and van de Graaf, Jeroen and Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012, Bellevue, WA, [Conference or Workshop Item]

Lauinger, Tobias and Laoutaris, Nikolaos and Rodriguez, Pablo and Strufe, Thorsten and Biersack, Ernst and Kirda, Engin (2012):
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.
(0812-001), [Report]

Zmudzinski, Sascha and Steinebach, Martin and Butt, Moazzam (2012):
Watermark Embedding Using Audio Fingerprinting.
In: Transactions on Data Hiding and Multimedia Security VIII, Springer, pp. 63ff., Lecture Notes in Computer, (7882), [Article]

Wilhelmi, Klaus (2012):
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
TU Darmstadt, [Master Thesis]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Thies, Andreas and Bodden, Eric (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs [forthcoming].
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Online-Edition: http://www.bodden.de/pubs/tb12refaflex.pdf],
[Conference or Workshop Item]

Kiefer, Franziskus and Wiesmaier, Alexander and Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12), Las Vegas, USA, [Conference or Workshop Item]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie
Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, In: LNI - Lecture Notes in Informatics, 205, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Sewe, Andreas and Mezini, Mira and Sarimbekov, Aibek and Ansaloni, Danilo and Binder, Walter and Ricci, Nathan and Guyer, Samuel Z. (2012):
new Scala() instance of Java: a Comparison of the Memory Behaviour of Java and Scala Programs.
In: Proceedings of the International Symposium on Memory Management, New York, NY, USA, ACM, In: International Symposium on Memory Management, Beijing, China, 15-16 Jun 2012, In: ISMM '12, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Frey, Hannes and Hollick, Matthias and Loch, Adrian (2012):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), DOI: 10.1109/WoWMoM.2012.6263689,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, [Conference or Workshop Item]

Garcia-Saavedra, Andres and Serrano, Pablo and Banchs, Albert and Hollick, Matthias (2012):
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In: In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Lucca, Italy, [Conference or Workshop Item]

Baier, Harald and Brand, Achim (2012):
On the Investigation of Application Specific Data within Digital Forensics.
In: Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), ISBN 978-1-84102-316-8,
[Conference or Workshop Item]

Niebuhr, Robert and Meziani, Mohammed and Bulygin, Stanislav and Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, pp. 137-147, 11, (3), [Article]

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Christin, Delphine and Sánchez López, P. and Reinhardt, Andreas and Hollick, Matthias and Kauer, Michaela
Askoxylakis, Ioannis and Pöhls, Henrich and Posegga, Joachim (eds.) (2012):
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP), Springer, pp. 71-86, [Book Section]

Christin, Delphine and Bentolila, A. and Hollick, Matthias (2012):
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
In: Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), [Conference or Workshop Item]

Zmudzinski, Sascha and Taneja, Ankt and Steinebach, Martin (2012):
Carving and Reorganizing Fragmented MP3 Files Using Syntactic and Spectral Information.
In: AES 46th Conference on Audio Forensics 2012, 14-16 June 2012, Denver, CO, USA, Audio Engineering Society, [Conference or Workshop Item]

Seyfarth, Ulrich and Ranade, Kedar (2012):
Cyclic mutually unbiased bases, Fibonacci polynomials and Wiedemann's conjecture.
In: J. Math. Phys., p. 62201, 53, (6), DOI: 10.1063/1.4723825,
[Article]

Habib, Sheikh Mahbub and Ries, Sebastian and Hauke, Sascha and Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
In: Proceedings of the IEEE TrustCom 2012, IEEE, Liverpool, UK, ISBN 978-1-4673-2172-3,
DOI: 10.1109/TrustCom.2012.165,
[Conference or Workshop Item]

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, In: Lecture Notes in Computer Science (LNCS), 7344, [Conference or Workshop Item]

Moecke, Cristian Thiago and Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85, DOI: 10.1108/09685221311314419,
[Article]

Ansaloni, Danilo and Binder, Walter and Bockisch, Christoph and Bodden, Eric and Hatun, Kardelen and Marek, Lukas and Qi, Zhengwei and Sarimbekov, Aibek and Sewe, Andreas and Tuma, Petr and Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
In: International Conference on Software Composition (SC 2012), [Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf],
[Conference or Workshop Item]

Zheng, Yudi and Ansaloni, Danilo and Marek, Lukas and Sewe, Andreas and Binder, Walter and Villazón, Alex and Tuma, Petr and Qi, Zhengwei and Mezini, Mira (2012):
Turbo DiSL: Partial Evaluation for High-level Bytecode Instrumentation.
In: Objects, Models, Components, Patterns, Berlin / Heidelberg, Springer, pp. 353-368, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-30561-0_24],
[Book Section]

Braun, Johannes and Buchmann, Johannes
Levi, Albert and Badra, Mohamad and Cesana, Matteo and Ghassemian, Mona and Jabeur, Nafaa and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Seudié, Hervé and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza (2012):
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC), [Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
In: Proceedings of the 21st international conference companion on World Wide Web, ACM, Lyon, France, WWW '12 Companion, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2012):
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL), pp. 89-101, [Article]

Neumann, Stephan and Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), ThinkMind Digital Library, Stuttgart. Germany, ICIMP 2012, The Seventh I, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference or Workshop Item]

Pflug, Anika and Hartung, Daniel and Busch, Christoph (2012):
Feature Extraction from Vein Images using Spatial Information and Chain Codes.
In: ISTR, pp. 26-35, (17), DOI: 10.1016/j.istr.2012.02.003,
[Article]

Heuser, Annelie and Zohner, Michael (2012):
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]

Zohner, Michael and Kasper, Michael and Stoettinger, Marc (2012):
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]

Bockisch, Christoph and Sewe, Andreas and Yin, Haihan and Mezini, Mira and Aksit, Mehmet (2012):
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, pp. 1-28, 11, (1), ISSN 1660-1769,
[Online-Edition: http://dx.doi.org/10.5381/jot.2012.11.1.a7],
[Article]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Colors for Privacy Settings.
In: Proceedings of the World Wide Web Conference (WWW), [Conference or Workshop Item]

Jiang, Xuxian and Grace, Michael and Sadeghi, Ahmad-Reza and Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec, ACM, [Conference or Workshop Item]

Wachsmann, Christian and Sadeghi, Ahmad-Reza and Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, Springer, pp. 429-449, [Book Section]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Walter, Michael (2012):
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
TU Darmstadt, [Master Thesis]

Djatmiko, Mentari and Boreli, Roksana and Seneviratne, Aruna and Ries, Sebastian (2012):
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, pp. 1-14, 18, DOI: 10.1007/s11276-012-0505-5,
[Article]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Schulz, Steffen and Sadeghi, Ahmad-Reza and Zhdanova, Maria and Xu, Wenyuan and Mustafa, Hossen and Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias and Martucci, Leonardo and Kanhere, Salil (2012):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom), [Conference or Workshop Item]

Das, Amitabh and Kocabaş, Ünal and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE), [Conference or Workshop Item]

Czajkowski, Katja and Schneider, Markus and Wolf, Ruben and Yannikos, York (2012):
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
(SIT-TR-2012-002), [Report]

Wolf, Patrick and Steinebach, Martin (2012):
FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertschöpfungskette.
In: GI Sicherheit 2012, [Conference or Workshop Item]

Bessani, Alysson and Abbadi, Imad M. and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marcelo and Schirmer, Norbert (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing, [Book]

Olsen, Martin Aastrup and Xu, Haiyun and Busch, Christoph (2012):
Gabor Filters as Candidate Quality Measure for NFIQ 2.0.
In: The 5th IAPR International Conference on Biometrics, [Article]

Hartung, Daniel and Olsen, Martin Aastrup and Xu, Haiyun and Nguyen, Hai Thanh and Busch, Christoph (2012):
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, pp. 25-36, 1, (1), DOI: 10.1049/iet-bmt.2011.0013,
[Article]

Hartung, Daniel and Pflug, Anika and Busch, Christoph (2012):
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: Sicherheit 2012 - Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik e.V., In: LNI, [Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), pp. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: Sicherheit, GI, Darmstadt, Germany, In: LNI, 195, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Henriques, Joselito and von Lukas, Uwe and Mesing, Benjamin (2012):
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, Göller, Baden-Baden, pp. 84-86, 2, ISSN 1866-5004,
[Article]

Van Herrewege, Anthony and Katzenbeisser, Stefan and Maes, Roel and Peeters, Roel and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Financial Cryptography (FC) 2012, Springer, In: Lecture Notes in Computer Science (LNCS), 7397, [Conference or Workshop Item]

Hülsing, Andreas and Petzoldt, Albrecht and Schneider, Michael and Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012, Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Seyfarth, Ulrich and Nikolopoulos, Georgios and Alber, Gernot (2012):
Symmetries and security of a quantum-public-key encryption based on single-qubit rotations.
In: Phys. Rev. A, p. 22342, 85, DOI: 10.1103/PhysRevA.85.022342,
[Article]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Schulz, Steffen and Brasser, Ferdinand and Filyanov, Atanas (2012):
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: Financial Cryptography and Data Security (FC), Springer, In: LNCS, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Ries, Sebastian and Hauke, Sascha and Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Trust Assessment for Cloud Marketplaces (Full version).
(31 pages), [Report]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Sarimbekov, Aibek and Sewe, Andreas and Binder, Walter and Moret, Philippe and Mezini, Mira (2012):
JP2: Call-s