TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Number of items at this level: 2074.

German

Carrasco Subieta, Alvaro German (2019):
Entwicklung neuartiger wimpernbasierter piezoelektrischer Antriebe.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8648],
[Ph.D. Thesis]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Online-Edition: https://www.gil-net.de/tagungen.php],
[Conference or Workshop Item]

Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Ludwig, Thomas and Pottebaum, Jens and Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672, [Conference or Workshop Item]

Reuter, Christian Ückert, Sandra (ed.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Book Section]

Reuter, Christian Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (eds.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, pp. accepted, [Book Section]

Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672, [Conference or Workshop Item]

Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672, [Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672, [Conference or Workshop Item]

Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas Werkner, Ines-Jacqueline (ed.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, Springer VS, pp. akzeptiert, [Book Section]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria:, 18.-19.2.2019, [Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Conference or Workshop Item]

Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReutereta...],
[Conference or Workshop Item]

Riebe, Thea and Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, (1), pp. 46-48, [Online-Edition: http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF...],
[Article]

Almon, Lars and Álvarez, Flor and Lieser, Patrick and Meuser, Tobias and Schaller, Fabian (2018):
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt.
In: DuD-Fachbeiträge, In: Die Fortentwicklung des Datenschutzes, Vieweg, Wiesbaden, Springer, pp. 77-98, DOI: 10.1007/978-3-658-23727-1_5,
[Book Section]

Deaconescu, Razvan and Carabas, Costin and Manda, Iulia and Enck, William and Chiroiu, Mihai and Li, Ninghui and Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security, [Conference or Workshop Item]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor Thesis]

Classen, Jiska and Wegemer, Daniel and Patras, Paul and Spink, Tom and Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Conference or Workshop Item]

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, pp. 83-98, [Book Section]

Heuss, Oliver (2018):
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7337],
[Ph.D. Thesis]

Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, pp. 309-312, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...],
[Conference or Workshop Item]

Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, pp. 443-446, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...],
[Conference or Workshop Item]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, pp. 623-632, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, pp. 579-586, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...],
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Geisler, Stefan and Ludwig, Thomas and Pipek, Volkmar and Pottebaum, Jens Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, pp. 565-569, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...],
[Conference or Workshop Item]

Riebe, Thea and Nordmann, Alfred and Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, pp. 60-61, [Online-Edition: https://wissenschaft-und-frieden.de/seite.php?artikelID=2312],
[Article]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
2, In: BBK Bevölkerungsschutz, pp. 22-24, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
1, In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, pp. 64-66, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpi...],
[Article]

Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 621-630, DOI: 10.1007/978-3-658-19523-6_30,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 3-14, DOI: 10.1007/978-3-658-19523-6_1,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André Reuter, Christian (ed.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Springer Vieweg, pp. 379-402, DOI: 10.1007/978-3-658-19523-6_19,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André Reuter, Christian (ed.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 573-595, DOI: 10.1007/978-3-658-19523-6_28,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar Reuter, Christian (ed.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 443-465, DOI: 10.1007/978-3-658-19523-6_22,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
Wiesbaden, Springer Vieweg (Lehrbuch/Fachbuch), ISBN 978-3-658-19522-9,
DOI: 10.1007/978-3-658-19523-6,
[Online-Edition: http://www.springer.com/de/book/9783658195229],
[Book]

Reuter, Christian and Kaufhold, Marc-André Reuter, Christian (ed.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 17-40, DOI: 10.1007/978-3-658-19523-6_2,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Nordmann, Alfred and Reuter, Christian and Lederer, Markus (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, hrsg. von Josef Wiemeyer, Darmstadt, pp. 71-89, [Online-Edition: http://www.peasec.de/paper/2019/2019_LedererNordmannReuter_I...],
[Book Section]

Meurisch, Christian and Gedeon, Julien and Gogel, Artur and Nguyen, The An Binh and Kaup, Fabian and Kohnhäuser, Florian and Baumgärtner, Lars and Schmittner, Milan and Mühlhäuser, Max (2017):
Temporal Coverage Analysis of Router-based Cloudlets Using Human Mobility Patterns.
In: IEEE GLOBECOM, IEEE, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2017):
Coercion resistant proxy voting.
71, In: Computers & Security, pp. 88-99, DOI: 10.1016/j.cose.2017.06.007,
[Article]

El Khoury, Mario and Duznovic, Ivana and Ali, Mubarak and Ensinger, Wolfgang and Schlaak, Helmut F. (2017):
Integration konischer Nanoporen in Lab-on-Chip-Systeme für die Histamin-Analyse.
In: Proceedings - Mikrosystemtechnik Kongress 2017, In: Mikrosystemtechnikkongress 2017, München, Unterschleißheim, Deutschland, 23.-25. Oktober 2017, pp. 175-178, [Conference or Workshop Item]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelor Thesis]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, pp. 24-31, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference or Workshop Item]

Schulz, Matthias and Wegemer, Daniel and Hollick, Matthias (2017):
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
In: Proceedings of the 11th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH 2017), [Conference or Workshop Item]

Meurisch, Christian and Naeem, Usman and Scholl, Philipp and Azam, Muhammad Awais and Günther, Sebastian and Baumann, Paul and ur Réhman, Shafiq and Mühlhäuser, Max (2017):
SmartGuidance'17: 2nd Workshop on Intelligent Personal Support of Human Behavior.
In: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'17): Adjunct Publication, ACM, [Conference or Workshop Item]

Hohmann, F. and Klein, A. (2017):
Cooperative Forwarding using Distributed MISO in OFDMA Multihop Networks.
In: IEEE Vehicular Technology Conference (VTC 2017-Fall), IEEE, [Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium, [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, pp. 1-10, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 562-569, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Lämmle, David (2017):
THz-Hohlleiter-Schalter basierend auf Nickel-Wanderkeilaktoren.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6649],
[Ph.D. Thesis]

Meurisch, Christian and Nguyen, The An Binh and Gedeon, Julien and Kohnhäuser, Florian and Schmittner, Milan and Niemczyk, Stefan and Wullkotte, Stefan and Mühlhäuser, Max (2017):
Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge.
In: International Conference on Computer Communications and Networks (ICCCN'17): Posters, IEEE, [Conference or Workshop Item]

Meurisch, Christian and Jeutter, Bennet and Schmidt, Wladimir and Gündling, Nickolas and Schmidt, Benedikt and Herrlich, Fabian and Mühlhäuser, Max (2017):
An Extensible Pervasive Platform for Large-scale Anticipatory Mobile Computing.
In: 41st Annual IEEE Computer Software and Applications Conference (COMPSAC'17), IEEE, [Conference or Workshop Item]

Meurisch, Christian and Nguyen, The An Binh and Wullkotte, Stefan and Niemczyk, Stefan and Kohnhäuser, Florian and Mühlhäuser, Max (2017):
NICER911: Ad-hoc Communication and Emergency Services Using Networking Smartphones and Wireless Home Routers.
In: International Symposium on Mobile Ad Hoc Netwroking and Computing (MobiHoc'17): Posters, ACM, [Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292, In: International Conference on Human-Computer Interaction (HCII), Springer, pp. 675-690, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Zimmermann, Verena and Gerber, Nina Tryfonas, Theo (ed.) (2017):
“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, pp. 265-283, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_18,
[Conference or Workshop Item]

Fuhry, Benny and Bahmani, Raad and Brasser, Ferdinand and Hahn, Florian and Kerschbaum, Florian and Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, pp. 75-86, [Conference or Workshop Item]

Kohnhäuser, F. and Büscher, N. and Gabmeyer, S. and Katzenbeisser, S. (2017):
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM, [Conference or Workshop Item]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Funke, Sebastian Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, pp. 1-10, [Conference or Workshop Item]

Sterz, A. and Baumgärtner, L. and Mogk, R. and Mezini, M. and Freisleben, B. (2017):
DTN-RPC: Remote Procedure Calls for Disruption-Tolerant Networking.
In: IFIP Networking 2017 Conference, IFIP, [Conference or Workshop Item]

Euler, J. and Stryk, Oskar von (2017):
Optimized Vehicle-Specific Trajectories for Cooperative Process Estimation by Sensor-Equipped UAVs.
In: IEEE International Conference on Robotics and Automation (ICRA), IEEE, [Conference or Workshop Item]

Papsdorf, D. and Silva, Y. and Klein, A. (2017):
Multicast Interference Alignment in a Multi-Group Multi-Way Relaying Network.
In: IEEE International Conference on Communications (ICC), IEEE, [Conference or Workshop Item]

Dwarakanath, Rahul and Koldehofe, Boris and Bharadwaj, Yashas and Nguyen, The An Binh and Eyers, David and Steinmetz, Ralf (2017):
TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing.
In: IEEE International Conference on Mobile Data Management (MDM), IEEE, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, pp. 419-433, [Conference or Workshop Item]

Zimmermann, Verena and Volkamer, Melanie and Vogt, Joachim and Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
41, In: >Datenschutz und Datensicherheit - DUD, pp. 308-313, [Article]

Portela, Bernardo and Barbosa, Manuel and Scerri, Guillaume and Warinschi, Bogdan and Bahmani, Raad and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, pp. 1-8, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference or Workshop Item]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Li, X. and Ortiz, A. and Al-Shatri, Hussein and Klein, Anja and Weber, Tobias (2017):
Delay-Constrained Data Transmission for Energy Harvesting Transmitter.
In: ITG Conference on Systems, Communications and Coding (SCC), [Conference or Workshop Item]

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), pp. 337-340, DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, pp. 139-167, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Loch, Adrian and Asadi, Arash and Sim, Gek Hong and Widmer, Jörg and Hollick, Matthias (2017):
mm-Wave on Wheels: Practical 60 GHz Vehicular Communication Without Beam Training.
In: International Conference on Communication Systems & Networks, IEEE, [Conference or Workshop Item]

Baumgärtner, L. and Graubner, P. and Höchst, J. and Klein, A. and Freisleben, B. (2017):
Speak Less Hear Enough: On Dynamic Announcement Intervals in Wireless On-demand Networks.
In: IEEE/IFIP Conference on Wireless On-demand Network Systems and Services Conference (WONS), IEEE, [Conference or Workshop Item]

Graubner, Pablo and Sommer, Markus and Hollick, Matthias and Freisleben, Bernd (2017):
Dynamic Role Assignment in Software-Defined Wireless Networks.
In: IEEE Symposium on Computers and Communication (ISCC), IEEE, [Conference or Workshop Item]

Lampe, P. and Baumgärtner, L. and Steinmetz, R. and Freisleben, B. (2017):
SmartFace: Efficient Face Detection on Smartphones for Wireless On-demand Emergency Networks.
In: International Conference on Telecommunications (ICT), [Conference or Workshop Item]

Lieser, P. and Richerzhagen, N. and Feuerbach, T. and Böhnstedt, D. and Steinmetz, R. (2017):
Take it or Leave it: Decentralized Resource Allocation in Mobile Networks.
In: IEEE Conference on Local Computer Networks (LCN), IEEE, [Conference or Workshop Item]

Mdhaffar, Afef and Chaari, Tarak and Larbi, Kaouthar and Jmaiel, Mohamed and Freisleben, Bernd (2017):
IoT-based Health Monitoring via LoRaWAN.
In: IEEE International Conference on Smart Technologies (EUROCON), IEEE, [Conference or Workshop Item]

Mogk, Ragnar and Drechsler, Joscha (2017):
REScala – Principled Distributed Reactive Programming.
In: Poster <Programming>, [Conference or Workshop Item]

Mogk, Ragnar and Drechsler, Joscha (2017):
Demo: Reactive Programming with REScala.
In: Demo <Programming>, [Conference or Workshop Item]

Niemczyk, Stefan and Fredivianus, Nugroho and Geihs, Kurt (2017):
On-the-Fly Transformation Synthesis for Information Sharing in Heterogeneous Multi-Agent Systems.
In: Intelligent Robotics and Multi-Agent Systems (IRMAS), ACM, [Conference or Workshop Item]

Niemczyk, Stefan and Opfer, Stephan and Fredivianus, Nugroho and Geihs, Kurt (2017):
ICE – Self-Configuration of Information Processing in Heterogeneous Agent Teams.
In: ACM Dependable, Adaptive, and Trustworthy Distributed Systems (DADS), ACM, [Conference or Workshop Item]

Schmidt, Nils and Baumgärtner, Lars and Lampe, Patrick and Geihs, Kurt and Freisleben, Bernd (2017):
MiniWorld: Resource-aware Distributed Network Emulation via Full Virtualization.
In: IEEE Symposium on Computers and Communications, IEEE, [Conference or Workshop Item]

Borges, Fábio and Lara, Pedro and Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
292, In: Applied Mathematics and Computation, pp. 406--416, DOI: 10.1016/j.amc.2016.07.036,
[Article]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...],
[Article]

Reinhold, Thomas and Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...],
[Other]

von Drachenfels, Magdalena and Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de, [Other]

Riebe, Thea and Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de, [Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...],
[Other]

Leopold, Inken and Reuter, Christian Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, pp. 361-364, DOI: 10.18420/muc2017-mci-0350,
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
7, In: Mittelstand-Digital "Wissenschaft trifft Praxis", (1), pp. 78-88, [Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...],
[Article]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, pp. 1325-1338, [Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...],
[Conference or Workshop Item]

Reuter, Christian and Pätsch, Katja and Runft, Elena Leimeister, J. M. and Brenner, W. (eds.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
St. Gallen, Switzerland, In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, pp. 649-663, [Online-Edition: https://aisel.aisnet.org/wi2017/track06/paper/6/],
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., pp. 5-8, DOI: 10.18420/muc2017-ws01-0380,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS0...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela (eds.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), Göttingen, Vandenhoeck & Ruprecht, pp. 207-224, DOI: 10.14220/digo.2017.38.1.207,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchet...],
[Book Section]

Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, pp. 295-298, DOI: 10.18420/muc2017-mci-0352,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., pp. 51-58, DOI: 10.18420/muc2017-ws01-0386,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236],
[Conference or Workshop Item]

Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, pp. 609-614, DOI: 10.18420/muc2017-ws17-0416,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3243],
[Conference or Workshop Item]

Pottebaum, Jens and Erfurth, Christian and Reuter, Christian Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, pp. 1281-1282, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, pp. 33-41, DOI: 10.18420/muc2017-ws01-0384,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3214],
[Conference or Workshop Item]

Ortiz, A. and Al-Shatri, H. and Li, X. and Weber, T. and Klein, A. (2016):
A Learning Based Solution for Energy Harvesting Decode-and-Forward Two-Hop Communications.
In: IEEE Global Communications Conference (Globecom), IEEE, [Conference or Workshop Item]

Moschner, K. and Blazhev, A. and Jolie, J. and Warr, N. and Boutachkov, P. and Bednarczyk, P. and Sieja, K. and Algora, A. and Ameil, F. and Bentley, M. A. and Brambilla, S. and Braun, N. and Camera, F. and Cederkaell, J. and Corsi, A. and Danchev, M. and DiJulio, D. and Fahlander, C. and Gerl, J. and Giaz, A. and Golubev, P. and Gorska, M. and Grebosz, J. and Habermann, T. and Hackstein, M. and Hoischen, R. and Kojouharov, I. and Kurz, N. and Margincan, N. and Merchan, E. and Moeller, T. and Naqvi, F. and Singh, B. S. Nara and Nociforo, C. and Pietralla, N. and Pietri, S. and Podolyak, Zs. and Prochazka, A. and Reese, M. and Reiter, P. and Rudigier, M. and Rudolph, D. and Sava, T. and Schaffner, H. and Scruton, L. and Taprogge, J. and Thomas, T. and Weick, H. and Wendt, A. and Wieland, O. and Wollersheim, H.-J. (2016):
Relativistic Coulomb excitation of Kr-88.
94, In: PHYSICAL REVIEW C, (5), ISSN 2469-9985, [Article]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Conference or Workshop Item]

Werner, M. and Kratschmann, D. and Hollick, Matthias (2016):
Panopticon: Supervising Network Testbed Resources.
In: 41st Conference on Local Computer Networks (IEEE LCN, Demo Track), [Conference or Workshop Item]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
3, In: IEEE Cloud Computing Special issue on Cloud Security, (5), pp. 64-75, [Article]

Nolle, Timo and Seeliger, Alexander and Mühlhäuser, Max Calders, Toon and Ceci, Michelangelo and Malerba, Donato (eds.) (2016):
Unsupervised Anomaly Detection in Noisy Business Process Event Logs Using Denoising Autoencoders.
In: Discovery Science: 19th International Conference, DS 2016, Bari, Italy, Proceedings, Calders, Toon Ceci, Michelangelo Malerba, Donato, Bari, Italy, pp. 442-456, ISBN 978-3-319-46307-0,
DOI: 10.1007/978-3-319-46307-0_28,
[Conference or Workshop Item]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Meurisch, Christian (2016):
Intelligent Personal Guidance of Human Behavior Utilizing Anticipatory Models.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'16): Adjunct Publication, ACM, Heidelberg, pp. 441-445, [Conference or Workshop Item]

Papsdorf, D. and Li, X. and Weber, T. and Klein, A. (2016):
Inter-Subnetwork Interference Minimization in Partially Connected Two-Way Relaying Networks.
In: IEEE Vehicular Technology Conference (VTC 2016-Fall), IEEE, [Conference or Workshop Item]

Kohnhäuser, Florian and Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Greece, pp. 320-338, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference or Workshop Item]

Kolb, Nina Prinz, Wolfgang and Borchers, Jan and Jarke, Matthias (eds.) (2016):
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
In: Mensch und Computer 2016 - Tagungsband, Gesellschaft für Informatik e.V., Aachen, DOI: 10.18420/muc2016-mci-0075,
[Conference or Workshop Item]

Reinheimer, Benjamin and Braun, Kristoffer and Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“, Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Mohan, Vaishnavi and Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), [Conference or Workshop Item]

Ali, Azmzt and Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Conference or Workshop Item]

Meurisch, Christian and Naeem, Usman and Azam, Muhammad Awais and Janssen, Frederik and Schmidt, Benedikt and Mühlhäuser, Max (2016):
Smarticipation2016: First Workshop on Intelligent Personal Guidance of Human Behavior Utilizing Anticipatory Models.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'16): Adjunct Publication, ACM, Heidelberg, pp. 1227-1230, [Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, pp. 98 - 106, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Gagliardoni, Tommaso and Hülsing, Andreas and Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, Springer, pp. 60-89, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Lettner, Julian and Kollenda, Benjamin and Homescu, Andrei and Larsen, Per and Schuster, Felix and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Conference or Workshop Item]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Darmstadt, Technische Universität, [Bachelor Thesis]

Fernando, Ruchith and Ranchal, Rohit and An, Byungchan and Othmane, Lotfi Ben and Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud, [Conference or Workshop Item]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie and Mayer, Peter and Kunz, Alexandra and Rack, Philipp and Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, pp. 135-149, [Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Werner, M. and Schwandke, J. and Hollick, Matthias and Hohlfeld, O. and Zimmermann, T. and Wehrle, K. (2016):
STEAN: A Storage and Transformation Engine for Advanced Networking Context.
In: IFIP Networking Conference (IFIP Networking), Vienna, DOI: 10.1109/IFIPNetworking.2016.7497203,
[Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
40, In: Datenschutz und Datensicherheit - DuD, (5), Springer Fachmedien Wiesbaden, pp. 300-304, DOI: 10.1007/s11623-016-0600-3,
[Article]

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016, In: Datenschutz und Datensicherheit, pp. 295-299, DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering, ACM, Austin, Texas, USA, [Conference or Workshop Item]

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, pp. 46-48, [Conference or Workshop Item]

Valipour, Siavash and Volk, Florian and Grube, Tim and Böck, Leon and Mühlhäuser, Max (2016):
A Formal Holon Model for Operating Future Energy Grids During Blackouts.
1, In: 5th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Rome, Italy, IEEE, Rome, Italy, pp. 146-153, ISBN 978-989-758-184-7,
DOI: 10.5220/0005768801460153,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7951346],
[Conference or Workshop Item]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
71, In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, (7), Springer Paris, pp. 309–322, DOI: 10.1007/s12243-016-0510-2,
[Article]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Vasilomanolakis, Emmanouil and Cordero, Carlos Garcia and Milanov, Nikolay and Mühlhäuser, Max (2016):
Towards the creation of synthetic, yet realistic, intrusion detection datasets <b>(best paper award)</b>.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), IEEE, Istanbul, Turkey, pp. 1209 - 1214, ISBN 978-1-5090-0223-8,
DOI: 10.1109/NOMS.2016.7502989,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Srinivasa, Shreyas and Cordero, Carlos Garcia and Mühlhäuser, Max (2016):
Multi-stage Attack Detection and Signature Generation with ICS Honeypots.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), IEEE, pp. 1227 - 1232, ISBN 978-1-5090-0223-8,
DOI: 10.1109/NOMS.2016.7502992,
[Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters), San Francisco, [Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

Zeitouni, Shaza and Oren, Yossef and Wachsmann, Christian and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
99, In: IEEE Transactions on Information Forensics and Security, DOI: TIFS.2015.2512534,
[Article]

McLaughlin, Stephen and Konstantinou, Charalambos and Wang, Xueyang and Davi, Lucas and Sadeghi, Ahmad-Reza and Maniatakos, Michail and Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
PP, In: Proceedings of the IEEE, (99), DOI: 10.1109/JPROC.2015.2512235,
[Article]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master Thesis]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference, [Conference or Workshop Item]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference, ACM, [Conference or Workshop Item]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Sim, Gek Hong and Loch, Adrian and Asadi, Arash and Mancuso, Vincenzo and Widmer, Jörg (2016):
5G Millimeter-Wave and D2D Symbiosis: 60 GHz for Proximity-based Services.
In: IEEE Wireless Communication Magazine, [Article]

Sim, Gek Hong and Nitsche, Thomas and Widmer, Jörg (2016):
Addressing MAC Layer Inefficiency and Deafness of IEEE802.11ad Millimeter Wave Networks using a Multi-Band Approach.
In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), [Conference or Workshop Item]

Sim, Gek Hong and Li, Rui and Cano, Cristina and Patras, Paul and Malone, David and Widmer, Jörg (2016):
Learning from Experience: Efficient Decentralized Scheduling for 60GHz Mesh Networks.
In: The 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2016), [Conference or Workshop Item]

Loch, Adrian and Sim, Gek Hong (2016):
Millimeter-Wave Blind Spots: Mitigating Deafness Collisions Using Frame Aggregation.
In: Millimeter-wave Networking Workshop 2016, in conjunction with the 35th IEEE International Conference on Computer Communications (IEEE INFOCOM 2016), [Article]

Sim, Gek Hong and Widmer, Jörg (2016):
Finite Horizon Opportunistic Multicast Beamforming.
In: IEEE Transactions on Wireless Communications, [Article]

Baumgärtner, Lars and Gardner-Stephen, Paul and Graubner, Pablo and Lakeman, Jeremy and Höchst, Jonas and Lampe, Patrick and Schmidt, Nils and Schulz, Stefan and Sterz, Artur and Freisleben, Bernd (2016):
An Experimental Evaluation of Delay-Tolerant Networking with Serval.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, [Conference or Workshop Item]

Kohlbrecher, S. and Stryk, Oskar von (2016):
From RoboCup Rescue to supervised autonomous mobile robots for remote inspection of industrial plants.
30, In: KI - Künstliche Intelligenz, (3), p. 311, [Article]

Ortiz, A. and Al-Shatri, H. and Li, X. and Weber, T. and Klein, A. (2016):
Reinforcement Learning for Energy Harvesting Point-to-Point Communications.
In: IEEE International Conference on Communications (ICC), IEEE, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Larsen, Per and Brunthaler, Stefan and Davi, Lucas and Sadeghi, Ahmad-Reza and Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie (2015):
Certification of ICTs in Elections.
1, nternational Institute for Democracy and Electoral Assistance, [Book]

Vasilomanolakis, Emmanouil and Kruegl, Matthias and Cordero, Carlos Garcia and Fischer, Mathias and Mühlhäuser, Max (2015):
SkipMon: a Locality-Aware Collaborative Intrusion Detection System.
In: International Performance Computing and Communications Conference (IPCCC), IEEE, Nanjing, China, pp. 1 - 8, ISBN 978-1-4673-8590-9,
DOI: 10.1109/PCCC.2015.7410282,
[Conference or Workshop Item]

Volk, Florian and Trüschler, Nadine and Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, IARIA, Barcelona, Spain, pp. 36-41, ISBN 978-1-61208-440-4,
[Conference or Workshop Item]

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: LNCS, In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, pp. 1-24, [Conference or Workshop Item]

Coudert, Fanny and Butin, Denis and Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
31, In: Computer Law & Security Review (CLSR), (6), pp. 749-762, [Article]

Dagdelen, Özgür and Gajek, Sebastian and Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, [Conference or Workshop Item]

Othmane, Lotfi Ben and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim (2015):
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
[Report]

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015, [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Kühne, Alexander and Klein, Anja (2015):
OFDMA for wireless multihop networks: From theory to practice.
23, In: Pervasive and Mobile Computing, pp. 104--121, DOI: 10.1016/j.pmcj.2015.07.003,
[Article]

Saissi, Habib and Bokor, Peter and Suri, Neeraj (2015):
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, [Conference or Workshop Item]

Ta, Vinh-Thong and Butin, Denis and Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: LNCS, In: Annual Privacy Forum (APF2015), Springer, Luxembourg, [Conference or Workshop Item]

Steinebach, Martin and Schäfer, Marcel and Winter, Christian (2015):
Datenschutz im Zeitalter von Big Data.
17. Jahrgang, In: Wissensmanagement – Das Magazin für Führungskräfte, (Heft 7/2015 (Ausgabe Okto), pp. 29–31, [Article]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
11/2015, In: Datenschutz und Datensicherheit, pp. 747-752, DOI: 10.1007/s11623-015-0512-7,
[Article]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Crane, Stephen and Volckaert, Stijn and Schuster, Felix and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Sutter, Bjorn De and Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Negro, Marco and Qunaibit, Mohaned and Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Funke, Sebastian and Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis and Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), poster proceedings, IEEE, Florence, Italy, pp. 705-706, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Steinmetzer, Daniel and Chen, Joe and Classen, Jiska and Knightly, Edward and Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS), Florence, DOI: 10.1109/CNS.2015.7346844,
[Conference or Workshop Item]

Kolb, Nina and Diefenbach, Sarah and Niklas, Susanne Endmann, Anja and Fischer, Holger and Krökel, Malte (eds.) (2015):
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
In: Mensch und Computer 2015 – Usability Professionals, De Gruyter Oldenbourg, Stuttgart, pp. 113-122, [Conference or Workshop Item]

Othmane, Lotfi Ben and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim and Miseldine, Philip (2015):
Factors Impacting the Effort Required to Fix Security Vulnerabilities.
In: Proc. of the 18th Information Security Conference (ISC 2015), [Conference or Workshop Item]

Lilien, Leszek and Othmane, Lotfi Ben and Angin, Pelin and Bhargava, Bharat and Salih, Raed and DeCarlo, Andrew (2015):
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
In: Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW), [Conference or Workshop Item]

Germanus, Daniel and Ismail, Hatem and Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, [Conference or Workshop Item]

Piper, Thorsten and Suri, Neeraj and Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, [Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, pp. 731-732, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max (2015):
ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, pp. 739 - 740, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Srinivasa, Shreyas and Mühlhäuser, Max (2015):
Did you really hack a nuclear power plant? An industrial control mobile honeypot.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, pp. 729 - 730, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346907,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Stahn, Michael and Cordero, Carlos Garcia and Mühlhäuser, Max (2015):
Probe-response attacks on collaborative intrusion detection systems: effectiveness and countermeasures.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, pp. 699 - 700, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346892,
[Conference or Workshop Item]

Ortiz, A. and Al-Shatri, Hussein and Li, X. and Weber, Tobias and Klein, Anja (2015):
Throughput Maximization in Two-Hop Energy Harvesting Communications.
In: IEEE International Symposium on Wireless Communication Systems (ISWCS), IEEE, [Conference or Workshop Item]

Papsdorf, D. and Li, X. and Weber, T. and Klein, A. (2015):
Interference Alignment in Partially Connected Multi-user Two-Way Relay Networks.
In: IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE, [Conference or Workshop Item]

Huang, Jialin and Vaudenay, Serge and Lai, Xuejia and Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference or Workshop Item]

Al-Hadhrami, Nasser and Aziz, Benjamin and Sardesai, Shantanu and Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015), [Conference or Workshop Item]

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C, [Conference or Workshop Item]

Gazis, Vangelis and Görtz, Manuel and Huber, Marco and Leonardi, Alessandro and Mathioudakis, Kostas and Wiesmaier, Alexander and Zeiger, Florian and Vasilomanolakis, Emmanouil (2015):
A Survey of Technologies for the Internet of Things.
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, IEEE, Dubrovnik, Croatia, pp. 1090 - 1095, ISBN 978-1-4799-5343-1,
DOI: 10.1109/IWCMC.2015.7289234,
[Conference or Workshop Item]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
How Current Android Malware Seeks to Evade Automated Code Analysis.
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015), [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference or Workshop Item]

Luna, Jesus and Suri, Neeraj and Iorga, Michaela and Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York, [Conference or Workshop Item]

Do, Lisa Nguyen Quang and Ali, Karim and Bodden, Eric and Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, pp. 67-84, [Conference or Workshop Item]

Stohr, Denny and Schulz, Matthias and Hollick, Matthias and Effelsberg, Wolfgang (2015):
APP and PHY in Harmony: Demonstrating Scalable Video Streaming Supported by Flexible Physical Layer Control.
In: International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), [Conference or Workshop Item]

Songhori, Ebrahim and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Fischer, Mathias and Mühlhäuser, Max (2015):
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: International Conference in Distributed Computing Systems, IEEE, Columbus, Ohio, pp. 619-629, ISBN 978-1-4673-7214-5,
[Conference or Workshop Item]

Steinebach, Martin and Winter, Christian and Halvani, Oren and Schäfer, Marcel and Yannikos, York (2015):
Big Data und Privatheit – Chancen durch Big Data und die Frage des Privatsphärenschutzes.
(SIT-TR-2015-06), [Report]

Othmane, Lotfi Ben and Ranchal, Rohit and Fernando, Ruchith and Bhargava, Bharat and Bodden, Eric (2015):
Incorporating Attacker Capabilities in Risk Estimation and Mitigation.
51, In: Computers & Security, pp. 41–61, DOI: 10.1016/j.cose.2015.03.001,
[Article]

Steinmetzer, Daniel and Schulz, Matthias and Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Conference or Workshop Item]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Golling, Mario and Baier, Harald and Pras, Aiko (2015):
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols.
p. 9, [Article]

Winter, Stefan and Schwahn, Oliver and Natella, Roberto and Suri, Neeraj and Cotroneo, Domenico (2015):
No PAIN, No Gain? The utility of PArallel fault INjections.
In: International Conference on Software Engineering (ICSE), 2015, International Conference on Software Engineering, [Conference or Workshop Item]

Steinberger, Jessica and Sperotto, Anna and Baier, Harald and Pras, Aiko (2015):
Collaborative Attack Mitigation and Response: A Survey.
In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management, Ottawa (Canada), ISBN 978-3-901882-76-0,
[Conference or Workshop Item]

Ossenbühl, Sven and Steinberger, Jessica and Baier, Harald (2015):
Towards automated incident handling: How to select an appropriate response against a network-based attack?
In Proceedings of 9th Int, p. 17, [Article]

Winter, Stefan and Piper, Thorsten and Schwahn, Oliver and Natella, Roberto and Suri, Neeraj and Cotroneo, Domenico (2015):
GRINDER: On Reusability of Fault Injection Tools.
In: Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz, [Conference or Workshop Item]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Schuster, Felix and Tendyck, Thomas and Liebchen, Christopher and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Ghiglieri, Marco and Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Piper, Thorsten and Winter, Stefan and Schwahn, Oliver and Bidarahalli, Suman and Suri, Neeraj (2015):
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems.
In: ISORC, [Conference or Workshop Item]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.
[Report]

Bucicoiu, Mihai and Davi, Lucas and Deaconescu, Razvan and Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Nguyen, The An Binh and Englert, Frank and Farr, Simon and Gottron, Christian and Böhnstedt, Doreen and Steinmetz, Ralf (2015):
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
In: International Workshop on Pervasive Networks for Emergency Management (PerNEM), IEEE, [Conference or Workshop Item]

Schulz, Matthias and Stohr, Denny and Wilk, Stefan and Rudolph, Benedikt and Effelsberg, Wolfgang and Hollick, Matthias (2015):
APP and PHY in Harmony: A Framework Enabling Flexible Physical Layer Processing to Address Application Requirements.
In: Proceedings of the International Conference on Networked Systems (NetSys 2015), [Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric (2015):
Harvesting Runtime Data in Android Applications for Identifying Malware and Enhancing Code Analysis.
(TUD-CS-2015-0031), [Report]

Gerber, Paul and Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
2/2015, In: Datenschutz und Datensicherheit, pp. 108 - 113, DOI: 10.1007/s11623-015-0375-y,
[Article]

Davi, Lucas and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Snow, Kevin and Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Busold, Christoph and Heuser, Stephan and Rios, Jon and Sadeghi, Ahmad-Reza and Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Tan, Feng and Wang, Yufei and Wang, Qixin and Bu, Lei and Suri, Neeraj (2015):
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking.
In: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, [Article]

El Bansarkhani, Rachid and Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20, [Article]

Maseberg, Sönke and Bodden, Eric and Kus, Mehmet and Brucker, Achim and Rasthofer, Siegfried and Berger, Bernhard and Huber, Stephan and Sohr, Karsten and Gerber, Paul and Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, pp. 505-516, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Othmane, Lotfi Ben and Weffers, Harold and Mohamad, Mohd Murtadha and Wolf, Marko Benhaddou, Driss and Al-Fuqaha, Ala (eds.) (2015):
Wireless Sensor and Mobile Ad-Hoc Networks.
Springer New York, pp. 217-247, [Book Section]

Othmane, Lotfi Ben and Cerqueus, Thomas and Thiery, Adrien and Salehie, Mazeiar and Noel, Nicolas and Labaere, Anthony and Domingues, Remi and Cordier, Arnaud and Ventresque, Anthony and Pasquale, Liliana and Perry, Philip and Nuseibeh, Bashar (2015):
Response to Emergency Situations in a Traffic Management System.
In: Proc. International Conference on Computer Information Systems, [Conference or Workshop Item]

Dmitrienko, Alexandra and Heuser, Stephan and Nguyen, Thien Duc and da Silva Ramos, Marcos and Rein, Andre and Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Schulz, Axel and Guckelsberger, Christian and Schmidt, Benedikt (2015):
More Features Are Not Always Better: Evaluating Generalizing Models in Incident Type Classification of Tweets.
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2015, Lisbon, Portugal, September 17-21, 2015, Lisbon, Portugal, pp. 421--430, [Conference or Workshop Item]

Graubner, Pablo and Baumgärtner, Lars and Heckmann, Patrick and Müller, Marcel and Freisleben, Bernd (2015):
Dynalize: Dynamic Analysis of Mobile Apps in a Platform-as-a-Service Cloud.
In: IEEE International Conference on Cloud Computing (CLOUD), IEEE, [Conference or Workshop Item]

Mogk, Ragnar (2015):
Reactive Interfaces: Combining Events and Expressing Signals.
In: Workshop on Reactive and Event-based Languages & Systems (REBLS), [Conference or Workshop Item]

Mogk, R. (2015):
Concurrency Control for Multithreaded Reactive Programming.
In: ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity (SPLASH), ACM, [Conference or Workshop Item]

Niemczyk, Stefan and Geihs, Kurt (2015):
Adaptive Run-Time Models for Groups of Autonomous Robots.
In: IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), IEEE, [Conference or Workshop Item]

Zheng, Yao and Schulz, Matthias and Lou, Wenjing and Hou, Thomas and Hollick, Matthias (2015):
Highly Efficient Known-Plaintext Attacks against Orthogonal Blinding based Physical Layer Security.
4, In: IEEE Wireless Communications Letters, (1), pp. 34--37, DOI: 10.1109/LWC.2014.2363176,
[Article]

Arias-Cabarcos, Patricia and Trapero, Ruben and Almenárez, Florina and Díaz-Sánchez, Daniel and Marín, Andrés (2015):
Blended Identity: Pervasive IdM for Continuous Authentication.
[Conference or Workshop Item]

Yang, Lei and Cao, Jiannong and Han, Di and Tang, Shaojie and Suri, Neeraj (2015):
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments.
In: IEEE Transactions on Cloud Computing,2015, [Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Karuppayah, Shankar and Kikiras, Panayotis and Mühlhäuser, Max (2015):
A honeypot-driven cyber incident monitor: lessons learned and steps ahead.
In: 8th International Conference on Security of Information and Networks, ACM, Sochi/Russia, pp. 158-164, ISBN 978-1-4503-3453-2,
DOI: 10.1145/2799979.2799999,
[Conference or Workshop Item]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie (2015):
Über die Wirksamkeit von Anti-Phishing-Training.
In: Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, A. Weisbecker, M. Burmester & A. Schmidt, Stuttgart, pp. 647-655, [Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), IEEE, pp. 18-23, [Conference or Workshop Item]

Follner, Andreas and Bodden, Eric (2015):
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
[Report]

Oueslati, Hela and Rahman, Mohammad Masudur and Othmane, Lotfi Ben (2015):
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
In: Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, [Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Fischer, Mathias and Mühlhäuser, Max (2015):
Community-based Collaborative Intrusion Detection.
164, In: International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm), Springer International Publishing, pp. 665-681, ISBN 978-3-319-28865-9,
DOI: 10.1007/978-3-319-28865-9_44,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Davi, Lucas and Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Paul, Thomas and Hornung, Marius and Strufe, Thorsten (2014):
Distributed Discovery of User Handles with Privacy.
In: GlobeCom, [Conference or Workshop Item]

Huang, Shin-Ying and Huang, Yennun and Suri, Neeraj (2014):
Event pattern discovery on IDS traces of Cloud Services.
In: IEEE International Conference on Big Data and Cloud Computing (BDCloud), [Conference or Workshop Item]

Othmane, Lotfi Ben and Angin, Pelin and Weffers, Harold and Bhargava, Bharat (2014):
Extending the Agile Development Approach to Develop Acceptably Secure Software.
11, In: IEEE Transactions on Dependable and Secure Computing, (6), pp. 497-509, [Article]

Ghiglieri, Marco Schiele, Otto and Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, [Conference or Workshop Item]

Loch, Adrian and Quesada, Pablo and Hollick, Matthias and Kühne, Alexander and Klein, Anja (2014):
Building Cross-Layer Corridors in Wireless Multihop Networks.
In: 11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2014), pp. 425--433, DOI: 10.1109/MASS.2014.19,
[Conference or Workshop Item]

Suri, Neeraj and Germanus, Daniel and Roos, Stefanie and Strufe, Thorsten (2014):
Mitigating Eclipse Attacks in Peer-to-Peer Networks.
In: In Proceedings of IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, USA, [Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin (2014):
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014), pp. 33-43, [Article]

Schlipf, Mario (2014):
Passwort-Richtlinien.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Loch, Adrian and Hollick, Matthias and Kühne, A. and Klein, A. (2014):
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN 2014), [Conference or Workshop Item]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Loch, Adrian and Hong, Wei-Chih and Hollick, Matthias (2014):
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
In: 39th IEEE Conference on Local Computer Networks (LCN), pp. 37--45, DOI: 10.1109/LCN.2014.6925754,
[Conference or Workshop Item]

Riecker, Michael and Yuan, Dingwen and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Patrolling wireless sensor networks: Randomized intrusion detection.
In: 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, Montreal, QC, Canada, pp. 61-69, [Conference or Workshop Item]

Geihs, Matthias and Cabarcas, Daniel Aranha, Diego F. and Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS, In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, Springer, Florianópolis, Brazil, pp. 48-63, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, pp. 2069-2078, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, pp. 1415-1426, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Loch, Adrian and Schulz, Matthias and Hollick, Matthias (2014):
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
In: Proceedings of the 3rd Workshop of Software Radio Implementation Forum (SRIF 2014), co-located with ACM Sigcomm 2014, [Conference or Workshop Item]

Suri, Neeraj and Vateva-Gurova, Tsvetoslava and Luna, Jesus and Pellegrino, Giancarlo (2014):
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
In: Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, [Conference or Workshop Item]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
102, In: Proceedings of the IEEE, (8), pp. 1189-1206, [Article]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
18, In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, (4), [Article]

Suri, Neeraj and Lanzaro, Anna and Natella, Roberto and Winter, Stefan and Cotroneo, Domenico (2014):
An Empirical Study of Injected versus Actual Interface Errors.
In: Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA), San Jose, CA, USA, [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Nitsche, Thomas and Widmer, J. and Kühne, A. and Klein, A. (2014):
Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), pp. 1--9, DOI: 10.1109/WoWMoM.2014.6918922,
[Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Kühne, A. and Klein, A. (2014):
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), pp. 1--3, DOI: 10.1109/WoWMoM.2014.6919011,
[Conference or Workshop Item]

Kong, Joonho and Koushanfar, Farinaz and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, ACM Press, pp. 1-6, [Conference or Workshop Item]

Mustafa, Hossen and Sadeghi, Ahmad-Reza and Schulz, Steffen and Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, pp. 288-298, DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Loch, Adrian and Meier, David and Hollick, Matthias (2014):
How did you get here? PHY-Layer Path Signatures.
In: Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), [Conference or Workshop Item]

Schmachtenberg, Max and Strufe, Thorsten and Paulheim, Heiko (2014):
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
In: Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14), [Conference or Workshop Item]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Davi, Lucas and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, [Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Budurushi, Jurlind and Volkamer, Melanie Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, pp. 141-152, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

do Carmo, Rodrigo and Hollick, Matthias (2014):
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
In: Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014), IEEE/IFIP, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Koeberl, Patrick and Schulz, Steffen and Sadeghi, Ahmad-Reza and Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin and Neitzel, Svenja Katzenbeisser, Stefan and Lotz, Volkmar and Weippl, Edgar (eds.) (2014):
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Lecture Notes in Informatics, In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 229-241, [Book Section]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Sohr, Karsten and Bartsch, Steffen and Volkamer, Melanie and Berger, Bernhard and Bodden, Eric and Brucker, Achim and Maseberg, Sönke and Kus, Mehmet and Heider, Jens (2014):
Zertifizierte Datensicherheit für mobile Anwendungen.
In: Lecture Notes in Informatics, 228, In: GI Sicherheit 2014, Gesellschaft für Informatik e.V., Wien, pp. 283--291, ISBN 978-3-88579-622-0,
[Conference or Workshop Item]

Senftleben, Marius and Bucicoiu, Mihai and Tews, Erik and Armknecht, Frederik and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra and Noack, David and Sadeghi, Ahmad-Reza and Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference or Workshop Item]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC&#039;14), Springer, [Conference or Workshop Item]

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, pp. 629 - 634, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor Thesis]

Schneider, Markus and Enzmann, Matthias and Stopczynski, Martin (2014):
Web-Tracking-Report 2014.
(SIT-TR-2014-01), ISBN 978-3-8396-0700-8,
[Report]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Liu, Huajian and Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin SPIE, IS&T (ed.) (2014):
Watermarking Textures in Video Games.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, [Conference or Workshop Item]

Suri, Neeraj and Ghani, Hamza and Garcia, Jesus Luna and Petkov, Ivaylo (2014):
User-Centric Security Assessment of Software Configurations: A Case Study.
In: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) 2014, Munich, Germany, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, pp. 168-171, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127, DOI: 10.9785/ovs-cr-2014-119,
[Article]

Patzina, Sven (2014):
Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4132],
[Ph.D. Thesis]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Patzina, Lars (2014):
Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4133],
[Ph.D. Thesis]

Werner, M. and Lange, T. and Hollick, Matthias and Zimmermann, T. and Wehrle, K. (2014):
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols.
In: 1st KuVS Workshop on Anticipatory Networks, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Schaller, André and Arul, Tolga and van der Leest, Vincent and Katzenbeisser, Stefan (2014):
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
In: International Conference on Trust & Trustworthy Computing ( TRUST), pp. 83-100, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75, [Conference or Workshop Item]

Riecker, Michael and Thies, D. and Hollick, Matthias (2014):
Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Yuan, Dingwen and Riecker, Michael and Hollick, Matthias (2014):
Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks.
In: 11th European Conference on Wireless Sensor Networks (EWSN), [Conference or Workshop Item]

Noisternig, M. and Hollick, Matthias (2014):
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
In: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14), Montreal, Canada, pp. 177–185, [Conference or Workshop Item]

Bagci, Ibrahim Ethem and Roedig, Utz and Schulz, Matthias and Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 183-188, DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2014):
Less is more: relaxed yet composable security notions for key exchange.
12, In: Int. J. Inf. Sec., (4), pp. 267-297, [Article]

Suri, Neeraj and Taha, Ahmed and Trapero, Ruben and Luna, Jesus (2014):
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security.
In: Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, China, [Conference or Workshop Item]

Biedermann, Sebastian and Karvelas, Nikolaos and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
8327, In: SOFSEM 2014: Theory and Practice of Computer Science, pp. 114-125, [Article]

Roos, Stefanie and Strufe, Thorsten (2014):
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165, [Article]

Shulman, Haya and Waidner, Michael (2014):
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
In: International Conference on Applied Cryptography and Network Security (ACNS 2014), pp. 531-548, [Conference or Workshop Item]

Christin, Delphine and Engelmann, Franziska and Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107, [Article]

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Kieseberg, Peter and Huber, Markus and Leithner, Manuel and Mulazzani, Martin and Weippl, Edgar (2014):
Covert Computation - Hiding code in code through compile-time obfuscation.
In: Computers & Security, pp. 13-26, [Conference or Workshop Item]

Franz, Martin and Holzer, Andreas and Katzenbeisser, Stefan and Schallhart, Christian and Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
8409, In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, pp. 244-249, [Conference or Workshop Item]

Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science, 8383, In: Public-Key Cryptography PKC 2014, pp. 556-573, [Conference or Workshop Item]

Biedermann, Sebastian and Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja and Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
27, In: J. Cryptology, pp. 397-428, DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference or Workshop Item]

Volk, Florian and Pitzschel, Janette and Mühlhäuser, Max Berntzen, Lasse and Böhm, Stephan (eds.) (2014):
Making the Most of Customer Product Reviews.
1, In: 7th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2014), IARIA, Nice, France, pp. 1--6, ISBN 978-1-61208-369-8,
[Conference or Workshop Item]

Mannes, Elisa and Maziero, Carlos and Lassance, Luiz Carlos and Borges, Fábio (2014):
Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação.
In: XIV Brazilian Symposium on Information Security and Computer Systems (SBSeg), Belo Horizonte - Brazil, pp. 2-15, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference or Workshop Item]

Nautsch, Andreas and Rathgeb, Christian and Busch, Christoph and Reininger, Herbert and Kasper, Klaus (2014):
Towards Duration Invariance of i-Vector-based Adaptive Score Normalization.
In: Odyssey: The Speaker and Language Recognition Workshop, [Conference or Workshop Item]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158, [Article]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
38, In: Datenschutz und Datensicherheit - DuD, (2), Springer Gabler Verlag, pp. 98-102, [Article]

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, Morgan & Claypool, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: LNCS, In: Asiacrypt 2013, Springer, [Conference or Workshop Item]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias (2013):
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
9, In: Pervasive and Mobile Computing (PMC), (5), pp. 695-707, [Article]

Bodden, Eric and Rasthofer, Siegfried and Richter, Philipp and Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
11/2013, In: Datenschutz und Datensicherheit, pp. 720 - 725, DOI: 10.1007/s11623-013-0300-1,
[Article]

Stancill, Blaine and Snow, Kevin and Otterness, Nathan and Monrose, Fabian and Davi, Lucas and Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, [Conference or Workshop Item]

Pham, Thieu Nga and Hoang, Dang Hai and Strufe, Thorsten and Le, Quang Duc and Bui, Phong Thanh and Thai, Nguyet Thi and Le, Thuy Duong and Schweizer, Immanuel (2013):
Processing and Visualizing Traffic Pollution Data in Hanoi City From a Wireless Sensor Network.
In: IEEE SenseApp, pp. 48 - 55, [Conference or Workshop Item]

Trick, Daniel and Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
3D Watermarking in the Context of Video Games.
In: Proceeding IEEE 15th International Workshop on Multimedia Signal Processing 2013 (MMSP 2013), Pula, Italy, September 30 - October 2, 2013, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik Schiele, Otto and Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566, [Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive, [Article]

Schehlmann, Lisa and Baier, Harald (2013):
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes.
In: INFORMATIK 2013: 43. Jahrestagung der Gesellschaft für Informatik, Darmstadt, [Conference or Workshop Item]

Buchmann, Nicolas and Peeters, Roel and Baier, Harald and Pashalidis, Andreas (2013):
Security considerations on extending PACE to a biometric-based connection establishment.
In: 1, In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the, pp. 5-6, [Conference or Workshop Item]

Steinebach, Martin and Liu, Huajian and Yannikos, York (2013):
FaceHash: Face Detection and Robust Hashing.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Conference or Workshop Item]

Oren, Yossef and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS), 8068, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, pp. 107-125, [Conference or Workshop Item]

Rynkowski, Gregor (2013):
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
Darmstadt, Technische Universität, [Bachelor Thesis]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Klose, Robin and Loch, Adrian and Hollick, Matthias (2013):
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
In: Proceedings of the 2nd Workshop of Software Radio Implementation Forum (SRIF 2013), co-located with ACM Sigcomm 2013, [Conference or Workshop Item]

Kalabis, Lukas and Wolf, Ruben and Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
37, In: Datenschutz und Datensicherheit, (8), pp. 512-516, DOI: 10.1007/s11623-013-0209-8,
[Article]

Breitinger, Frank and Stivaktakis, Georgios and Baier, Harald (2013):
FRASH: A framework to test algorithms of similarity hashing.
13, In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), [Article]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA, [Conference or Workshop Item]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
ACM Transactions on Softw, In: Software Engineering Top Journals, Rank 5, [Article]

Beckerle, Matthias and Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, pp. 1-11, [Conference or Workshop Item]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, pp. 752 - 766, [Conference or Workshop Item]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Klose, Robin and Loch, Adrian and Hollick, Matthias (2013):
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
In: Proceedings of the 2013 IEEE International Conference on Sensing, Communication, and Networking (SECON 2013), [Conference or Workshop Item]

Loch, Adrian and Klose, Robin and Hollick, Matthias and Kuehne, Alexander and Klein, Anja (2013):
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013, Demo Session), [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Nitsche, Thomas and Widmer, Jörg and Kuehne, Alexander and Klein, Anja (2013):
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013), [Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, [Conference or Workshop Item]

Nitsche, Thomas and Widmer, Jörg and Loch, Adrian and Hollick, Matthias (2013):
EVM and RSSI Link Quality Measurements in Frequency Selective Fading Channels.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013), [Conference or Workshop Item]

Werner, M. and Kaiser, J. and Hollick, Matthias and Weingärtner, E. and Wehrle, K. (2013):
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
In: Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop), [Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, pp. 347-359, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas and Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, pp. 565-576, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz and Hühnlein, Detlef and Breitenstrom, Christian and Wieland, Thomas and Wiesmaier, Alexander and Biallowons, Benedikt and Petrautzki, Dirk and Potzernheim, Simon and Schmölz, Johannes and Wesner, Alexander and Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, pp. 391-403, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
67, In: Designs, Codes and Cryptography, (2), pp. 209-232, [Article]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Snow, Kevin and Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Monrose, Fabian and Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

do Carmo, Rodrigo and Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187,
[Article]

Kühne, Alexander and Loch, Adrian and Hollick, Matthias and Klein, Anja (2013):
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
In: Wireless Communications and Networking Conference (WCNC'13), pp. 2040--2045, DOI: 10.1109/WCNC.2013.6554877,
[Conference or Workshop Item]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Loch, Adrian and Frey, Hannes and Hollick, Matthias (2013):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing, DOI: 10.1016/j.pmcj.2013.03.004,
[Article]

Kocabas, Unal and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference or Workshop Item]

Breitinger, Frank and Astebøl, Knut Petter and Baier, Harald and Busch, Christoph (2013):
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF), [Article]

Grimm, Marco and Anderl, Reiner (2013):
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Procedia Computer Science, In: Proceedings of the 11th Annual Conference on Systems Engineering Research (CSER 2013), Elsevier, pp. 571-580, [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias (2013):
Face the Enemy: Attack Detection for Planar Graph Routing.
In: Proceedings of the 2013 Conference on Networked Systems (NetSys 2013), [Conference or Workshop Item]

Sepehrdad, Pouyan and Susil, Petr and Vaudenay, Serge and Vuagnoux, Martin (2013):
Smashing WEP in a Passive Attack.
In: 20th International Workshop on Fast Software Encryption (FSE), [Conference or Workshop Item]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
36, In: Computer Communications, (4), pp. 468-480, [Article]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias and Martucci, Leonardo and Kanhere, Salil (2013):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
9, In: Pervasive and Mobile Computing, (3), pp. 353-371, [Article]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, pp. 277-284, [Conference or Workshop Item]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, pp. 233-242, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Liu, Huajian and Takahashi, Fabio Touceira and Schmitz, Andre and Zmudzinski, Sascha and Steinebach, Martin and Wieneke, Jonas (2013):
Video Game Watermarking.
In: Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013, [Conference or Workshop Item]

Breitinger, Frank and Petrov, Kaloyan (2013):
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), [Article]

Christin, Delphine and Sánchez López, P. and Reinhardt, Andreas and Hollick, Matthias and Kauer, Michaela (2013):
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
17, In: Information Security Technical Report (ISTR), (3), pp. 105–116, [Article]

Popovici, C. and Fischer, C. S. and von Smekal, L. (2013):
Fermi velocity renormalization and dynamical gap generation in graphene.
88, In: Physical Review B, (20), ISSN 1098-0121, [Online-Edition: http://dx.doi.org/10.1103/PhysRevB.88.205429],
[Article]

Smith, Dominik and von Smekal, Lorenz (2013):
Hybrid Monte-Carlo simulation of interacting tight-binding model of graphene.
(LATTICE 2013), In: PoS, pp. 048, [Article]

Smith, Dominik and Dumitru, Adrian and Pisarski, Robert and von Smekal, Lorenz (2013):
Effective potential for SU(2) Polyakov loops and Wilson loop eigenvalues.
88, In: Physical Review D, (5), ISSN 1550-7998, [Online-Edition: http://dx.doi.org/10.1103/PhysRevD.88.054020],
[Article]

Kauer, M. and Franz, B. and Pfeiffer, T. and Heine, M. and Christin, Delphine (2013):
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
In: Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress), [Conference or Workshop Item]

Yuan, Dingwen and Hollick, Matthias (2013):
Let's Talk Together: Understanding Concurrent Transmission in Wireless Sensor Networks.
In: 38th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Clauß, Sebastian and Schiffner, Stefan and Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, ACM, Hangzhou, China, pp. 359-368, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Christin, Delphine and Büchner, C. and Leibecke, N. (2013):
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
In: Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop), [Conference or Workshop Item]

Riecker, Michael and Hollick, Matthias (2013):
Weniger ist Mehr: Leichtgewichtige Metriken zur Erkennung von Denial-of-Service Angriffen in Drahtlosen Sensornetzen.
In: Proceedings of the 12th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN13), [Conference or Workshop Item]

Steinebach, M. and Klöckner, P. and Reimers, Nils and Wienand, D. and Wolf, Patrick (2013):
Robust Hash Algorithms for Text.
In: Lecture Notes in Computer Science, In: Proceeding of 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security -- CMS'2013, September 25-26, 2013, Magdeburg, Germany, [Conference or Workshop Item]

Liu, H. and Li, Y. and Steinebach, M. (2013):
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
In: Lecture Notes in Computer Science, In: Proceeding of 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security -- CMS'2013, Springer, [Conference or Workshop Item]

Winter, Stefan and Tretter, Michael and Sattler, Benjamin and Suri, Neeraj (2013):
Software Fault Injections: From Single to Simultaneous Faults.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS), [Conference or Workshop Item]

Feng, Tan and Wang, Qixin and Bu, Lei and Zheng, Rong and Wang, Yufei and Suri, Neeraj (2013):
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS), [Conference or Workshop Item]

Luna, Jesus and Vateva-Gurova, Tsvetoslava and Suri, Neeraj and Rak, Massimiliano and Liccardo, Loredana (2013):
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
In: Proc. of the International Conference on Cloud Computing and Services Science (CLOSER), [Conference or Workshop Item]

Elovici, Yuval and Fire, Michael and Herzberg, Amir and Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]

Busch, C. and Brömme, A. and Pflug, A. and Zhou, X. and Dose, M. and Brauckmann, M. and Weber, F. and Opel, A. and Neugebauer, P. and Leowsky, K. (2013):
Multi-Biometrische Gesichtserkennung.
In: the 13. Deutscher IT-Sicherheitskongress, Bonn, Germany, pp. 361-373, [Conference or Workshop Item]

Stein, C. and Bouatou, V. and Busch, C. (2013):
Video-based Fingerphoto Recognition with Anti-spoofing Techniques with Smartphone Cameras.
In: the IEEE 12th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, [Conference or Workshop Item]

Raghavendra, R. and Raja, K. and Yang, B. and Busch, C. (2013):
Combining Iris and Periocular for Robust Person Verification using Light Field Camera.
In: the 2nd IAPR Asian Conference on Pattern Recognition (ACPR 2013), Japan, [Conference or Workshop Item]

Raghavendra, R. and Raja, K. and Yang, B. and Busch, C. (2013):
Improved Face Recognition At A Distance Using Light Field Camera & Super Resolution Schemes.
In: the 6th International Conference on Security of Information and Networks (SIN 2013), Turkey, [Conference or Workshop Item]

Steinberger, Jessica and Schehlmann, Lisa and Abt, Sebastian and Baier, Harald Doyen, Guillaume and Waldburger, Martin and Čeleda, Pavel and Sperotto, Anna and Stiller, Burkhard (eds.) (2013):
Anomaly Detection and Mitigation at Internet Scale: A Survey.
In: Emerging Management Mechanisms for the Future Internet, Springer Berlin Heidelberg, pp. 49-60, DOI: 10.1007/978-3-642-38998-6_7,
[Book Section]

Steinberger, Jessica and Baier, Harald Horster, Patrick (ed.) (2013):
CADEMI - Cooperative Anomaly Detection and Mitigation.
In: D-A-CH Security 2013, pp. 313-323, [Book Section]

Weiden, Patrick and Hülsing, Andreas and Cabarcas, Daniel and Buchmann, Johannes (2013):
Instantiating Treeless Signature Schemes.
[Other]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science, In: Advances in Cryptology - ASIACRYPT 2013, Springer, pp. 154-173, [Conference or Workshop Item]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science, In: Applied Cryptography and Network Security, Springer, pp. 136-153, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference or Workshop Item]

Fischlin, Marc and Onete, Cristina (2013):
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: LNCS, In: ACNS, Springer, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: LNCS, In: ESORICS 2013, Springer, [Conference or Workshop Item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Buchegger, Sonja and Crowcroft, Jon and Krishnamurthy, Balachander and Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
3, In: Dagstuhl Reports, (2), pp. 22 -- 44, DOI: 10.4230/DagRep.3.2.22,
[Article]

Schulz, Stephan and Strufe, Thorsten (2013):
d^2 Deleting Diaspora: Practical Attacks for Profile Discovery and Deletion.
In: IEEE International Conference on Communications (ICC), [Conference or Workshop Item]

Reinhardt, Andreas and Christin, Delphine and Steinmetz, Ralf (2013):
Pre-Allocating Code Mappings for Energy-Efficient Data Encoding in Wireless Sensor Networks.
In: Proceedings of the 9th IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerCom Workshops), pp. 594–599, [Conference or Workshop Item]

Christin, Delphine and Hollick, Matthias Gutwirth, Serge and Leenes, Ronald and Hert, Paul De and Poullet, Yves (eds.) (2013):
European Data Protection: Coming of Age.
Springer Netherlands, pp. 203–222, [Book Section]

Reinhardt, Andreas and Christin, Delphine and Kanhere, Salil (2013):
Predicting the Power Consumption of Electric Appliances through Time Series Pattern Matching.
In: accepted for publication in Proceedings of 5th ACM Workshop on Embedded Systems for Energy-Efficient Buildings (BuildSys posters), [Conference or Workshop Item]

Reinhard, Alexander and Christin, Delphine and Li, Kai and Kanhere, Salil and Zhang, Jin (2013):
Smarter Building for the Smart Grid? Let them Forecast Their Power Consumption.
In: Accepted for publication in Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN demo), [Conference or Workshop Item]

Reinhardt, Andreas and Englert, F. and Christin, Delphine (2013):
Enhancing User Privacy by Prepocessing Distributed Smart Meter Data.
In: Accepted for publication in Proceedings of the 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), [Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Hollick, Matthias (2013):
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
In: Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Effelsberg, Wolfgang and Steinmetz, Ralf and Strufe, Thorsten (eds.) (2013):
Benchmarking Peer-to-Peer Systems - Understanding Quality of Service in Large-Scale Distributed Systems.
In: LNCS State of the Art Surveys, Springer, ISBN 978-3-642-38673-2,
[Book]

Roos, Stefanie and Strufe, Thorsten (2013):
A Contribution to Analyzing and Enhancing Darknet Routing.
In: Proceedings of International Conference on Computer Communications (INFOCOM), [Conference or Workshop Item]

Hauke, Sascha and Biedermann, Sebastian and Heider, Dominik and Mühlhäuser, Max (2013):
On the Application of Supervised Machine Learning to Trustworthiness Assessment.
(TR-014), DOI: 10.1109/TrustCom.2013.5,
[Report]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Werthmann, Tim and Hund, Ralf and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

Ghiglieri, Marco and Kalabis, Lukas and Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Katzenbeisser, Stefan and Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885, [Article]

Peter, Andreas and Hartmann, T. and Müller, S. and Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), IEEE, pp. 79-84, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Hollick, Matthias and Trumpold, K. (2012):
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
In: Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), pp. 14:1–14:10, [Conference or Workshop Item]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master Thesis]

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference or Workshop Item]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
35, In: Praxis der Informationsverarbeitung und Kommunikation, (4), pp. 305-308, [Article]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Stopczynski, Martin and Ghiglieri, Marco (2012):
Smart Home Dashboard – Das intelligente Energiemanagement.
In: VDE KONGRESS 2012 Smart Grid, VDE Verlag GmbH, ISBN 978-3-8007-3446-7,
[Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), ACM Press, pp. 772-783, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Schröder, Dominik and Schröder, Heike (2012):
Verifiable Data Streaming.
[Conference or Workshop Item]

Lauinger, Tobias and Laoutaris, Nikolaos and Rodriguez, Pablo and Strufe, Thorsten and Biersack, Ernst and Kirda, Engin (2012):
Privacy Risks in Named Data Networking: What is the Cost of Performance?
DOI: 2378956.2378966,
[Other]

Reinhardt, Andreas and Baumann, Peter and Burgstahler, D. and Hollick, Matthias and Chonov, H. and Werner, Marc and Steinmetz, R. (2012):
On the Accuracy of Appliance Identification Based on Distributed Load Metering Data.
In: Proceedings of the 2nd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), [Conference or Workshop Item]

Garcia-Saavedra, Andres and Serrano, Pablo and Banchs, Albert and Hollick, Matthias (2012):
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
8, In: Pervasive and Mobile Computing, (5), pp. 631-645, [Article]

do Carmo, R. and Werner, M. and Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), [Conference or Workshop Item]

Christin, Delphine and Büttner, C. and Repp, Nicolas (2012):
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
In: Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), pp. 977-985, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kocabaş, Ünal and Rožic, Vladimir and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS), 7428, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, pp. 283-301, [Conference or Workshop Item]

Knauer, Julian and Baier, Harald (2012):
Zur Sicherheit von ATA-Festplattenpasswörtern.
In: DACH Security 2012, [Conference or Workshop Item]

Yuan, Dingwen and Hollick, Matthias (2012):
Optimization and Scheduling of Wireless Sensor Networks for Periodic Control Systems.
In: 11. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze" (FGSN), [Conference or Workshop Item]

Roos, Björn and Baier, Harald (2012):
IT-Forensik im Wandel - Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Smartphones mit dem Windows Phone Betriebssystem.
In: DACH Security 2012, ISBN 978-3-00-039221-4,
[Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Véron, Pascal and Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
LNCS, In: WAIFI 2012, (7369), pp. 45 - 63, [Article]

Winter, Christian and Schneider, Markus and Yannikos, York (2012):
Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis.
E4775, In: Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic, IEEE Computer Society, Prague, Czech Republic, pp. 255–261, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.37,
[Conference or Workshop Item]

Stelle, Stanislaus and Manulis, Mark and Hollick, Matthias (2012):
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
In: In Proceedings of Seventh International Conference on Availability, Reliability and Security (ARES 2012), IEEE Computer Society, Prague, Czech Republic, pp. 28-37, [Conference or Workshop Item]

Halvani, Oren (2012):
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Darmstadt, Technische Universität, [Bachelor Thesis]

Lauinger, Tobias and Laoutaris, Nikolaos and Rodriguez, Pablo and Strufe, Thorsten and Biersack, Ernst and Kirda, Engin (2012):
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.
(0812-001), [Report]

Zmudzinski, Sascha and Steinebach, Martin and Butt, Moazzam (2012):
Watermark Embedding Using Audio Fingerprinting.
Lecture Notes in Computer, In: Transactions on Data Hiding and Multimedia Security VIII, (7882), Springer, pp. 63ff., [Article]

Wilhelmi, Klaus (2012):
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
TU Darmstadt, [Master Thesis]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Frey, Hannes and Hollick, Matthias and Loch, Adrian (2012):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1--9, DOI: 10.1109/WoWMoM.2012.6263689,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, [Conference or Workshop Item]

Garcia-Saavedra, Andres and Serrano, Pablo and Banchs, Albert and Hollick, Matthias (2012):
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In: In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Lucca, Italy, [Conference or Workshop Item]

Baier, Harald and Brand, Achim (2012):
On the Investigation of Application Specific Data within Digital Forensics.
In: Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), pp. 38-54, ISBN 978-1-84102-316-8,
[Conference or Workshop Item]

Christin, Delphine and Bentolila, A. and Hollick, Matthias (2012):
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
In: Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), [Conference or Workshop Item]

Zmudzinski, Sascha and Taneja, Ankt and Steinebach, Martin (2012):
Carving and Reorganizing Fragmented MP3 Files Using Syntactic and Spectral Information.
In: AES 46th Conference on Audio Forensics 2012, 14-16 June 2012, Denver, CO, USA, Audio Engineering Society, [Conference or Workshop Item]

Seyfarth, Ulrich and Ranade, Kedar (2012):
Cyclic mutually unbiased bases, Fibonacci polynomials and Wiedemann's conjecture.
53, In: J. Math. Phys., (6), p. 62201, DOI: 10.1063/1.4723825,
[Article]

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, pp. 219-238, [Conference or Workshop Item]

Seudié, Hervé and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza (2012):
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
In: ACM/IEEE Design Automation Conference (DAC), [Conference or Workshop Item]

Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference or Workshop Item]

Pflug, Anika and Hartung, Daniel and Busch, Christoph (2012):
Feature Extraction from Vein Images using Spatial Information and Chain Codes.
In: ISTR, (17), pp. 26-35, DOI: 10.1016/j.istr.2012.02.003,
[Article]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Colors for Privacy Settings.
In: Proceedings of the World Wide Web Conference (WWW), pp. 585-586, [Conference or Workshop Item]

Jiang, Xuxian and Grace, Michael and Sadeghi, Ahmad-Reza and Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec, ACM, [Conference or Workshop Item]

Wachsmann, Christian and Sadeghi, Ahmad-Reza and Schulz, Steffen (2012):
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications, Springer, pp. 429-449, [Book Section]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Schulz, Steffen and Sadeghi, Ahmad-Reza and Zhdanova, Maria and Xu, Wenyuan and Mustafa, Hossen and Varadharajan, Vijay (2012):
Tetherway: A Framework for Tethering Camouflage.
In: Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM Press, Tuscon, Arizona, ISBN 978-1-4503-1265-3,
[Conference or Workshop Item]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias and Martucci, Leonardo and Kanhere, Salil (2012):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 135-143, [Conference or Workshop Item]

Das, Amitabh and Kocabaş, Ünal and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE), [Conference or Workshop Item]

Czajkowski, Katja and Schneider, Markus and Wolf, Ruben and Yannikos, York (2012):
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
(SIT-TR-2012-002), [Report]

Wolf, Patrick and Steinebach, Martin (2012):
FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertschöpfungskette.
In: GI Sicherheit 2012, pp. 175-185, [Conference or Workshop Item]

Bessani, Alysson and Abbadi, Imad M. and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marcelo and Schirmer, Norbert (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing, [Book]

Olsen, Martin Aastrup and Xu, Haiyun and Busch, Christoph (2012):
Gabor Filters as Candidate Quality Measure for NFIQ 2.0.
In: The 5th IAPR International Conference on Biometrics, [Article]

Hartung, Daniel and Olsen, Martin Aastrup and Xu, Haiyun and Nguyen, Hai Thanh and Busch, Christoph (2012):
Comprehensive analysis of spectral minutiae for vein pattern recognition.
1, In: IET Biometrics, (1), pp. 25-36, DOI: 10.1049/iet-bmt.2011.0013,
[Article]

Hartung, Daniel and Pflug, Anika and Busch, Christoph (2012):
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: LNI, In: Sicherheit 2012 - Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik e.V., [Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
2012, In: Datenschutz und Datensicherheit (DuD), (3), pp. 175-179, DOI: 10.1007/s11623-012-0060-3,
[Article]

Henriques, Joselito and von Lukas, Uwe and Mesing, Benjamin (2012):
Schutz geistigen Eigentums mit Enterprise Rights Management.
2, In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, Göller, Baden-Baden, pp. 84-86, ISSN 1866-5004, [Article]

Van Herrewege, Anthony and Katzenbeisser, Stefan and Maes, Roel and Peeters, Roel and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, Springer, pp. 374-389, [Conference or Workshop Item]

Hülsing, Andreas and Petzoldt, Albrecht and Schneider, Michael and Alaoui, Sidi Mohamed El Yousfi Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012, Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Seyfarth, Ulrich and Nikolopoulos, Georgios and Alber, Gernot (2012):
Symmetries and security of a quantum-public-key encryption based on single-qubit rotations.
85, In: Phys. Rev. A, p. 22342, DOI: 10.1103/PhysRevA.85.022342,
[Article]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Schulz, Steffen and Brasser, Ferdinand and Filyanov, Atanas (2012):
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: LNCS, In: Financial Cryptography and Data Security (FC), Springer, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Ries, Sebastian and Hauke, Sascha and Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Trust Assessment for Cloud Marketplaces (Full version).
(31 pages), [Report]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Poller, Andreas and Steinebach, Martin and Liu, Huajian (2012):
Robust image obfuscation for privacy protection in Web 2.0 applications.
In: Proceedings of SPIE, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, [Conference or Workshop Item]

Liu, Huajian and Steinebach, Martin (2012):
Improved Fourier domain template and patchwork embedding using spatial masking.
In: Proceedings of SPIE, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, [Conference or Workshop Item]

Schäfer, Marcel and Berchtold, Waldemar and Steinebach, Martin (2012):
Ranking search for probabilistic fingerprinting codes.
In: Proceedings of SPIE, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, [Conference or Workshop Item]

Steinebach, Martin and Zmudzinski, Sascha (2012):
Forensic audio watermark detection.
In: Proceedings of SPIE, 8303, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, [Conference or Workshop Item]

Zmudzinski, Sascha and Munir, Badar and Steinebach, Martin (2012):
Digital audio authentication by robust feature embedding.
In: Proceedings of SPIE, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, [Conference or Workshop Item]

Steinebach, Martin and Liu, Huajian (2012):
Asymmetric robust quantum image hashing.
In: Proceedings of SPIE, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, [Conference or Workshop Item]

Riecker, Michael and Thome, R. and Yuan, D. and Hollick, Matthias (2012):
A Secure Monitoring and Control System for Wireless Sensor Networks.
In: Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Buchmann, Johannes (ed.) (2012):
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis.
Springer Verlag, ISBN 978-3-642-31942-6,
[Book]

Steinebach, Martin and Liu, Huajian and Yannikos, York (2012):
ForBild: Efficient Robust Image Hashing.
In: Proceeding of Electronic Imaging - Media Watermarking, Security, and Forensics 2012, January 2012, [Conference or Workshop Item]

Yannikos, York and Winter, Christian and Schneider, Markus (2012):
Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework.
E4775, In: Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic, IEEE Computer Society, Prague, Czech Republic, pp. 613–619, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.46,
[Conference or Workshop Item]

Baier, Harald and Dichtelmüller, Christian (2012):
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
In: DACH Security 2012, [Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin Schartner, Peter and Taeger, Jürgen (eds.) (2012):
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, Prof. Dr. Patrick Horster, pp. 174-185, [Book Section]

Meziani, Mohammed and Hoffmann, Gerhard and Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: LNCS, In: AfricaCrypt 2012, Springer, Al Akhawayn University, Ifran, Morocco, [Conference or Workshop Item]

Bender, Jens and Dagdelen, Özgür and Fischlin, Marc and Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science, In: Financial Cryptography, Springer-Verlag, pp. 344-358, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander and Schaaf, Joachim and Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September, [Conference or Workshop Item]

Busch, C. and Brauckmann, M. and Veldhuis, R. and Deravi, F. and Kevenaar, T. and Nouak, A. and Seibert, H. and Weber, F. and Suchier, J.-M. (2012):
Towards a more Secure Border Control with 3D Face Recognition.
In: the 5th Norsk Informasjons Sikkerhets Konferanse (NISK), pp. 49-60, ISBN 978-82-321-0012-5,
[Conference or Workshop Item]

Yang, Bian and Rajbhandari, Lisa and Busch, Christoph and Zhou, Xuebing (2012):
Privacy Implications of Identity References in Biometrics Databases.
In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Piraeus-Athens, Greece, [Conference or Workshop Item]

Zhou, Xuebing and Kuijper, Arjan and Busch, Christoph (2012):
Retrieving Secrets from Iris Fuzzy Commitment.
In: 5th IAPR International Conference on Biometrics (ICB 2012), New Delhi, India, [Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Zmudzinski, Sascha and Steinebach, Martin (2012):
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
[Standards, patents]

Peter, Andreas and Kronberg, M. and Trei, W. and Katzenbeisser, Stefan (2012):
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
In: International Conference on Information Security (ISC 2012), Springer, pp. 242-257, [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), Springer, pp. 3-15, [Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, pp. 234-251, [Conference or Workshop Item]

Mittelbach, Arno (2012):
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science, In: Security and Cryptography for Networks, Springer, pp. 522-539, [Conference or Workshop Item]

Vigil, Martín Gagliotti and Cabarcas, Daniel and Wiesmaier, Alexander and Buchmann, Johannes (2012):
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive, [Article]

Weber, Stefan (2012):
Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing.
In: Cryptology and Information Security Series, IOS Press, ISBN 978-1-61499-156-4,
DOI: 10.3233/978-1-61499-157-1-i,
[Book]

Hintz, Nadina and Benenson, Zinaida and Strufe, Thorsten (2012):
Friendship in German Online Social Networks.
In: SOUPS, [Conference or Workshop Item]

Roos, Stefanie and Strufe, Thorsten (2012):
Provable Polylog Routing for Darknets.
In: 4th IEEE ICDCS International Workshop on Hot Topics in Peer-to-Peer Computing and Online Social Networking (HotPost), [Conference or Workshop Item]

Paul, Thomas and Greschbach, Benjamin and Buchegger, Sonja and Strufe, Thorsten (2012):
Exploring Decentralization Dimensions of Social Network Services: Adversaries and Availability.
In: First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, [Conference or Workshop Item]

Suri, Neeraj and Waidner, Michael (eds.) (2012):
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt.
In: LNI, 195, GI, [Conference or Workshop Item]

Yuan, Dingwen and Hollick, Matthias (2012):
Tree-based Multi-Channel Convergecast in Wireless Sensor Networks.
In: Proceedings of the 2012 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1-9, ISBN 978-1-4673-1237-0,
DOI: 10.1109/WoWMoM.2012.6263713,
[Conference or Workshop Item]

Riecker, Michael and Barroso, Ana and Hollick, Matthias (2012):
It's the Data that Matters! On the Detection of False Data in Wireless Sensor Networks.
In: 6. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", [Conference or Workshop Item]

Yuan, Dingwen and Riecker, Michael and Hollick, Matthias (2012):
HOPSCOTCH: An Adaptive and Distributed Channel Hopping Technique for Interference Avoidance in Wireless Sensor Networks.
In: Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Riecker, Michael and Barroso, Ana and Hollick, Matthias and Biedermann, Sebastian (2012):
On Data-centric Intrusion Detection in Wireless Sensor Networks.
In: Proceedings of the IEEE Conference on Cyber, Physical and Social Computing (CPSCom), [Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel (2012):
Rebound on Symmetric Tardos Codes.
In: Proceeding of The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012), [Conference or Workshop Item]

Kalabis, Lukas and Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
36, In: Datenschutz und Datensicherheit, (9), pp. 670--675, DOI: 10.1007/s11623-012-0224-1,
[Article]

Alomari, Esraa and Manickam, Selvakumar and Gupta, B. and Karuppayah, Shankar and Alfaris, Rafeef (2012):
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
49, In: International Journal of Computer Applications, (7), pp. 24-32, [Article]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2012):
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
(TUD-CS-2012-0106), [Report]

Bodden, Eric and Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Conference or Workshop Item]

Henning, Maria and Demirel, Denise and Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), Salzburg, Austria, pp. 213-220, [Conference or Workshop Item]

Luna, Jesus and Langenberg, Robert and Suri, Neeraj (2012):
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees.
In: Proc. of the ACM Cloud Computing Security Workshop, [Conference or Workshop Item]

Luna, Jesus and Suri, Neeraj and Krontiris, Ioannis (2012):
Privacy-by-Design Based on Quantitative Threat Modeling.
In: Proc. of 7th Intl Conference on Risks and Security of Internet and Systems (CRISIS), [Conference or Workshop Item]

Luna, Jesus and Ghani, Hamza and Vateva-Gurova, Tsvetoslava and Suri, Neeraj (2012):
Quantitative Assessment of Cloud Security Level Agreements: A Case Study.
In: Proc. of International Conference on Security and Cryptography (SECRYPT), [Conference or Workshop Item]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Boneh, Dan and Dagdelen, Özgür and Fischlin, Marc and Lehmann, Anja and Schaffner, Christian and Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security, [Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil and Hollick, Matthias (2011):
A Survey on Privacy in Mobile Participatory Sensing Applications.
84, In: The Journal of Systems & Software, (11), pp. 1928-1946, DOI: 10.1016/j.jss.2011.06.073,
[Article]

Wall, Josh and Ward, John and Castro, Luis and Favela, Jesus and Berkovsky, Shlomo and Lueg, Christopher and Pereira, Francisco and Correia, Pedro and Ferreira, Michel and Gomes, Pedro and Bolchini, Davide and Weber, Stefan and Park, Eunjeong and Nam, Hyo Suk (2011):
Large-Scale Opportunistic Sensing.
10, In: IEEE Pervasive Computing, (4), pp. 54-58, DOI: 0.1109/MPRV.2011.74,
[Article]

Buchmann, Johannes and Dahmen, Erik and Hülsing, Andreas Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS, In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, Springer Berlin / Heidelberg, pp. 117-129, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Christin, Delphine and Guillemet, J. and Reinhardt, Andreas and Hollick, Matthias and Kanhere, Salil (2011):
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
In: Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), pp. 341--350, [Conference or Workshop Item]

Kocabaş, Ünal and Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, pp. 797-800, [Conference or Workshop Item]

Frey, Hannes and Hollick, Matthias and Loch, Adrian (2011):
Curve-based Planar Graph Routing in Multihop Wireless Networks.
In: 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), pp. 149-151, DOI: 10.1109/MASS.2011.127,
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), ACM Press, [Conference or Workshop Item]

Hartung, Daniel and Olsen, Martin Aastrup and Xu, Haiyun and Busch, Christoph (2011):
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011), [Article]

Seyfarth, Ulrich and Ranade, Kedar (2011):
Construction of mutually unbiased bases with cyclic symmetry for qubit systems.
84, In: Phys. Rev. A, p. 42327, DOI: 10.1103/PhysRevA.84.042327,
[Article]

Nazar, Assem and Seeger, Mark and Baier, Harald (2011):
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
In: Lecture Notes in Computer Science, In: 16th Nordic Conference in Secure IT Systems (NordSec 2011), Springer-Verlag, Tallinn, Estonia, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Schulz, Steffen Sadeghi, Ahmad-Reza and Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC), ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Schweizer, Immanuel and Fleischhacker, Nils and Mühlhäuser, Max and Strufe, Thorsten (2011):
SDF - Solar-Aware Distributed Flow in Wireless Sensor Networks.
In: IEEE Local Computer Networks, IEEE, pp. 382 - 390, DOI: 10.1109/LCN.2011.6115320,
[Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander and Hühnlein, Detlef Schartner, Peter and Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, syssec Verlag, Oldenburg, pp. 32-43, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Klieme, Eric and Strick, Linda and Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Baier, Harald and Brand, Achim and Dichtelmüller, Christian and Roos, Björn (2011):
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
In: DACH Security 2011, pp. 399-410, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Steinebach, Martin (2011):
Robuste Hashverfahren zur forensischen Bilderkennung.
5, In: pvt - Polizei, Verkehr + Technik, pp. 232-234, [Article]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Hoffmann, Gerhard and Meziani, Mohammed and Niebuhr, Robert Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Recent Progress in Code-Based Cryptography.
In: LNCS, In: The 5th International Conference on Information Security and Assurance - ISA-2011, Springer, Brno University, Czech Republic, pp. 21-32, [Conference or Workshop Item]

Bradler, Dirk and Krumov, Lachezar and Kangasharju, Jussi and Mühlhäuser, Max Aguilera, M. and Yu, H. and Vaidya, N. and Srinivasan, V. and Choudhury, R. (eds.) (2011):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
6522, pp. 77-82, ISBN 978-3-642-17679-1_7,
DOI: 10.1007,
[Conference or Workshop Item]

Filyanov, Atanas and McCune, Jonathan and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), Hong Kong, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian (2011):
Location Privacy in RFID Systemen.
11, In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, (2), pp. 70-75, [Article]

Martucci, Leonardo and Fischer-Hübner, Simone Poblet, Marta (ed.) (2011):
Privacy for Reporters of Human Rights Abuses [to appear].
In: Law, Governance and Technology Series, In: Mobile Technologies for Conflict Management. New Avenues for Online Dispute Resolution, Springer, [Book Section]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Günther, Felix and Hoffmann, Gerhard and Rothe, Holger (2011):
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011, [Article]

Meziani, M. and Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis (2011):
Hash Functions Based on Coding Theory.
In: 2nd Workshop on Codes, Cryptography and Communication Systems (WCCCS 2011), pp. 32-37, [Conference or Workshop Item]

Christin, Delphine and Freudenreich, Tobias and Hollick, Matthias (2011):
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
In: Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), [Conference or Workshop Item]

Bodden, Eric (2011):
Defining Access Control Policies as Tracematches.
(TUD-CS-2011-0149), [Report]

Ries, Sebastian and Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
Lecture Notes in Computer, In: In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011), Springer Berlin Heidelberg, Pittsburgh, USA, pp. 254-261, ISBN 978-3-642-21599-5,
DOI: 10.1007/978-3-642-21599-5_19,
[Conference or Workshop Item]

Martucci, Leonardo and Ries, Sebastian and Mühlhäuser, Max (2011):
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services.
19, In: Journal of Information Processing, pp. 317-331, [Article]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2011):
Lightweight Remote Attestation Using Physical Functions.
In: ACM Conference on Wireless Network Security (WiSec), ACM Press, pp. 109-114, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2011):
Lightweight Remote Attestation using Physical Functions (Extended Version).
(TR-2011-06-01, Technical ), [Report]

Demmler, Daniel (2011):
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt, [Bachelor Thesis]

Armknecht, Frederik and Maes, Roel and Sadeghi, Ahmad-Reza and Standaert, François-Xavier and Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), IEEE Computer Society, pp. 397-412, [Conference or Workshop Item]

Seeger, Mark and Bours, Patrick (2011):
How to Comprehensively Describe a Biometric Update Mechanisms for Keystroke Dynamics.
In: Second International Workshop on Security and Communication Networks (IWSCN 2011), [Conference or Workshop Item]

Demirel, Denise and Frankland, Richard and Popovic, Darko and Volkamer, Melanie Parycek, Peter and Kripp, Melanie J and Noella, Edelmann (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, Edition Donau-Universität Krems, pp. 287-300, [Conference or Workshop Item]

Seeger, Mark (2011):
Using Control-Flow Techniques in a Security Context - A Survey on Common Prototypes and their Common Weakness.
In: International Conference on Network Computing and Information Security (NCIS 2011), [Conference or Workshop Item]

Mönkehues, Stephan (2011):
SWIFFT-Modifikationen, Korrektur von Operm5.
Darmstadt, Technische Universität, [Bachelor Thesis]

Fischer-Hübner, Simone and Grimm, Rüdiger and Lo Iacono, Luigi and Möller, Sebastian and Müller, Günter and Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14, [Article]

Olsen, Martin Aastrup and Hartung, Daniel and Busch, Christoph and Larsen, Rasmus (2011):
Convolution Approach for Feature Detection in Topological Skeletons Obtained from Vascular Patterns.
In: IEEE Symposium Series on Computational Intelligence 2011, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Ries, Sebastian and Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
(27 pages), [Report]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Busch, Christoph and Korte, Ulrike and Abt, Sebastian and Böhm, Christian and Färber, Ines and Fries, Sergej and Merkle, Johannes and Nickel, Claudia and Nouak, Alexander and Opel, Alexander and Oswald, Annahita and Seidl, Thomas and Wackersreuther, Bianca and Wackersreuther, Peter and Zhou, Xuebing (2011):
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD), [Article]

Nickel, Claudia and Busch, Christoph and Rangarajan, Sathyanarayanan and Möbius, Manuel (2011):
Using Hidden Markov Models for Accelerometer-Based Biometric Gait Recognition.
[Conference or Workshop Item]

Schryen, Guido and Volkamer, Melanie and Habib, Sheikh Mahbub and Ries, Sebastian (2011):
A Formal Approach Towards Measuring Trust in Distributed Systems.
In: Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, Taichung, Taiwan, pp. 1739-1745, ISBN 978-1-4503-0113-8,
DOI: 10.1145/1982185.1982548,
[Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), [Conference or Workshop Item]

Popovic, Darko (2011):
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
Darmstadt, Technische Universität, [Bachelor Thesis]

Li, Shujun and Sadeghi, Ahmad-Reza and Heisrath, Soeren and Schmitz, Roland and Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC), St. Lucia, [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2011):
A Novel Network Platform for Secure and Efficient Malware Collection based on Reconfigurable Hardware Logic.
In: World Congress on Internet Security (WorldCIS 2011), [Conference or Workshop Item]

Lux, Alexander and Starostin, Artem (2011):
A Tool for Static Detection of Timing Channels in Java.
In: 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, [Conference or Workshop Item]

Weber, Stefan and Kalev, Yulian and Ries, Sebastian and Mühlhäuser, Max (2011):
MundoMessage: Enabling Trustworthy Ubiquitous Emergency Communication.
In: ACM International Conference on Ubiquitous Information Management and Communication 2011 (ACM ICUIMC 2011), ACM, Seoul, Korea, pp. 29:1-29:10, ISBN 978-1-4503-0571-6,
[Conference or Workshop Item]

Seeger, Mark (2011):
Internetkonnektivität als Indikator für wirtschaftliche Stärke – Das Internet in Vergangenheit und Gegenwart.
In: Wirtschaftsinformatik und Management, pp. 46-50, [Article]

Steinebach, Martin and Zauner, Christoph and Eckehard, Hermann (2011):
Rihamark: Perceptual Image Hash Benchmarking.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference or Workshop Item]

Trick, Daniel and Thiemert, Stefan (2011):
A new metric for measuring the visual quality of video watermarks.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference or Workshop Item]

Berchtold, Waldemar and Zmudzinski, Sascha and Schäfer, Marcel and Steinebach, Martin (2011):
Collusion-secure patchwork embedding for transaction watermarking.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference or Workshop Item]

Kneževic, M. and Kobayashi, K. and Ikegami, J. and Matsuo, S. and Satoh, A. and Kocabas, U. and Fan, J. and Katashita, T. and Sugawara, T. and Sakiyama, K. and Verbauwhede, I. and Ohta, K. and Homma, N. and Aoki, T. (2011):
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal, [Article]

Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2011):
Re-synchronizing audio watermarking after nonlinear time stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF&#039;2011: Proceedings of the 4th International Conference on Health Informatics, Rome, Italy, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance, Brno University, Czech Republic, [Conference or Workshop Item]

Horsch, Moritz (2011):
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Darmstadt, Technische Universität, [Bachelor Thesis]

Günther, Felix and Manulis, Mark and Strufe, Thorsten (2011):
Cryptographic Treatment of Private User Profiles.
In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, [Conference or Workshop Item]

Riecker, Michael and Müller, W. and Hollick, Matthias and Saller, K. (2011):
A Secure Monitoring and Control System for Wireless Sensor Networks.
In: Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11), [Conference or Workshop Item]

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
1, In: Journal of Cryptographic Engineering, (3), pp. 177-186, [Article]

Pfitzmann, Birgit and Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
[Standards, patents]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Lindner, Richard and Peikert, Chris (2011):
Better Key Sizes (and Attacks) for LWE-Based Encryption.
In: CT-RSA 2011, [Conference or Workshop Item]

Schneider, Michael (2011):
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
In: LNCS, 6552, In: WALCOM 2011, Springer, pp. 89-97, [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Buchmann, Johannes (2011):
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
In: The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011), [Conference or Workshop Item]

Horsch, Moritz and Stopczynski, Martin (2011):
The German eCard-Strategy.
[Report]

Mühlbach, Sascha and Koch, Andreas (2011):
NetStage/DPR: A Self-Adaptable FPGA Platform for Application-Level Network Security.
In: 7th International Symposium on Applied Reconfigurable Computing (ARC 2011), [Conference or Workshop Item]

Milde, Benjamin and Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011, [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2011):
A Scalable Multi-FPGA Platform for Complex Networking Applications.
In: 19th Annual IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM 2011), [Conference or Workshop Item]

Winter, Stefan and Sarbu, Constantin and Murphy, Brendan and Suri, Neeraj (2011):
The Impact of Fault Models on Software Robustness Evaluations.
In: Proceedings of the 33rd International Conference on Software Engineering (ICSE), [Conference or Workshop Item]

Baier, Harald and Breitinger, Frank (2011):
Security Aspects of Piecewise Hashing in Computer Forensics.
In: 6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011), [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Schröder, Heike and Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), Springer, pp. 51-70, [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2011):
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
In: International Workshop on Digital Forensics and Watermarking (IWDW 2011), Springer, pp. 387-397, [Conference or Workshop Item]

Franz, M. and Katzenbeisser, Stefan (2011):
Processing Encrypted Floating Point Signals.
In: Workshop on Multimedia and Security (MMSEC'11), ACM Press, pp. 103-108, [Conference or Workshop Item]

Hamacher, Kay and Katzenbeisser, Stefan (2011):
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011), ACM Press, pp. 115-124, [Book Section]

Biedermann, Sebastian and Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), Springer, pp. 43-54, [Conference or Workshop Item]

Müller, S. and Katzenbeisser, Stefan (2011):
Hiding the Policy in Cryptographic Access Control.
In: International Workshop on Security and Trust Management (STM 2011), Springer, pp. 90-105, [Conference or Workshop Item]

Bodden, Eric and Hendren, Laurie (2011):
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer), [Article]

Schrittwieser, Sebastian and Katzenbeisser, Stefan (2011):
Code Obfuscation against Static and Dynamic Reverse Engineering.
In: International Conference on Information Hiding (IH 2011), Springer, pp. 270-284, [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2011):
Security of Copy-Move Forgery Detection Techniques.
In: International Conference on Acoustics, Speech and Signal Processing (ICASSP'11), IEEE Press, pp. 1864-1867, [Conference or Workshop Item]

Franz, M. and Carbunar, B. and Sion, R. and Katzenbeisser, Stefan and Sotakova, M. and Williams, P. and Peter, Andreas (2011):
Oblivious Outsourced Storage with Delegation.
In: Financial Cryptography and Data Security (FC 2011), Springer, pp. 127-140, [Conference or Workshop Item]

Dubuis, Eric and Spycher, Oliver and Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, pp. 126-129, [Conference or Workshop Item]

Nickel, Claudia and Derawi, Mohammad and Bours, Patrick and Busch, Christoph (2011):
Scenario Test for Accelerometer-Based Biometric Gait Recognition.
In: 3rd International Workshop on Security and Communication Networks (IWSCN 2011), [Conference or Workshop Item]

Nickel, Claudia and Busch, Christoph (2011):
Classifying Accelerometer Data via Hidden Markov Models to Authenticate People by the Way they Walk.
In: 45th IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, [Conference or Workshop Item]

Stein, Chris and Nickel, Claudia (2011):
Eignung von Smartphone-Kameras zur Fingerabdruckerkennung und Methoden zur Verbesserung der Qualität der Fingerbilder.
In: BIOSIG 2011, [Conference or Workshop Item]

Wirtl, Tobias and Nickel, Claudia (2011):
Aktivitätserkennung auf Smartphones.
In: BIOSIG 2011, [Conference or Workshop Item]

Nickel, Claudia and Brandt, Holger and Busch, Christoph (2011):
Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices.
In: BIOSIG 2011, [Conference or Workshop Item]

Federrath, Hannes and Hansen, Marit and Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
53, In: it - Information Technology, (1), pp. 5--7, [Article]

Fischer-Hübner, Simone and Hoofnagle, Chris and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061, Dagstuhl Reports, [Conference or Workshop Item]

Fischer-Hübner, Simone and Hoofnagle, Chris Jay and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
1, In: Dagstuhl Reports, (2), pp. 1--15, [Article]

Berjani, Betim and Strufe, Thorsten (2011):
A Recommendation System for Spots in Location-Based Online Social Networks.
In: Proceedings of the Eurosys Workshop on Social Network Systems, [Conference or Workshop Item]

Paul, Thomas and Buchegger, Sonja and Strufe, Thorsten Bianchi, Giuseppe (ed.) (2011):
Handbook on the Trustworthy Internet.
Springer, [Book Section]

Paul, Thomas and Strufe, Thorsten (2011):
Improving the Usability of Privacy Settings in Facebook.
In: Proceedings of HCI/Health, Wealth and Identity Theft, [Conference or Workshop Item]

Armknecht, Frederik and Strufe, Thorsten (2011):
An Efficient Distributed Privacy-preserving Recommendation System.
In: Proceedings of the 10th IEEE/IFIP Med-Hoc-Net, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Strufe, Thorsten (2011):
Key Management in Distributed Online Social Networks.
In: Proceedings of WoWMoM/DSPAN, [Conference or Workshop Item]

Steinebach, Martin (2011):
Robust Hashing for Efficient Forensic Analysis of Image Sets.
In: 3rd International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 26.-28.10.2011, Dublin, Irland, [Conference or Workshop Item]

Schäfer, Marcel and Berchtold, Waldemar (2011):
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes.
In: DRM '11: Proceedings of the 11th annual ACM workshop on Digital rights management, Chicago, IL, USA, October 17-21, 2011, ACM, ISBN 978-1-4503-1005-5,
[Conference or Workshop Item]

Mantel, Heiko and Sands, David and Sudbrock, Henning (2011):
Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp. 218-232, [Conference or Workshop Item]

Christin, Delphine and Hollick, Matthias (2011):
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
In: Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11), [Conference or Workshop Item]

Baum-Waidner, Birgit and Kenyon, Christopher and Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
[Standards, patents]

Camenisch, Jan and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2011):
Reducing access to sensitive information.
[Standards, patents]

Milman, Ivan and Wolfson, Charles and Schunter, Matthias and Hinton, Heather and Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
[Standards, patents]

Karuppayah, Shankar and Samad, Fahad (2011):
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
S-10, In: Lecture Notes in Informatics GI-Edition, (Informatiktage 2011), pp. 279-282, [Article]

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis and Meziani, Mohammed Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science, 200, In: ISA, Springer, pp. 146-155, [Conference or Workshop Item]

Meziani, Mohammed and Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
2SC: An Efficient Code-Based Stream Cipher.
200, In: ISA, Springer, pp. 111-122, [Conference or Workshop Item]

Nickel, Claudia and Brandt, Holger and Busch, Christoph (2011):
Benchmarking the Performance of SVMs and HMMs for Accelerometer-Based Biometric Gait Recognition.
In: Proceedings of the 11th IEEE International Symposium on Signal Processing and Information Technology, [Conference or Workshop Item]

Olembo, Maina and Schmidt, Patrick and Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), IEEE Computer Society, Vienna, Austria, pp. 127 - 134, [Conference or Workshop Item]

Beckerle, Matthias and Martucci, Leonardo and Mühlhäuser, Max and Ries, Sebastian (2011):
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems, IARIA, pp. 234-244, [Book Section]

Ries, Sebastian and Fischlin, Marc and Martucci, Leonardo and Mühlhäuser, Max (2011):
Learning Whom to Trust in a Privacy-Friendly Way.
In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), [Conference or Workshop Item]

Djatmiko, Mentari and Boreli, Roksana and Seneviratne, Aruna and Ries, Sebastian (2011):
Trust-based Content Distribution for Mobile Ad Hoc Networks.
In: 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2011) [to appear], [Conference or Workshop Item]

Römer, Jonathan (2011):
Entwicklung eines Container-Verfahrens für digitale Bildwasserzeichen.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Sadeghi, Ahmad-Reza and Preneel, Bart and Pfitzmann, Andreas and Moran, Tal and Maier-Rabler, Ursula and Kutylowski, Miroslaw and Klonowski, Marek and Guerses, Seda and Danezis, George and Borisov, Nikita and Baer, Walter (2010):
Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society.
[Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Scafuro, Alessandra and Visconti, Ivan and Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, Springer, pp. 39-63, [Conference or Workshop Item]

Lux, Alexander and Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Other]

Sadeghi, Ahmad-Reza and Li, Shujun and Shah, Syed Amier Haider and Khan, Muhammad Asad Usman and Khayam, Syed Ali and Schmitz, Roland (2010):
Breaking e-Banking CAPTCHAs.
In: 26th Annual Computer Security Applications Conference (ACSAC 2010), [Conference or Workshop Item]

Kinder, J. and Katzenbeisser, S. and Schallhart, C. and Veith, H. (2010):
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing, [Article]

Fischlin, Marc and Lehmann, Anja and Ristenpart, Thomas and Shrimpton, Thomas and Stam, Martijn and Tessaro, Stefano (2010):
Random Oracles With(out) Programmability.
In: Lecture Notes in Computer Science, In: Asiacrypt 2010, Springer, [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2010):
An FPGA-based Scalable Platform for High-Speed Malware Collection in Large IP Networks.
In: 2010 International Conference on Field Programmable Technology (FPT 2010), [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2010):
A Dynamically Reconfigured Network Platform for High-Speed Malware Collection.
In: 2010 International Conference on ReConFigurable Computing and FPGAs (ReConFig 2010), [Conference or Workshop Item]

Weber, Stefan and Mühlhäuser, Max Caballé, Santi and Xhafa, Fatos and Abraham, Ajith (eds.) (2010):
Multilaterally Secure Ubiquitous Auditing.
In: Studies in Computational Intelligence, In: Intelligent Networking, Collaborative Systems and Applications, Springer, pp. 207-233, [Book Section]

Gay, Richard and Mantel, Heiko and Sprick, Barbara (2010):
Service Automata for Secure Distributed Systems.
[Other]

Weber, Stefan (2010):
A Hybrid Encryption Technique Supporting Expressive Policies.
In: Tagungsband des 13. Kryptotags. Workshop der Fachgruppe "Angewandte Kryptographie" der "Gesellschaft für Informatik e.V."., Security Engineering Group (TU Darmstadt), p. 5, [Conference or Workshop Item]

Müller, Jürgen and Massoth, Michael (2010):
Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony.
3, In: International Journal on Advances in Telecommunications, (3&4), pp. 193--202, [Article]

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, [Conference or Workshop Item]

Krumov, Lachezar and Schweizer, Immanuel and Bradler, Dirk and Strufe, Thorsten (2010):
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: IEEE Globecom, pp. 1 - 5, DOI: 10.1109/GLOCOM.2010.5683139,
[Conference or Workshop Item]

Krumov, Lachezar and Schweizer, Immanuel and Bradler, Dirk and Strufe, Thorsten (2010):
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom, pp. to appear, [Article]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Naccache, David (2010):
Towards Hardware-Intrinsic Security.
In: Information Security and Cryptography, [Conference or Workshop Item]

Beckerle, Matthias and Martucci, Leonardo and Ries, Sebastian (2010):
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
In: ComputationWorld 2010, In: In Proceedings of the Second International Conference on Adaptive and Self-adaptive Systems and Applications (ADAPTIVE 2010), Lisbon, Portugal, pp. 104 - 110, ISBN 978-1-61208-109-0,
[Conference or Workshop Item]

Cayrel, Pierre-Louis and Lindner, Richard and Rückert, Markus and Silva, Rosemberg (2010):
Improved Zero-knowledge Identification with Lattices.
In: LNCS, In: The Fourth International Conference on Provable Security (ProvSec 2010), Springer, pp. 1-17, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Mukherjee, Biswanath and Ghosal, Dipak and Liu, Yali (2010):
Video Streaming Forensic - Content Identification with Traffic Snooping.
In: 13th Information Security Conference (ISC 2010), [Conference or Workshop Item]

Chen, Liqun and Dietrich, Kurt and Löhr, Hans and Sadeghi, Ahmad-Reza and Wachsmann, Christian and Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS, 6531, In: Information Security Conference (ISC), Springer, pp. 84-98, [Conference or Workshop Item]

Bugiel, Sven and Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Kohler, Jonathan and Carlos, Marcelo Carlomagno (2010):
Uma ICP baseada em certificados digitais autoassinados.
In: X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 91-104, [Conference or Workshop Item]

Varró, Gergely and Schürr, Andy (2010):
Declarative Model Query Framework.
[Other]

Feller, Thomas and Demirezen, Aziz (2010):
Hardware Trojans: Data Leakage Using General Purpose LEDs.
[Report]

Löhr, Hans and Pöppelmann, Thomas and Rave, Johannes and Steegmanns, Martin and Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Gottron, C. and Larbig, P. and König, A. and Hollick, Matthias and Steinmetz, R. (2010):
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
In: Proceedings of IEEE LCN 2010, Denver, Colorado, USA, [Conference or Workshop Item]

Hollick, Matthias and Strufe, Thorsten and Buchmann, Alejandro (2010):
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2), pp. 56-59, [Article]

Kinder, Johannes and Veith, Helmut Bloem, Roderick and Sharygina, Natasha (eds.) (2010):
Precise Static Analysis of Untrusted Driver Binaries.
In: Proceedings of the 10th International Conference on Formal Methods in Computer-Aided Design (FMCAD 2010), IEEE Computer Society, pp. 43-50, [Conference or Workshop Item]

Baecher, Paul and Fischlin, Marc and Gordon, Lior and Langenberg, Robert and Lützow, Michael and Schröder, Dominique (2010):
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Lecture Notes in Informatics, In: Sicherheit 2010, Gesellschaft fuer Informatik (GI), [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2010):
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science, In: 13th Information Security Conference, Springer, Boca Raton, USA, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference, Boca Raton, Florida, USA, [Conference or Workshop Item]

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS &#039;10, In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, Chicago, Illinois, USA, pp. 559--572, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Lux, Alexander and Mantel, Heiko and Perner, Matthias and Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Report]

Demirel, Denise (2010):
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Darmstadt, Technische Universität, [Bachelor Thesis]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Information Security and Cryptography, In: Towards Hardware-Intrinsic Security: Foundations and Practice, Springer, pp. 281-307, [Book Section]

Steinebach, M. and Wolf, P. and Engelhardt, J. Schartner, Peter and Weippl, Edgar (eds.) (2010):
Datenschutzrechtliche Betrachtung digitaler Wasserzeichen.
In: Proceeding of D-A-CH Security 2010 -- Bestandsaufnahme - Konzepte - Anwendungen - Perspektive, syssec, [Conference or Workshop Item]

Schäfer, Marcel and Berchtold, Waldemar and Zmudzinski, Sascha and Steinebach, Martin (2010):
Zero False Positive 2-secure Fingerprinting Watermarking based on Combining Hamming Distance Conditions and Coin-Flipping.
In: Proceeding of The 12th ACM Workshop on Multimedia and Security 2010 (MMSEC 2010), [Conference or Workshop Item]

Steinebach, Martin and Wolf, Patrick and Kim, Jee-Un and Engelhardt, Jens (2010):
Legal Aspects of Watermarking Search Services.
In: Proceeding of VIRTUAL GOODS 2010 - 8th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, [Conference or Workshop Item]

Steinebach, Martin and Zmudzinski, Sascha and Butt, Moazzam Katzenbeisser, Stefan and Dittmann, Jana and Vielhauer, Claus (eds.) (2010):
Robust hash controlled watermark embedding.
In: TUD Tuprints, In: Workshop on Pattern Recognition for IT Security (Book of abstracts), September 22-24, 2010, Darmstadt, Germany; in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition (DAGM 2010), [Conference or Workshop Item]

Mühlbach, Sascha and Brunner, Martin and Roblee, Christopher and Koch, Andreas (2010):
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot using Reconfigurable Technology.
In: 20th International Conference on Field Programmable Logic and Applications (FPL 2010), [Conference or Workshop Item]

Katzenbeisser, Stefan and Liu, Huajian and Steinebach, Martin Li, Chang-Tsun (ed.) (2010):
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
In: Handbook of Research, Idea Group Reference, pp. 155-175, [Book Section]

Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil and Hollick, Matthias (2010):
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
In: Proceedings of 9th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Würzburg, Germany, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Trusted Computing.
In: Handbook of Financial Cryptography and Security, CRC Press, pp. 221-256, [Conference or Workshop Item]

Roßnagel, Alexander (2010):
Das Bundesverfassungsgericht und die Vorratsdatenspeicherung in Europa.
8, In: DuD, [Article]

Heinson, Dennis and Schmidt, Bernd (2010):
IT-gestützte Compliance-Systeme und Datenschutzrecht.
26, In: Computer und Recht, (8), pp. 540-547, [Article]

Christin, Delphine and Hollick, Matthias and Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
In: Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010), [Conference or Workshop Item]

Ackermann, Tobias and Buxmann, Peter (2010):
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
In: Proceedings of the 16th Americas Conference on Information Systems (AMCIS) 2010, pp. Paper 284, [Conference or Workshop Item]

Eikemeier, Oliver and Fischlin, Marc and Goetzmann, Jens-Fabian and Lehmann, Anja and Schroeder, Peter and Schröder, Dominique and Wagner, Daniel (2010):
History-Free Aggregate Message Authentication Codes.
In: Lecture Notes in Computer Science, In: Security and Cryptography for Networks (SCN) 2010, Springer, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Véron, Pascal and Alaoui, Sidi Mohamed El Yousfi (2010):
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
In: Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010), SAC2010, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Lindner, Richard and Rückert, Markus and Silva, Rosemberg (2010):
A Lattice-Based Threshold Ring Signature Scheme.
In: LNCS, In: The first international conference on cryptology and Information security, LatinCrypt 2010, Springer, pp. 255-272, [Conference or Workshop Item]

Kiefer, Franziskus (2010):
Effiziente Implementierung des PACE - und EAC-Protokolls für mobile Geräte.
Darmstadt, Technische Universität, [Bachelor Thesis]

Halvani, Oren and Steinebach, Martin (2010):
Digitale Wasserzeichen für textuelle Informationen.
5/2010, In: Information Wissenschaft & Praxis, pp. 285-291, [Article]

Berta, Mario and Christandl, Matthias and Colbeck, Roger and Renes, Joseph and Renner, Renato (2010):
The uncertainty principle in the presence of quantum memory.
In: Nature Physics, [Article]

Seeger, Mark (2010):
Three Years Hacker Paragraph - A review.
34, In: Datenschutz und Datensicherheit (DuD), (7), pp. 476-478, DOI: 10.1007/s11623-010-0133-0,
[Article]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), Springer, pp. 493-510, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Cesena, Emanuele and Ramunno, Gianluca and Vernizzi, Davide (2010):
Anonymous Authentication with TLS and DAA.
In: TRUST2010, [Conference or Workshop Item]

Armknecht, Frederik and Chen, Liqun and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), Springer, pp. 158-175, [Conference or Workshop Item]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max and Ries, Sebastian and Schnelle-Walka, Dirk (2010):
Shaping the Future Internet.
Special Issue of IOPTS, In: Ubiquitous Computing and Communication Journal, pp. 1 - 7, [Article]

Popall, Enrico (2010):
Wirtschaftlicher Nutzen des neuen Personalausweises.
Darmstadt, Technische Universität, [Bachelor Thesis]

Roßnagel, Alexander and Jandt, Silke (2010):
Datenschutzkonformes Energieinformationsnetz.
6, In: DuD, pp. 373-378, [Article]

Liu, Y. and Ghosal, D. and Armknecht, F. and Sadeghi, A. and Schulz, S. and Katzenbeisser, S. (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding (IH 2010), Springer, pp. 193-207, [Conference or Workshop Item]

Rückert, Markus Garay, Markus A. and Prisco, Roberto De (eds.) (2010):
Adaptively Secure Identity-based Identification from Lattices without Random Oracles.
In: LNCS, In: SCN 2010, Springer, Amalfi, Italy, pp. 345-362, ISBN 978-3-642-15316-7,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2010):
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
[Report]

Alsouri, Sami and Dagdelen, Özgür and Katzenbeisser, Stefan Acquisti, A. and Sadeghi, Ahmad-Reza (eds.) (2010):
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 63-77, [Conference or Workshop Item]

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science, 6055, In: Africacrypt 2010, Springer, pp. 333-350, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Meziani, Mohammed (2010):
Post-Quantum Cryptography: Code-based Signatures.
Lecture Notes in Computer, In: 4th International Conference on Information Security and Assurance ISA 2010, pp. 82 - 99,, [Conference or Workshop Item]

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, p. 30, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Li, Shujun and Khayam, Syed Ali and Schmitz, Roland (2010):
Breaking a Virtual Password System Based on Randomized Linear Generation Functions.
In: IEEE ICC 2010 - Communication and Information System Security Symposium ('ICC'10 CISS'), [Conference or Workshop Item]

Endres, Christoph and Wurz, Andreas and Hoffmann, Marcus and Behring, Alexander French, Simon and Tomaszewski, Brian and Zobel, Christopher (eds.) (2010):
A Task-based Messaging Approach To Facilitate Staff Work.
In: Proceedings of the 7th International Conference on Information Systems for Crisis Response and Management. International Conference on Information Systems for Crisis Response and Management (ISCRAM-2010), pp. digital publication, [Conference or Workshop Item]

Busch, Heike and Sotakova, M. and Katzenbeisser, Stefan and Sion, R. (2010):
The PUF Promise.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), Springer, pp. 290-297, [Conference or Workshop Item]

Bedner, Mark (2010):
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR), pp. 339-345, [Article]

Rührmair, Ulrich and Katzenbeisser, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2010):
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
In: LNCS, Security and Cryptology, In: Proceeding of 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2010), 31 May - 02 June, 2010, Linz, Austria, Springer, ISBN 978-3-642-13240-7,
[Conference or Workshop Item]

Sami, Arif and Karabulut, Murat (2010):
Analyse von homomorpher Verschlüsselung und MIX Netzen für elektronische Wahlsysteme.
TU Darmstadt, [Master Thesis]

Rückert, Markus and Schneider, Michael and Schröder, Dominique Zhou, Jianying and Yung, Moti (eds.) (2010):
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
In: 6123 of LNCS, In: ACNS 2010, Springer, Beijing, China, pp. 69-86, ISBN 978-3-642-13707-5,
[Conference or Workshop Item]

Buchmann, Johannes and Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17), pp. 21-23, [Article]

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), Springer-Verlag, pp. 462-279, [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Lehmann, Anja and Schröder, Dominique (2010):
Unlinkability of Sanitizable Signatures.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), Springer-Verlag, pp. 444-461, [Conference or Workshop Item]

Fischlin, Marc and Schröder, Dominique (2010):
On the Impossibility of Three-Move Blind Signature Schemes.
In: Lecture Notes in Computer Science, 6110, In: Advances in Cryptology - Eurocrypt, Springer-Verlag, [Conference or Workshop Item]

Schwarzkopf, Klaus and Massoth, Michael (2010):
Konzeption und Implementierung einer standortbezogenen Gruppen-Voicemailbox auf Grundlage der Mobicents Communication Platform.
In: Technologien und Anwendungen - Vorträge der 15. ITG-Fachtagung, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
5, In: Datenschutz und Datensicherheit (DuD), pp. 289-298, [Article]

Gharadaghy, Rojan (2010):
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Darmstadt, Technische Universität, [Bachelor Thesis]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
PUF-Enhanced RFID Security and Privacy.
In: Workshop on Secure Component and System Identification (SECSI), [Conference or Workshop Item]

Brucker, Achim and Petritsch, Helmut and Weber, Stefan (2010):
Attribute-based Encryption with Break-Glass.
In: Lecture Notes in Computer Science, 6033, In: Workshop In Information Security Theory And Practice (WISTP'10), Springer, pp. 237-244, ISBN 978-3-642-12367-2,
[Conference or Workshop Item]

Christin, Delphine and Mogre, Parag S. and Hollick, Matthias (2010):
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
2, In: Future Internet, pp. 96-125, DOI: 10.3390/fi2020096,
[Article]

Serrano, P. and Hollick, Matthias and Banchs, A. (2010):
On the Trade-Off between Throughput Maximization and Energy Consumption Minimization in IEEE 802.11 WLANs.
12, In: Journal of Communications and Networks (JCN), (2), [Article]

Serrano, P. and Garcia-Saavedra, A. and Hollick, Matthias and Banchs, A. (2010):
On the Energy Efficiency of IEEE 802.11 WLANs.
In: Proceedings of European Wireless 2010, Lucca, Italy, [Conference or Workshop Item]

Meziani, Mohammed and Cayrel, Pierre-Louis (2010):
Multi-Signature Scheme based on Coding Theory.
63 March 2010, In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", pp. 186-192, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi (2010):
Dual Construction of Stern-based Signature Schemes.
63 March 2010, In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", pp. 369-374, [Conference or Workshop Item]

Bodden, Eric and Sewe, Andreas and Sinschek, Jan and Mezini, Mira (2010):
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
(TUD-CS-2010-0066), [Report]

Fischlin, Marc and Lehmann, Anja (2010):
Hash Function Combiners in SSL and TLS.
In: Lecture Notes in Computer Science, In: CT-RSA, Springer-Verlag, [Conference or Workshop Item]

Schneider, Markus and Winter, Christian and Yannikos, York (2010):
Untersuchung von Spam-Eigenschaften kostenfreier Email-Dienste.
[Report]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Reinhard, Alexander and Christin, Delphine and Hollick, Matthias and Schmitt, Johannes and Mogre, Parag S. and Steinmetz, Ralf (2010):
Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks.
In: Proceedings of the 7th European Conference on Wireless Sensor Networks (EWSN 2010), Springer-Verlag, pp. 33 - 48, [Conference or Workshop Item]

Müller, Sascha and Katzenbeisser, Stefan (2010):
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Press, [Book Section]

Anderl, Reiner and Henriques, Joselito Rodrigues (2010):
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2), pp. 16-22, [Article]

Miede, André and Ackermann, Tobias and Repp, Nicolas and Abawi, Daniel and Steinmetz, Ralf and Buxmann, Peter Schumann, Matthias and Kolbe, Lutz and Breitner, Michael and Frerichs, Arne (eds.) (2010):
Attacks on the Internet of Services – The Security Impact of Cross-organizational Service-based Collaboration.
In: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI) 2010, Göttingen, Germany, pp. 2151–2162, [Conference or Workshop Item]

Heinson, Dennis and Yannikos, York and Franke, Frederik and Winter, Christian and Schneider, Markus (2010):
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
34, In: Datenschutz und Datensicherheit, (2), pp. 75–79, DOI: 10.1007/s11623-010-0039-x,
[Article]

Yannikos, York and Winter, Christian and Franke, Frederik and Schneider, Markus (2010):
Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge.
34, In: Datenschutz und Datensicherheit, (2), pp. 90–95, DOI: 10.1007/s11623-010-0042-2,
[Article]

Cayrel, Pierre-Louis and Strenzke, Falko (2010):
Side channels attacks in code-based cryptography.
In: First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), pp. 24-28, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja (2010):
Delayed-Key Message Authentication for Streams.
In: Lecture Notes in Computer Science, In: Theory of Cryptography Conference (TCC), Springer-Verlag, [Conference or Workshop Item]

Massoth, Michael and Acker, Robin and Moore, Ronald (2010):
Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen.
In: Querschnitt, [Article]

Baier, Harald and Busch, Christoph Hochschule Darmstadt (3094) (Corporate Creator) (2010):
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung, [Book Section]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, [Conference or Workshop Item]

Richter, Philipp and Langer, Lucie and Hupf, Katharina and Volkamer, Melanie and Buchmann, Johannes Schweighöfer, Erich and Geist, Anton and Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, Salzburg, pp. 61-72, [Conference or Workshop Item]

Backs, Christian (2010):
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Darmstadt, Technische Universität, [Bachelor Thesis]

Jha, Somesh and Katzenbeisser, S. and Schallhart, C. and Veith, H. and Chenney, S. (2010):
Semantic Integrity in Large-Scale Online Simulations.
10, In: ACM Transactions on Internet Technology, (1), [Article]

Thiemert, Stefan and Steinebach, Martin (2010):
SIFT features in semi-fragile video watermarks.
In: IS&T SPIE Electronic Imaging 2010 Conference - Media Forensics and Security XII, San Jose, January 2010, [Conference or Workshop Item]

Implementation of Binary Edwards Curves for very-constrained Devices.
In: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP), [Article]

Steinebach, Martin and Liu, Huajian and Katzenbeisser, Stefan (2010):
Cell phone camera ballistics: attacks and countermeasures.
In: Proceeding of IS&T SPIE Electronic Imaging 2010 Conference, San Jose, CA, USA - Multimedia on Mobile Devices 2010, [Conference or Workshop Item]

Steinebach, Martin and Zmudzinski, Sascha and Katzenbeisser, Stefan and Rührmair, Ulrich (2010):
Audio watermarking forensics: detecting malicious re-embedding.
In: Proceeding of IS&T SPIE Electronic Imaging 2010 Conference - Media Forensics and Security XII, San Jose, CA, USA, [Conference or Workshop Item]

Schulz, Steffen and Sadeghi, Ahmad-Reza (2010):
Extending IPsec for Efficient Remote Attestation.
LNCS, In: Financial Cryptography and Data Security (FC), Springer, [Conference or Workshop Item]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011), [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Manulis, Mark and Strufe, Thorsten Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Datta, Anwitaman and Buchegger, Sonja and Vu, Le-Hung and Rzadca, Krzysztof and Strufe, Thorsten Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Strufe, Thorsten (2010):
Profile Popularity in a Business-oriented Online Social Network.
In: Proceedings of the EuroSys Conference, pp. 1 -- 6, [Conference or Workshop Item]

Krumov, Lachezar and Andreeva, Adriana and Strufe, Thorsten (2010):
Resilient Peer-to-Peer Live-Streaming using Motifs.
In: 11th IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1 -- 8, [Conference or Workshop Item]

Barreto, Paulo and Cayrel, Pierre-Louis and Misoczki, Rafael and Niebuhr, Robert (2010):
Quasi-dyadic CFS signatures.
In: LNCS, In: Inscrypt 2010, Springer, [Conference or Workshop Item]

Langer, Lucie and Jonker, Hugo and Pieters, Wolter (2010):
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
In: ICICS, Barcelona, Spain, [Conference or Workshop Item]

Volkamer, Melanie and Schryen, Guido (2010):
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
In: 23rd Bled eConference, Bled, Slovenia, June 20-23, [Conference or Workshop Item]

Volkamer, Melanie (2010):
Evaluierungsverfahren für Internetwahlsysteme.
it 3/2010, In: IT-Information Technology, pp. 169-172, DOI: 10.1524/itit.2010.0587,
[Article]

Volkamer, Melanie Gutwirth, Serge and Poullet, Yves and Hert, Paul De (eds.) (2010):
Data Protection in a Profiled World.
Springer, pp. 177-190, [Book Section]

Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]

Benlian, Alexander and Hess, Thomas and Buxmann, Peter (2010):
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
2, In: Wirtschaftsinformatik und Management, (2), pp. 23--32, [Article]

Webster, Philip and Uren, Victoria and Ständer, Marcus (2010):
Shaken not Stirred: Mixing Semantics into XPDL.
In: 5th International Workshop on Semantic Business, pp. 29-35, [Conference or Workshop Item]

Khelil, Abdelmajid and Germanus, Daniel and Suri, Neeraj (2010):
Protection of SCADA Communication Channels.
In: Advances in Critical Infrastructure Protection, Springer, [Book Section]

Müller, Jürgen and Massoth, Michael (2010):
Defense Against Direct Spam Over Internet Telephony by Caller Pre-Validation.
In: Proceedings of the 6th Advanced International Conference on Telecommunications (AICT'10), IEEE, pp. 172-177, DOI: 10.1109/AICT.2010.40,
[Conference or Workshop Item]

Paul, Thomas and Buchegger, Sonja and Strufe, Thorsten (2010):
Decentralizing Social Networking Services.
In: International Tyrrhenian Workshop on Digital Communications, pp. 1--10, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2010):
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
In: Proceedings of the 6th International IFIP AICT 320 Summer School, pp. 86 -- 101, [Conference or Workshop Item]

Rossberg, Michael and Schäfer, Günter and Strufe, Thorsten (2010):
Distributed Automatic Configuration of Complex IPsec-Infrastructures.
In: IEEE Journal of Network and Systems Management, pp. 300 -- 326, [Article]

Kobayashi, K. and Ikegami, J. and Kneževic, M. and Guo, X. and Matsuo, S. and Huang, S. and Nazhandali, L. and Kocabas, U. and Fan, J. and Satoh, A. and Verbauwhede, I. and Sakiyama, K. and Ohta, K. (2010):
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
In: IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63, [Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2010):
Flexible Scheduler-independent Security.
In: LNCS 6345, In: European Symposium on Research in Computer Security (ESORICS), Springer, pp. 116-133, [Conference or Workshop Item]

Mogre, Parag S. and Graffi, K. and Hollick, Matthias and Steinmetz, R. (2010):
A Security Framework for Wireless Mesh Networks.
In: Wireless Communications and Mobile Computing, [Article]

Fenzi, Michele and Liu, Huajian and Steinebach, Martin and Caldelli, Roberto (2010):
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
In: Proceeding of the Seventh IASTED International Conference on Signal Processing, Pattern Recognition and Applications (SPPRA 2010), Innsbruck, Austria, ACTA Press, [Conference or Workshop Item]

Szczytowski, Piotr and Shaikh, Faisal Karim and Sachidananda, Vinay and Khelil, Abdelmajid and Suri, Neeraj (2010):
Mobility Assisted Adaptive Sampling in Wireless Sensor Networks.
In: Proc. International Conference on Networked Sensing Systems (INSS), [Conference or Workshop Item]

Germanus, Daniel and Khelil, Abdelmajid and Suri, Neeraj (2010):
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
In: Proc. International Symposium on Architecting Critical Systems (ISARCS), [Conference or Workshop Item]

Khelil, Abdelmajid and Jeckel, Sebastian and Germanus, Daniel and Suri, Neeraj (2010):
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
In: Proc. of The 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT), [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Saffar, Kamel and Suri, Neeraj (2010):
Data-based Agreement for Inter-Vehicle Coordination.
In: Proc. of the 11th International Conference on Mobile Data Management (MDM), [Conference or Workshop Item]

Shaikh, Faisal Karim and Khelil, Abdelmajid and Ayari, Brahim and Szczytowski, Piotr and Suri, Neeraj (2010):
Generic Information Transport for Wireless Sensor Networks.
In: The Third IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), [Conference or Workshop Item]

Szczytowski, Piotr and Khelil, Abdelmajid and Suri, Neeraj (2010):
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks.
In: The Third IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), [Conference or Workshop Item]

Mahmudimanesh, Mohammadreza and Khelil, Abdelmajid and Suri, Neeraj (2010):
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks.
In: The Third IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2010):
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
In: Proceedings of the 11th International Conference on Mobile Data Management (MDM), [Conference or Workshop Item]

Bedner, Mark and Ackermann, Tobias (2010):
Schutzziele der IT-Sicherheit.
34, In: Datenschutz und Datensicherheit (DuD), (5), pp. 323-328, DOI: 10.1007/s11623-010-0096-1,
[Article]

Derawi, Mohammad and Nickel, Claudia and Bours, Patrick and Busch, Christoph (2010):
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, [Conference or Workshop Item]

Acker, Robin and Brandt, Steffen and Buchmann, Nicolas and Fugmann, Thorsten and Massoth, Michael (2010):
Ubiquitous Home Control based on SIP and Presence Service.
In: Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS'10), [Conference or Workshop Item]

Acker, Robin and Massoth, Michael (2010):
Secure Ubiquitous House and Facility Control Solution.
In: Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW'10), 2010, [Conference or Workshop Item]

Müller, Jürgen and Massoth, Michael (2010):
Abwehr von Direct Spam over Internet Telephony mittels Anrufer Pre-Validierung.
In: Technologien und Anwendungen - Vorträge der 15. ITG-Fachtagung, [Conference or Workshop Item]

Plies, Andreas and Massoth, Michael and Marx, Ronald (2010):
Approach to Identity Card-based Voice-over-IP Authentication.
In: Proceedings of the 2nd International Conferences on Advances in Multimedia (MMEDIA'10), [Conference or Workshop Item]

Martucci, Leonardo and Ries, Sebastian and Mühlhäuser, Max (2010):
Identifiers, Privacy and Trust in the Internet of Services.
In: Proceedings {o}f the 4th {IFIP} {I}nternational {C}onference on {T}rust {M}anagement ({IFIPTM} 2010), [Conference or Workshop Item]

Braun, Michael and Meyer, Ulrike and Wetzel, Susanne (2010):
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
In: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, [Conference or Workshop Item]

Breitinger, Frank and Nickel, Claudia (2010):
User Survey on Phone Security and Usage.
In: BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, [Conference or Workshop Item]

Witte, Heiko and Nickel, Claudia (2010):
Modular Biometric Authentication Service System (MBASSy).
In: BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, [Conference or Workshop Item]

Busch, Christoph and Abt, Sebastian and Nickel, Claudia and Korte, Ulrike and Zhou, Xuebing (2010):
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
[Conference or Workshop Item]

Seeger, Mark and Wolthusen, Stephen and Busch, Christoph and Baier, Harald (2010):
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation.
In: 9th Information Security South Africa (ISSA 2010), [Conference or Workshop Item]

Kemetmüller, Christoph and Seeger, Mark and Baier, Harald and Busch, Christoph (2010):
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
In: Eighth International Network Conference (INC 2010), [Conference or Workshop Item]

Riedmüller, Reinhard and Seeger, Mark and Wolthusen, Stephen and Baier, Harald and Busch, Christoph (2010):
Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection.
In: 2nd International Workshop on Security and Communication Networks (IWSCN 2010), [Conference or Workshop Item]

Seeger, Mark and Wolthusen, Stephen (2010):
Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency.
In: Fifth International Conference on Systems (ICONS 2010), pp. 158-163, ISBN 978-0-7695-3980-5,
DOI: http://doi.ieeecomputersociety.org/10.1109/ICONS.2010.34,
[Conference or Workshop Item]

Nickel, Claudia and Zhou, Xuebing and Busch, Christoph (2010):
Template Protection for Biometric Gait Data.
[Conference or Workshop Item]

Kevenaar, Tom and Korte, Ulrike and Merkle, Johannes and Niesing, Matthias and Ihmor, Heinrich and Busch, Christoph and Zhou, Xuebing (2010):
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.
[Conference or Workshop Item]

Hirzel, Jan and Hartung, Daniel and Busch, Christoph (2010):
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
[Conference or Workshop Item]

Busch, Christoph and Hartung, Daniel (2010):
Biometrische Nachrichten-Authentisierung.
[Conference or Workshop Item]

Abt, Sebastian and Busch, Christoph and Nickel, Claudia (2010):
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
[Conference or Workshop Item]

Grimm, Rüdiger and Hupf, Katharina and Volkamer, Melanie Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 89-107, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Gharadaghy, Rojan and Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 151-162, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, GI, pp. 135-148, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Khalilbeigi, Mohammadreza and Bradler, Dirk and Schweizer, Immanuel and Probst, Florian and Steimle, Jürgen (2010):
Towards Computer Support of Paper Workflows in Emergency Management.
In: 7th International Conference on Information Systems for Crisis Response and Management, Seattle, Washington, USA, pp. 1-9, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Maes, Roel and Sunar, Berk and Tuyls, Pim (2009):
Memory Leakage-Resilient Encryption based on Physically Unclonable Functions.
In: ASIACRYPT'09, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Li, Shujun and Asghar, Hassan Jameel and Pieprzyk, Josef and Schmitz, Roland and Wang, Huaxiong (2009):
On the Security of PAS (Predicate-based Authentication Service).
In: Annual Computer Security Applications Conference (ACSAC’09), 2009., [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Anonymizer-Enabled Security and Privacy for RFID.
In: LNCS, 5888, In: International Conference on Cryptology and Network Security (CANS), Springer, pp. 134-153, [Conference or Workshop Item]

König, André and Seither, Daniel and Hollick, Matthias and Steinmetz, Ralf (2009):
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
In: Proceedings of IEEE GLOBECOM 2009, [Conference or Workshop Item]

Braun, Johannes (2009):
Nutzung des elektronischen Personalausweises im eCommerce.
Darmstadt, Technische Universität, [Bachelor Thesis]

Roßnagel, Alexander and Hornung, Gerrit and Knopp, Michael and Wilke, Daniel (2009):
De-Mail und Bürgerportale.
12, In: DuD, pp. 728-734, [Article]

Busch, Heike and Katzenbeisser, Stefan and Baecher, Paul (2009):
PUF-Based Authentication Protocols, Revisited.
In: International Workshop on Information Security Applications (WISA'09), pp. 296-308, [Conference or Workshop Item]

Skoric, B. and Katzenbeisser, Stefan and Celik, M. and Schaathun, H. (2009):
Tardos Fingerprinting Codes in the Combined Digit Model (Extended Abstract).
In: First IEEE Workshop on Information Forensics and Security (WIFS'09), IEEE Press, [Conference or Workshop Item]

Boldyreva, Alexandra and Cash, David and Fischlin, Marc and Warinschi, Bogdan (2009):
Foundations of Non-Malleable Hash and One-Way Functions.
In: Lecture Notes in Computer Science, 5912, In: Asiacrypt 2009, Springer, pp. 524-541, [Conference or Workshop Item]

Schindler, Werner and Walter, Colin Parker, M. G. (ed.) (2009):
Optimal Recovery of Secret Keys from Weak Side Channel Traces.
In: LNCS, In: Cryptography and Coding - IMA 2009, Springer, pp. 446 - 468, [Conference or Workshop Item]

Rückert, Markus and Schröder, Dominique Shacham, Hovav and Waters, Brent (eds.) (2009):
Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles.
LNCS, In: Pairing 2009, Springer, Palo Alto, USA, pp. 17-34, ISBN 978-3-642-03297-4,
[Conference or Workshop Item]

Rückert, Markus Roy, Bimal and Sendrier, Nicolas (eds.) (2009):
Verifiably Encrypted Signatures from RSA without NIZKs.
In: LNCS, In: Indocrypt 2009, Springer, New Delhi, India, pp. 363-377, ISBN 978-3-642-10627-9,
[Conference or Workshop Item]

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2009):
Security of robust audio hashes.
In: IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, London, UK, [Conference or Workshop Item]

Gottron, Christian and König, André and Hollick, Matthias and Bergsträßer, Sonja and Hildebrandt, Tomas and Steinmetz, Ralf (2009):
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
In: Proceedings of IFIP Wireless Days 2009, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, pp. 120-135, [Conference or Workshop Item]

Dahmen, Erik and Krauß, Christoph Garay, Christoph A. and Miyaji, Atsuko and Otsuka, Akira (eds.) (2009):
Short Hash-Based Signatures for Wireless Sensor Networks.
In: LNCS, In: CANS 2009, Springer, Kanazawa, Japan, pp. 463-476, ISBN 978-3-540-89640-1,
[Conference or Workshop Item]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Zhan, Jing and Korthaus, René (2009):
A Practical Property-based Bootstrap Architecture.
In: ACMSTC'09, [Conference or Workshop Item]

Ekberg, Jan-Erik and Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009), [Conference or Workshop Item]

Charnes, Christopher Atallah, Mikhail and Blanton, Marina (eds.) (2009):
Algorithms and Theory of Computation Handbook.
In: Chapman & Hall/CRC Applied Algorithms and Data Structures series, [Book Section]

Deußer, Clemens and Reubold, Jan (2009):
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt, [Master Thesis]

Weber, Stefan (2009):
Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis.
In: Proceedings of International Conference on Intelligent Networking and Collaborative Systems (INCoS 2009), IEEE Computer Society, pp. 119 - 126, ISBN 978-0-7695-3858-7,
[Conference or Workshop Item]

Bedner, Mark (2009):
Rechtmäßigkeit der "Deep Packet Inspection".
[Other]

Gajek, Sebastian and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172, [Conference or Workshop Item]

Langer, Lucie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), ACM Press, Bogota, Colombia, pp. 203-210, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Ries, Sebastian and Aitenbichler, Erwin (2009):
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA Environments.
In: Proceedings of the The First International Symposium on Cyber-Physical Intelligence (CPI-09), IEEE, Brisbane, QLD, pp. 178 - 183, ISBN 978-1-4244-4902-6,
DOI: 10.1109/UIC-ATC.2009.82,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Vishik, Claire and Verbauwhede, Ingrid (2009):
Future of Assurance: Ensuring that a System is Trustworthy.
In: ISSE'09, [Conference or Workshop Item]

Brömme, Arslan and Busch, Christoph and Hühnlein, Detlef Brömme, Arslan and Busch, Christoph and Hühnlein, Detlef (eds.) (2009):
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
In: BIOSIG 2009, ISBN ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2009):
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
In: Tagungsband Informatik 2009, LNI, [Conference or Workshop Item]

Rößling, Guido and Müller, Marius (2009):
Social Engineering: A Serious Underestimated Problem.
In: Proceedings of the 14th Annual ACM SIGCSE Conference on Innovation and Technology in Computer Science Education, ACM Press, [Conference or Workshop Item]

Brinkmeier, Michael and Schäfer, Günter and Strufe, Thorsten (2009):
Optimally DoS resistant P2P topologies for live multimedia streaming.
20, In: IEEE Transactions on Parallel and Distributed Systems, (6), pp. 831-844, [Article]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2009):
PSP : private and secure payment with RFID WPES 2009.
In: WPES 2009, Workshop on Privacy in the Electronic Society, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
In: 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Leveraging social links for trust and privacy in networks.
In: INetSec 2009 Open Research Problems in Network Security, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Privacy preserving social networking through decentralization.
In: WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, pp. 145-152, [Conference or Workshop Item]

Lodrova, Dana and Busch, Christoph and Tabassi, Elham and Krodel, Wolfgang and Drahansky, Martin (2009):
Semantic Conformance Testing Methodology for Finger Minutiae Data.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications, ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Busch, Christoph (2009):
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications, ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Busch, Christoph (2009):
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung, pp. 132-141, [Article]

Busch, Christoph (2009):
Biometrie und Identitätsdiebstahl.
5, In: Datenschutz und Datensicherheit (DuD), [Article]

Busch, Christoph and Reimer, Helmut (2009):
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5), [Article]

Brzuska, Christina and Fischlin, Marc and Lehmann, Anja and Schröder, Dominique (2009):
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Lecture Notes in Informatics, In: Biometrics and Electronic Signatures - Research and Applications (BIOSIG) 2009, Gesellschaft fuer Informatik (GI), [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC &#039;09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, ACM, Chicago, Illinois, USA, pp. 49--54, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Buchmann, Johannes and Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
9, In: K&R, pp. 543-548, [Article]

Petter, Andreas and Behring, Alexander and Mühlhäuser, Max (2009):
A Methodology for Model-Driven Development of Crisis Management Applications using Solverational.
In: Lecture Notes in Informatics, In: INFORMATIK 2009, L&uuml;beck, [Conference or Workshop Item]

Steinebach, Martin and Zmudzinski, Sascha (2009):
Individuell gestempelt - Die Technik hinter digitalen Audio-Wasserzeichen.
09/2009, In: c't-Magazin, [Article]

Roßnagel, Alexander (2009):
Die Novellen zum Datenschutzrecht - Scoring und Adresshandel.
2009, In: Neue Juristische Wochenschrift (NJW), (Heft 37), pp. 2716-2722, [Article]

Baier, Harald and Karatsiolis, Vangelis (2009):
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI, Springer, [Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2009):
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009, LNI, [Conference or Workshop Item]

Freiling, Felix and Heinson, Dennis (2009):
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
2009, In: Datenschutz und Datensicherheit (DuD), (9), pp. 547-552, [Article]

Steinebach, Martin and Ouariachi, Mohamed El and Liu, Huajian (2009):
On the Reliability of Cell Phone Camera Fingerprint Recognition.
In: Proceedings of International Conference on Digital Forensics and Cyber Crime (ICDF2C), Albany, NY, USA, [Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander (2009):
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
In: 8th European Conference on Digital Archiving (ECA2010), Geneva, Switzerland, [Conference or Workshop Item]

Bender, Jens and Fischlin, Marc and Kügler, Dennis (2009):
Security Analysis of the PACE Key-Agreement Protocol.
In: Lecture Notes in Computer Science, 5735, In: Information Security Conference (ISC) 2009, Springer, pp. 33-48, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS, In: European Symposium on Research in Computer Security (ESORICS), Springer, pp. 120-135, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Schmidt, Axel and Langer, Lucie and Buchmann, Johannes and Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 9-18, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Location Privacy in RFID Applications.
In: LNCS, 5599, In: Privacy in Location-Based Applications: Research Issues and Emerging Trends, Springer, pp. 127-150, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
4, In: eGovernement Review, [Article]

Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., pp. 1827-1836, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), pp. 1837-1846, [Conference or Workshop Item]

Ranade, Kedar (2009):
Symmetric extendibility for a class of qudit states.
In: J. Phys. A 42, 425302, [Article]

Weber, Stefan (2009):
Securing First Response Coordination With Dynamic Attribute-Based Encryption.
In: Proceedings of Seventh Annual Conference on Privacy, Security and Trust (PST 2009) in conjunction with 2009 World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS 2009), IEEE Computer Society, pp. 58 - 69, ISBN 978-0-7695-3805-1,
[Conference or Workshop Item]

Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, IEEE, pp. 186-190, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Kursawe, Klaus and Schellekens, Dries and Skoric, Boris and Tuyls, Pim (2009):
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Enhancing RFID Security and Privacy by Physically Unclonable Functions (Extended Abstract).
In: Dagstuhl Seminar Proceedings, In: Foundations for Forgery-Resilient Cryptographic Hardware, Schloss Dagstuhl, pp. 10-11, [Conference or Workshop Item]

Ries, Sebastian and Aitenbichler, Erwin (2009):
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA Environments.
In: The First International Symposium on Cyber-Physical Intelligence (CPI-09), Brisbane, Australia, [Conference or Workshop Item]

Roßnagel, Alexander (2009):
Der elektronische Personalausweis als sichere Signaturerstellungseinheit - Können Signaturkarten kontaktlos genutzt werden?
07/2009, In: Datenschutz und Datensicherheit (DuD), pp. 403-408, [Article]

Steinebach, Martin (2009):
Watermarking-Schutz digitaler Medien.
3, In: Science Allemagne: Die sichere digitale Identität, Französische Botschaft in Deutschland (Hrsg.), [Article]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2009):
Efficient RFID Security and Privacy with Anonymizers.
In: Workshop on RFID Security (RFIDSec), [Conference or Workshop Item]

Standaert, François-Xavier and Koeune, Francois and Schindler, Werner Abdalla, M. and Pointcheval, D. and Fouque, P.-A. and Vergnaud, D. (eds.) (2009):
How to Compare Profiled Side-Channel Attacks.
In: Applied Cryptography and Network Security - ACNS 2009, Berlin, pp. 485--498, [Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander (2009):
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
[Report]

Roßnagel, Alexander and Bedner, Mark and Knopp, Michael (2009):
Schriftliche Stellungnahme zu Fragen des Bundesverfassungsgerichts im Zusammenhang mit den Verfassungsbeschwerden zur Vorratsdatenspeicherung.
[Other]

Nickel, Claudia (2009):
Authentisierung an mobilen Geräten mittels Gangerkennung.
5, In: Datenschutz und Datensicherheit (DuD), pp. 280-283, [Article]

Stopczynski, Martin (2009):
Erweiterte Benutzerführung für den Umgang mit sicheren Verbindungen in Browsern.
Darmstadt, Technische Universität, [Bachelor Thesis]

Weber, Stefan (2009):
Secure and Efficient First Response Coordination based on Attribute-based Encryption Techniques.
[Other]

Biere, Thomas and Schindler, Werner Horster, P. and Schartner, P. (eds.) (2009):
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
In: D-A-CH Security 2009, syssec, Klagenfurt, pp. 462--469, [Conference or Workshop Item]

Gebhardt, Max and Illies, Georg and Schindler, Werner (2009):
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
In: Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI, SecuMedia, Ingelheim, pp. 489--503, [Conference or Workshop Item]

Ghiglieri, Marco and Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]

Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Einsatz von Sicherheitskernen und Trusted Computing.
In: D-A-CH Security, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Tuyls, Pim and Maes, Roel and Sunar, Berk (2009):
Physically Unclonable Pseudorandom Functions.
In: Poster session of Advances in Cryptology - EUROCRYPT, [Conference or Workshop Item]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
46, In: Bulletin of the Korean Mathematical Society, (4), pp. 803-819, [Article]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, Springer, pp. 45-62, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schulz, Steffen (2009):
Secure VPNs for Trusted Computing Environments.
In: International Conference on Trusted Computing (TRUST), Springer, Oxford, UK, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Vishik, Claire and Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS, 5451, In: 5th Information Security Practice and Experience Conference (ISPEC'09), Springer, pp. 396-407, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kursawe, Klaus and Stumpf, Frederic (2009):
Revocation of TPM Keys.
In: Second International Conference on Trusted Computing (TRUST 2009), pp. 120-132, [Conference or Workshop Item]

Schmitt, J. and Kropff, M. and Reinhard, Alexander and Hollick, Matthias (2009):
ContextFramework.KOM - Eine offene Middleware zur Integration heterogener Sensoren in eine Kontext-sensitive Kommunikationsplattform (Extended Abstract).
Software Demonstration, K, [Other]

Hornung, Gerrit and Schnabel, Christoph (2009):
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
25, In: Computer Law & Security Review, (2), pp. 115-122, [Article]

Thiemert, Stefan and Steinebach, Martin and Liu, Huajian (2009):
Digital watermarking for digital cinema.
In: IS&T SPIE Electronic Imaging 2009 Conference - Media Forensics and Security XI, San Jose, USA, [Conference or Workshop Item]

Kallel, Slim and Charfi, Anis and Mezini, Mira and Klose, Karl and Jmaiel, Mohamed (2009):
From Formal Access Control Policies to Runtime Enforcement Aspects.
In: Proc. of the International Symposium on Engineering Secure Software and Systems (ESSOS), Springer Verlag, Leuven, Belgium, pp. 16--31, ISBN 978-3-642-00198-7,
DOI: 10.1007/978-3-642-00199-4_2,
[Conference or Workshop Item]

Schindler, Werner (2009):
Seitenkanalangriffe gegen Chipkarten und Sicherheitssoftware auf PCs.
[Other]

Sadeghi, Ahmad-Reza and Bangerter, Endre and Barbosa, Manuel and Bernstein, Daniel and Damgård, Ivan and Page, Dan and Pagter, Jakob and Sovio, Sampo (2009):
Using Compilers to Enhance Cryptographic Product Development.
In: Information Security Solutions Europe (ISSE), [Conference or Workshop Item]

Hornung, Gerrit and Schnabel, Christoph (2009):
Data protection in Germany I: The population census decision and the right to informational self-determination.
25, In: Computer Law & Security Report, (1), pp. 84-88, [Article]

Roßnagel, Alexander Eifert, Martin and Hoffmann-Riem, Wolfgang (eds.) (2009):
Technikneutrale Regulierung: Möglichkeiten und Grenzen.
In: Innovationsfördernde Regulierung, pp. 323-338, [Conference or Workshop Item]

Schindler, Werner Koc, Cetin (ed.) (2009):
Random Number Generators for Cryptographic Applications.
In: Cryptographic Engineering, Springer, pp. 5--23, [Book Section]

Schindler, Werner Koc, Cetin (ed.) (2009):
Evaluation Criteria for Physical Random Number Generators.
In: Cryptographic Engineering, Springer, pp. 25--54, [Book Section]

Kinder, Johannes and Veith, Helmut and Zuleger, Florian (2009):
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
In: Lecture Notes in Computer Science, 5403, In: Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2009), Springer, pp. 214-228, DOI: 10.1007/978-3-540-93900-9_19,
[Conference or Workshop Item]

Volkamer, Melanie Wagner, Dorothea and Bernstein, Abraham (eds.) (2009):
Evaluation von Internetwahlsystemen.
In: LNI, D-9, In: Ausgezeichnete Informatikdissertationen 2008,, Gesellschaft für Informatik, pp. 301-310, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Dimitrov, S. and Steinmetz, R. (2009):
Incorporating Spatial Reuse into Algorithms for Bandwidth Management and Scheduling in IEEE 802.16j Relay Networks.
In: Proceedings of the 34th IEEE Conference on Local Computer Networks (IEEE LCN 2009), Zurich, Switzerland, IEEE Communications Society, [Conference or Workshop Item]

Reinhardt, Andreas and Christin, Delphine and Hollick, Matthias and Steinmetz, Ralf (2009):
On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks.
In: Proceedings of the 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2009), IEEE Communications Society, [Conference or Workshop Item]

Reinhardt, Andreas and Hollick, Matthias and Steinmetz, Ralf (2009):
Stream-oriented Lossless Packet Compression in Wireless Sensor Networks.
In: Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2009), Rome, Italy, IEEE Communications Society, pp. 1--9, [Conference or Workshop Item]

Brinkmeier, Michael and Schäfer, Günter and Strufe, Thorsten (2009):
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
99, In: IEEE Transactions on Parallel and Distributed Systems, [Article]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Leveraging Social Links for Trust and Privacy in Networks.
In: INetSec, Open Research Problems in Network Security, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Privacy Preserving Social Networking Through Decentralization.
In: 6th International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 145 -- 152, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
In: 3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications, [Conference or Workshop Item]

Hahn, Timothy and Palmer, Bernard and Waidner, Michael and Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
[Standards, patents]

Hahn, Timothy and Waidner, Michael and Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
[Standards, patents]

Volkamer, Melanie and Grimm, Rüdiger (2009):
Determine the Resilience of Evaluated Internet Voting Systems.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 47-54, [Conference or Workshop Item]

Bradler, Dirk and Mühlhäuser, Max and Kangasharju, Jussi (2009):
Demonstration of first response communication sandbox.
In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, [Conference or Workshop Item]

Hartle, Michael and Fuchs, Andreas and Ständer, Marcus and Schumann, Daniel and Mühlhäuser, Max (2009):
Data Format Description and its Applications in IT Security.
2, In: International Journal On Advances in Security, (1), pp. 90-111, [Article]

Ráth, Istvan and Varró, Gergely and Varro, Daniel (2009):
Change-Driven Model Transformations Derivation and Processing of Change Histories.
In: Lecture Notes in Computer Science, 5795/2009, In: Model Driven Engineering Languages and Systems, Springer, pp. 342-356, DOI: 10.1007/978-3-642-04425-0_26,
[Conference or Workshop Item]

Schindler, Werner and Walter, Colin Parker, M. G. (ed.) (2009):
Optimal Recovery of Secret Keys from Weak Side-Channel Traces.
In: LNCS, In: Cryptography and Coding, Springer, pp. 446-468, [Conference or Workshop Item]

Bodden, Eric and Chen, Feng and Rosu, Grigore (2009):
Dependent advice: A general approach to optimizing history-based aspects.
AOSD ’09: Proceedings of , In: ACM, 2009, pp. pages 3–14, [Article]

Erkin, Zekeriya and Franz, Martin and Guajardo, Jorge and Katzenbeisser, Stefan and Lagendijk, Inald and Toft, Tomas (2009):
Privacy-Preserving Face Recognition.
In: Privacy Enhancing Technologies Symposium (PETS 2009), [Conference or Workshop Item]

Novotny, Jaroslav and Alber, Gernot and Jex, Igor (2009):
Random unitary dynamics of quantum networks.
In: eprint, [Article]

Zmudzinski, Sascha and Steinebach, Martin (2009):
Perception-based Authentication Watermarking for Digital Audio Data.
In: IS&T SPIE Electronic Imaging 2009 Conference - Media Forensics and Security XI, San Jose, USA, [Conference or Workshop Item]

Steinebach, Martin and Ruppel, Angelika Horster, Patrick (ed.) (2009):
Erstellen und Identifizieren individueller Logos.
In: D-A-CH Security 2009 - Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Proceeding Arbeitskonferenz "D-A-CH 2009 Security", syssec, Bochum, ISBN 978-3-00027-488-6,
[Conference or Workshop Item]

Zmudzinski, Sascha and Steinebach, Martin (2009):
Perception-based Audio Authentication Watermarking in the Time-Frequency Domain.
In: Information Hiding Conference 2009, Darmstadt, [Conference or Workshop Item]

Volkamer, Melanie (2009):
Evaluation of Electronic Voting -Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Springer, ISBN 978-3-642-01661-5,
[Book]

Fischlin, Marc (2009):
RSA Cryptographers' Track. Lecture Notes in Computer Science.
5473, Springer, [Book]

Roßnagel, Alexander (2009):
Digitale Rechteverwaltung – Eine gelungene Allianz von Recht und Technik?
In: Schriftenreihe des Instituts für Europäisches Medienrecht (EMR), [Article]

Türpe, Sven and Poller, Andreas and Steffan, Jan and Stotz, Jan-Peter and Trukenmüller, Jan (2009):
Attacking the BitLocker Boot Process.
5471, In: International Conference on the Technical and Socio-economic Aspects of Trusted Computing (Trust 2009), Springer, pp. 183-196, [Conference or Workshop Item]

Türpe, Sven and Eichler, Jörn (2009):
Testing Production Systems Safely: Common Precautions in Penetration Testing.
In: 4th Testing: Academic and Industrial Conference (TAIC PART 2009), [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Schwingenschlögl, C. and Ziller, A. and Steinmetz, R. Katz, Marcos and Fitzek, Frank (eds.) (2009):
WiMAX Mesh Architectures and Network Coding.
In: WiMAX Evolution: Emerging Technologies and Applications, Wiley, pp. 145--162, [Book Section]

König, A. and Hollick, Matthias and Steinmetz, R. (2009):
An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract).
In: Proceedings of the 9th W&uuml;rzburg Workshop on IP: Joint ITG and Euro-NF Workshop Visions of Future Generation Networks (EuroView2009), W&uuml;rzburg, Germany, [Conference or Workshop Item]

König, A. and Hollick, Matthias and Steinmetz, R. (2009):
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
In: Procedings of the IEEE International Conference on Communications (IEEE ICC 2009), Dresden, Germany, IEEE Computer Society Press, pp. 1--5, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Steinmetz, R. and Dadia, V. and Sengupta, S. (2009):
Distributed Bandwidth Reservation Strategies to Support Efficient Bandwidth Utilization and QoS on a Per-Link Basis in IEEE 802.16 Mesh Networks.
In: Proceedings of the 34th IEEE Conference on Local Computer Networks (IEEE LCN 2009), Zurich, Switzerland, IEEE Communications Society, [Conference or Workshop Item]

Bilge, Leyla and Strufe, Thorsten and Balzarotti, Davide and Kirda, Engin (2009):
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
In: 18th Intl. World Wide Web Conference (WWW&#039;09), pp. 551 -- 560, [Conference or Workshop Item]

Serrano, P. and Banchs, A. and Vollero, L. and Hollick, Matthias (2009):
Throughput and Energy Efficiency in IEEE 802.11 WLANs: Friends or Foes?
In: Proceedings of the Sixth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (ICST QSHINE 2009), Las Palmas de Gran Canaria, Spain, Springer, [Conference or Workshop Item]

Hartung, Daniel (2009):
Venenbilderkennung -Privatsphärenschutz unerlässlich.
5, In: Datenschutz und Datensicherheit (DuD), [Article]

Brinkmeier, Michael and Fischer, Mathias and Grau, Sascha and Schäfer, Günter and Strufe, Thorsten (2009):
Methods for Improving Resilience in Communication Networks and P2P Overlays.
33, In: Praxis der Informationsverarbeitung und Kommunikation (PIK), (1), [Article]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
47, In: IEEE Communications Magazine, (12), pp. 94 -- 101, [Article]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus and Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Bedner, Mark (2009):
Vorratsdatenspeicherung.
Juni 2009, In: Datenschutz und Datensicherheit (DuD), p. 372, [Article]

Rückert, Markus and Schröder, Dominique (2009):
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
In: LNCS, In: ISA 2009, Springer, Seoul, pp. 750-759, ISBN 978-3-642-02616-4,
[Conference or Workshop Item]

Roßnagel, Alexander and Bedner, Mark and Knopp, Michael (2009):
Rechtliche Anforderungen an die Aufbewahrung von Vorratsdaten.
September 2009, In: Datenschutz und Datensicherheit (DuD), pp. 536-541, [Article]

Langer, Lucie and Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
In: IRIS 2009, [Conference or Workshop Item]

Roßnagel, Alexander and Hornung, Gerrit (2009):
Ein Ausweis für das Internet. Der neue Personalausweis erhält einen "elektronischen Identitätsnachweis".
2009, In: Die öffentliche Verwaltung (DÖV), (Heft 8), pp. 301-306, [Article]

Langer, Lucie and Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
9, In: DuD, [Article]

Langer, Lucie (2009):
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement, Practical studies in e-Governement, [Book Section]

Ranade, Kedar (2009):
Ein Beitrag zur Quantenkryptografie in endlichdimensionalen Systemen nebst weiteren Ergebnissen aus dem Gebiet der Quanteninformationstheorie.
TU-Darmstadt, [Ph.D. Thesis]

Kern, Oliver (2009):
Randomized Dynamical Decoupling Strategies and Improved One-Way Key Rates for Quantum Cryptography.
TU-Darmstadt, [Ph.D. Thesis]

Ranade, Kedar (2009):
Symmetric extendibility for qudits and tolerable error rates in quantum.
In: Phys. Rev. A 80, 022301, [Article]

Myhr, Geir Ove and Renes, Joseph and Doherty, Andrew and Lütkenhaus, Norbert (2009):
Symmetric extension in two-way quantum key distribution.
In: Phys. Rev. A 79, 042329, [Article]

Novotny, J. and Alber, G. and Jex, I. (2009):
Random unitary dynamics of quantum networks.
In: J. Phys. A 42, 282003, [Article]

Bokor, Peter and Serafini, Marco and Suri, Neeraj and Veith, Helmut (2009):
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
In: Proc. of International Conference on Formal Engineering Methods (ICFEM), [Conference or Workshop Item]

Dobre, Dan and Majuntke, Matthias and Serafini, Marco and Suri, Neeraj (2009):
Efficient Robust Storage Using Secret Tokens.
In: 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), [Conference or Workshop Item]

Germanus, Daniel and Johansson, Andreas and Suri, Neeraj (2009):
Threat Modeling and Dynamic Profiling.
In: Annals of Emerging Research in Information Assurance, Security and Privacy Services, Elsevier, [Book Section]

Waidner, Michael (2009):
End-of-Session Authentication.
[Standards, patents]

Ries, Sebastian (2009):
Extending Bayesian Trust Models Regarding Context-Dependence and User Friendly Representation.
In: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1294-1301, ISBN 978-1-60558-166-8,
[Conference or Workshop Item]

Breebaart, Jeroen and Yang, Bian and Buhan, Ileana and Busch, Christoph (2009):
Biometric Template Protection – The need for open standards.
5, In: Datenschutz und Datensicherheit (DuD), [Article]

Brzuska, Christina and Fischlin, Marc and Freudenreich, Tobias and Lehmann, Anja and Page, Marcus and Schelbert, Jakob and Schröder, Dominique and Volk, Florian (2009):
Security of Sanitizable Signatures Revisited.
In: Public Key Cryptography (PKC 2009), pp. 317-336, [Conference or Workshop Item]

Fischlin, Marc and Schröder, Dominique (2009):
Security of Blind Signatures under Aborts.
In: Public Key Cryptography (PKC 2009), pp. 297-316, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes Prosser, Alexander and Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, OCG Verlag, pp. 243-253, [Conference or Workshop Item]

Schmidt, Axel and Volkamer, Melanie and Langer, Lucie and Buchmann, Johannes Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: LNI, 154, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik, pp. 1814-1826, [Conference or Workshop Item]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Ries, Sebastian and Schnelle-Walka, Dirk and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max (2009):
Shaping the Future Internet.
In: Proceedings of the 3rd International CompanionAble Workshop IoPTS, pp. 1 - 10, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
4, In: eGovernment Review, [Article]

Rupp, Andy and Leander, Gregor and Bangerter, Endre and Dent, Alexander and Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008, [Conference or Workshop Item]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: International Conference on lnformation Security and Cryptology (ICISC 2008), pp. 20-36, [Conference or Workshop Item]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häussge, Gina (2008):
Smart Products: Integration Challenges.
In: Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08), [Conference or Workshop Item]

Richter, Peter (2008):
Optimierung des Merkle-Signaturverfahrens auf System z.
TU Darmstadt, [Master Thesis]

Hornung, Gerrit and Knopp, Michael and Laue, Philip and Wilke, Daniel (2008):
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR, pp. 723-728, [Article]

Schwenk, Jörg and Sadeghi, Ahmad-Reza and Gajek, Sebastian and Manulis, Mark and Pereira, Olivier (2008):
Universally Composable Security Analysis of TLS.
In: Second Conference on Provable Security (ProvSec), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Blundo, Carlo and Persiano, Giuseppe and Visconti, Ivan (2008):
Improved Security Notions and Protocols for Non-Transferable Identification.
In: 13th European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik and Gasmi, Yacine and Ramunno, Gianluca and Vernizzi, Davide and Stewin, Patrick and Unger, Martin (2008):
An Efficient Implementation of Trusted Channels Based on OpenSSL.
In: ACMSTC 2008, [Conference or Workshop Item]

Bradler, Dirk and Panitzek, Kamill and Schweizer, Immanuel and Mühlhäuser, Max (2008):
First Response Communication Sandbox.
In: 11th Communications and Networking Simulation Symposium, pp. 115-122, [Article]

Schneider, Timo (2008):
Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur.
[Other]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS, In: PQCrypto 2008, Springer, Cincinnati, USA, pp. 109-123, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Fischer, Lars and Katzenbeisser, Stefan and Eckert, Claudia (2008):
Measuring Unlinkability Revisited.
In: WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM, Alexandria, Virginia, USA, pp. 105-110, ISBN 978-1-60558-289-4,
DOI: http://doi.acm.org/10.1145/1456403.1456421,
[Conference or Workshop Item]

Stumpf, Frederic and Fuchs, Andreas and Katzenbeisser, Stefan and Eckert, Claudia (2008):
Improving the Scalability of Platform Attestation.
In: Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08), ACM Press, pp. 1-10, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Winandy, Marcel and Stüble, Christian and Husseiki, Rani and Gasmi, Yacine and Stewin, Patrick and Unger, Martin (2008):
Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains.
In: 3rd ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2008):
User Privacy in Transport Systems Based on RFID E-Tickets.
In: International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain, [Conference or Workshop Item]

Weber, Pia (2008):
Einsatzgebiete Digitaler Signaturen.
Darmstadt, Technische Universität, [Bachelor Thesis]

Sadeghi, Ahmad-Reza and Bangerter, Endre and Djackov, Maksim (2008):
A Demonstrative Ad-hoc Attestation System.
In: Information Security Conference 2008 (ISC'08), Taipei, Taiwan, [Conference or Workshop Item]

Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof Grimaud, Gilles and Standaert, François-Xavier (eds.) (2008):
Fast Hash-Based Signatures on Constrained Devices.
In: LNCS, In: CARDIS 2008, Springer, London, GB, pp. 104-117, ISBN 978-3-540-85892-8,
[Conference or Workshop Item]

Armknecht, Frederik and Furukawa, Jun and Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), [Conference or Workshop Item]

Gasmi, Yacine and Hessmann, Christian and Pittenauer, Martin and Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI, 1, In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), [Conference or Workshop Item]

Roßnagel, Alexander and Hornung, Gerrit (2008):
Forschung à la Card? Grenzen und Vorschläge für eine Nutzung der elektronischen Gesundheitskarte zur medizinischen Forschung.
26. Jg., In: Medizinrecht, pp. 538-543, [Article]

König, André and Gottron, Christian and Hollick, Matthias and Steinmetz, Ralf (2008):
Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes.
In: Procedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2008), Atlanta, USA, IEEE Computer Society Press, [Conference or Workshop Item]

Reinhardt, Andreas and Hollick, Matthias and Steinmetz, Ralf (2008):
An Approach towards Adaptive Payload Compression in Wireless Sensor Networks (Extended Abstract).
[Other]

Vuillaume, Camille and Okeya, Katsuyuki and Dahmen, Erik and Buchmann, Johannes Chung, Kyo-Il and Sohn, Kiwook and Yung, Moti (eds.) (2008):
Public Key Authentication with Memory Tokens.
In: LNCS, In: Workshop on Information Security Applications - WISA 2008, Springer, Jeju Island, Korea, pp. 84-98, ISBN 978-3-642-00305-9,
[Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie Hegering, Heinz-Gerd and Lehmann, Axel and Ohlbach, Hans Jürgen and Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Band 1, In: GI Jahrestagung, München, pp. 429-436, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2008):
Property-Based TPM Virtualization.
In: LNCS, In: Information Security, 11th International Conference (ISC 2008), pp. 1-16, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Löhr, Hans and Chen, Liqun and Manulis, Mark (2008):
Property-Based Attestation without a Trusted Third Party.
In: Information Security Conference (ISC'08), [Conference or Workshop Item]

Bradler, Dirk and Kangasharju, Jussi and Mühlhäuser, Max (2008):
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
(3), [Report]

Grimm, Rüdiger and Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI, 131, In: Electronic Voting - 3rd International Conference, Gesellschaft für Informatik, pp. 185-196, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Gajek, Sebastian and Gröbert, Felix and Birk, Dominik (2008):
A Forensic Framework for Tracing Phishers.
In: LNCS, Springer, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Shokrollahi, Jamshid and Bösch, Christoph and Guajardo, Jorge and Tuyls, Pim (2008):
Efficient Helper Data Key Extractor on FPGAs.
In: Workshop on Cryptographic Hardware and Embedded Systems 2008 (CHES 2008), [Conference or Workshop Item]

Vu, L. and Nahrstedt, K. and Hollick, Matthias (2008):
Exploiting Schelling Behavior for Improving Data Accessibility in Mobile Peer-to-Peer Networks.
In: Proceedings of 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2008), Dublin, Ireland, pp. online, [Conference or Workshop Item]

König, André and Hollick, Matthias and Steinmetz, Ralf (2008):
Security for Future Wireless and Decentralized Communication Networks - Harnessing Cooperation, Space, and Time.
In: Proceedings of the 8th Wuerzburg Workshop on IP: Joint EuroNF, ITC, and ITG Workshop "Visions of Future Generation Networks" (EuroView2008), [Conference or Workshop Item]

Kinder, Johannes and Veith, Helmut (2008):
Jakstab: A Static Analysis Platform for Binaries.
5123, In: Proceedings of the 20th International Conference on Computer Aided Verification (CAV 2008), Springer, pp. 423--427, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Blundo, Carlo and Persiano, Giuseppe and Visconti, Ivan (2008):
Resettable and Non-Transferable Chip Authentication for E-Passports.
In: RFIDSec 2008, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Kropff, M. and Steinmetz, R. and Schwingenschlögl, C. (2008):
A Note on Practical Deployment editions for Network Coding in the IEEE 802.16 MeSH Mode.
In: Proceedings of the 1st IEEE International Workshop on Wireless Network Coding (IEEE WiNC 2008) co-located with IEEE SECON 2008, San Francisco, USA, pp. online, [Conference or Workshop Item]

Bergmann, Gabor and Ökrös, András and Ráth, Istvan and Varro, Daniel and Varró, Gergely (2008):
Incremental Pattern Matching in the VIATRA Model Transformation System.
In: Proc. of the 3rd International Workshop on Graph and Model Transformation, [Conference or Workshop Item]

Flentge, Felix and Weber, Stefan and Behring, Alexander and Ziegert, Thomas (2008):
Designing Context-Aware HCI for Collaborative Emergency Management.
In: Int'l Workshop on HCI for Emergencies in conjunction with CHI 2008 (electronic proceedings), [Conference or Workshop Item]

Aciicmez, Onur and Schindler, Werner Malkin, T. (ed.) (2008):
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
In: LNCS, In: Topics in Cryptology, CT-RSA, Springer, Berlin, pp. 256--273, [Conference or Workshop Item]

Bartsch, Steffen and Bormann, Carsten Horster, Patrick (ed.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008, syssec Verlag, [Conference or Workshop Item]

Bodden, Eric and Hendren, Laurie and Lam, Patrick and Lhoták, Ondrej and Naeem, Nomair (2008):
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008, [Article]

Bodden, Eric and Havelund, Klaus (2008):
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008), pp. pages 155–165, [Article]

König, A. and Hollick, Matthias and Krop, T. and Steinmetz, R. (2008):
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
2, In: Security and Communication Networks (SCN), Wiley, pp. 271--288, [Article]

Krimmer, Robert and Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: LNCS, In: PQCrypto 2008, Springer, pp. 63-78, [Conference or Workshop Item]

Schunter, Matthias and Poritz, Jonathan and Waidner, Michael and Herreweghen, Els Van (2008):
Method and Device for Verifying the Security of a Computing Platform.
[Standards, patents]

Waidner, Michael (2008):
Method and system for processing of documents with electronic signatures.
[Standards, patents]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, pp. 39-40, [Conference or Workshop Item]

Volkamer, Melanie and Vogt, Roland (2008):
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008), [Article]

Krimmer, Robert and Volkamer, Melanie Krishna, Jaya and Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press, In: E-Voting - Perspectives and Experiences, [Conference or Workshop Item]

Krimm, Rüdiger and Volkamer, Melanie (2008):
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008, Boorberg Verlag, pp. 145-156, [Conference or Workshop Item]

Schmitt, J. and Hollick, Matthias and Steinmetz, R. (2007):
Der Assistent in Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer.
30, In: Praxis der Informationsverarbeitung und Kommunikation (PIK), Special edition on Current Trends in Network and Service Management, pp. 100--105, [Article]

Backes, Michael and Basin, David and Waidner, Michael (2007):
Preface.
15, In: Journal of Computer Security, (6), p. 561, [Article]

Krop, T. and Bredel, M. and Hollick, Matthias and Steinmetz, Ralf (2007):
JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks.
In: Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2007) co-located with ACM MobiCom 2007, Montreal, Canada, pp. 27--34, [Conference or Workshop Item]

König, André and Hollick, Matthias and Ackermann, R. and Steinmetz, R. (2007):
Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach.
In: Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security, Nova Science Publishers, pp. 45--59, [Conference or Workshop Item]

Jonker, Hugo and Volkamer, Melanie Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID&#039;07, 4896, In: Proceedings of the 1st international conference on E-voting and identity, Springer-Verlag, Bochum, Germany, pp. 50--61, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Volkamer, Melanie and Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
10, In: Datenschutz und Datensicherheit, pp. 766-768, [Article]

Volkamer, Melanie and Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
9, In: Datenschutz und Datensicherheit, pp. 692-695, [Article]

Schunter, Matthias and Waidner, Michael (2007):
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007), [Conference or Workshop Item]

Schmitt, J. and Hecker, T. and Hollick, Matthias and Steinmetz, Ralf (2007):
Dynamische Authentifizierung für Provider-übergreifende VoIP-Kommunikation.
30, In: Praxis der Informationsverarbeitung und Kommunikation (PIK), Special edition on Internet-Telefonie and Voice over IP, pp. 191--198, [Article]

Mogre, Parag S. and Graffi, K. and Hollick, Matthias and Steinmetz, R. (2007):
AntSec, WatchAnt and AntRep:Innovative Security Mechanisms for Wireless Mesh Networks.
In: Proceedings of the 32nd IEEE Conference on Local Computer Networks (IEEE LCN 2007), Dublin, Ireland, pp. 539--547, [Conference or Workshop Item]

Hollick, Matthias and Mogre, Parag S. and Schott, C. and Steinmetz, Ralf (2007):
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
In: Proceedings of the 15th IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA, pp. 126--134, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Steinmetz, R. (2007):
QoS in Wireless Mesh Networks: Challenges, Pitfalls and Roadmap to its Realization (Keynote Paper).
In: Proceedings of the 17th International Workshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV 2007), Urbana-Champaign, IL, USA, pp. online, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
205, In: Information and Computation, (12), pp. 1685--1720, [Article]

Mogre, Parag S. and d'Heureuse, N. and Hollick, Matthias and Steinmetz, R. (2007):
A Case for Joint Routing and Scheduling and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach (Extended Abstract and Poster).
In: Proceedings of IEEE MASS 2007, Pisa, Italy, [Conference or Workshop Item]

Volkamer, Melanie and McGaley, Margaret (2007):
Requirements and Evaluation Procedures for eVoting.
In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, IEEE Computer Society, pp. 895-902, [Conference or Workshop Item]

Oberender, Jens and Volkamer, Melanie and de Meer, Hermann (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
pp. 1-6, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Helbach, Jörg and Krimmer, Robert and Meletiadou, Anastasia and Meissner, Nils and Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
31, In: Datenschutz und Datensicherheit, (6), pp. 434-440, [Article]

Alkassar, Ammar and Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Volkamer, Melanie and Krimmer, Robert and Grimm, Rüdiger Prosser, Alexander and Parycek, Peter (eds.) (2007):
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: OCG Verlag, In: Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich, pp. 115-126, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert Grönlund, Ake and Scholl, Jochen and Wimmer, Maria (eds.) (2007):
Requirements and Evaluation Techniques for Online-Voting.
In: Schriftreihe Informatik, 24, In: Electronic Government 6th International EGOV Conference, Universitätsverlag Rudolf Trauner, pp. 37-46, [Conference or Workshop Item]

Krimmer, Robert and Triessnig, Stefan and Volkamer, Melanie Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID&#039;07, 4896, In: E-Voting and Identity, First International Conference, VOTE-ID 2007, Springer-Verlag, Bochum, Germany, pp. 1-15, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert Hochberger, Christian and Liskowsky, Rüdiger (eds.) (2006):
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
93, In: Informatik 2006 - Informatik f�ur Menschen, Dresden, pp. 418-425, [Conference or Workshop Item]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, Springer-Verlag, Berlin, pp. 13--24, [Conference or Workshop Item]

Volkamer, Melanie and Alkassar, Ammar and Sadeghi, Ahmad-Reza and Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE &#039;06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf}, [Conference or Workshop Item]

Backes, Michael and Karjoth, Günter and Pitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
[Standards, patents]

Adler, Steven and Brown, Nigel and Gilbert, Art and Palmer, Charles and Schnyder, Michael and Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Benenson, Zinaida and Freiling, Felix and Pfitzmann, Birgit and Rohner, Christian and Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS&#039;06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006), [Conference or Workshop Item]

Masip-Bruin, X. and Yannuzzi, M. and Domingo-Pascual, J. and Fonte, A. and Curado, M. and Monteiro, E. and Kuipers, F. and Van Mieghem, P. and Avallone, S. and Ventre, G. and Aranda-Gutierrez, P. and Hollick, Matthias and Steinmetz, R. and Iannone, L. and Salamatian, K. (2006):
QoS Routing Open Agenda.
29, In: Computer Communications, Elsevier Science B.V., Amsterdam, pp. 563--581, [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS &#039;06 (European Symposium on Research in Computer Security), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods, Springer-Verlag, Berlin, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
E-Voting in Estland: Analyse der ersten rechtsgültig durchgeführten landesweiten Internet-Wahl.
[Report]

Volkamer, Melanie and Krimmer, Robert (2006):
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
[Report]

König, A. and Hollick, Matthias and Schmitt, J. and Steinmetz, R. (2006):
Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract).
In: Proceedings of 2. Essener Workshop zu Neuen Herausforderungen in der Netzsicherheit (EWNS 2006), Essen, Germany, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias (2006):
The IEEE 802.16-2004 MESH Mode Explained.
(TR-KOM-2006-08), [Report]

Krop, T. and Widmer, J. and Hollick, Matthias and Prehofer, C. and Steinmetz, Ralf (2006):
Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post).
In: Proceedings of Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Montreal, Canada, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: {IEEE Computer Society} % todo eigenlich publisher, In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, pp. 340-347, [Conference or Workshop Item]

Volkamer, Melanie and Vogt, Roland (2006):
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In: In Frontiers in Electronic Elections - FEE &#039;06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf}, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Bangerter, Endre Felix and Camenisch, Jan and Schunter, Matthias and Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
[Standards, patents]

Volkamer, Melanie and Krimmer, Robert (2006):
Die Online-Wahl auf dem Weg zum Durchbruch.
29, In: Informatik Spektrum, (2), pp. 98-113, [Article]

Volkamer, Melanie and Reinhard, Walter and Vogt, Roland Dittmann, Jana (ed.) (2006):
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Springer LNI, 77, In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp. 159-170, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI, 86, In: Electronic Voting 2006 - $2^{nd}$ International Conference, pp. 97-106, [Conference or Workshop Item]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
4, In: International Journal of Information Security (IJIS), Springer-Verlag, (3), pp. 135--154, [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Reactively Secure Signature Schemes.
4, In: International Journal of Information Security (IJIS), (4), pp. 242--252, [Article]

Krop, T. and Kappes, M. and Hollick, Matthias (2005):