TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "LOEWE > LOEWE-Zentren"

Ebene hoch
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z
Anzahl der Einträge auf dieser Ebene: 1875.

A

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit] , (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[ Konferenzveröffentlichung] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) S. 143-163.
[Artikel] , (2017)

Arzt, Steven :
Static Data Flow Analysis for Android Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937]
Technische Universität , Darmstadt
[Dissertation], (2016)

Almon, Lars ; Riecker, Michael ; Hollick, Matthias :
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
[Online-Edition: https://ieeexplore.ieee.org/document/8109386]
In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 9-12 Oct. 2017, Singapore. IEEE
[ Konferenzveröffentlichung] , (2017)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2016)

Ali, Azmzt ; Othmane, Lotfi Ben :
Towards effective security assurance for incremental software development - the case of zen cart application,.
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[ Konferenzveröffentlichung] , (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[ Konferenzveröffentlichung] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[ Konferenzveröffentlichung] , (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes] , (2016)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2015)

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira :
Towards Secure Integration of Cryptographic Software.
[Online-Edition: http://2015.splashcon.org/track/onward2015-papers]
In: OOPSLA Onward!, 25.10.2015, Piitsburgh. In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software .
[ Konferenzveröffentlichung] , (2015)

Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben :
Incremental Development of RBAC-controlled E-marking System Using the B Method.
Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015)
[ Konferenzveröffentlichung] , (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report] , (2015)

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric :
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 14.06.2015, Portland, USA. Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis
[ Konferenzveröffentlichung] , (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[ Konferenzveröffentlichung] , (2015)

Alkeilani Alkadri, Nabil :
Post-Quantum Commitment Schemes.
TU Darmstadt
[Masterarbeit] , (2015)

Arabadzhieva, Vladislava :
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt
[Masterarbeit] , (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[ Konferenzveröffentlichung] , (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[ Konferenzveröffentlichung] , (2015)

Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés :
Blended Identity: Pervasive IdM for Continuous Authentication.
In: IEEE Security & Privacy Magazine, 2015
[ Konferenzveröffentlichung] , (2015)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , S. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel] , (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) S. 1189-1206.
[Artikel] , (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
International Conference on Software Engineering(ICSE) 2014
[ Konferenzveröffentlichung] , (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad.
[ Konferenzveröffentlichung] , (2014)

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank :
Constructing Call Graphs of Scala Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3]
In: Proceedings of the 28th European Conference on Object-Oriented Programming. In: ECOOP '14 .
[ Konferenzveröffentlichung] , (2014)

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh.
[ Konferenzveröffentlichung] , (2014)

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric :
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices .
[ Konferenzveröffentlichung] , (2014)

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas :
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science , 8383 .
[ Konferenzveröffentlichung] , (2014)

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch] , (2013)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[ Konferenzveröffentlichung] , (2013)

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian :
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
ICISC 2013
[ Konferenzveröffentlichung] , (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[ Konferenzveröffentlichung] , (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13) S. 364-381.
[Artikel] , (2013)

Arzt, Steven ; Bodden, Eric :
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf]

[Report] , (2013)

Alaoui, Sidi Mohamed El Yousfi ; El Bansarkhani, Rachid ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard :
Code based Identification and Signature Schemes in Software.
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[ Konferenzveröffentlichung] , (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[ Konferenzveröffentlichung] , (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report] , (2013)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2) S. 209-232.
[Artikel] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[ Konferenzveröffentlichung] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[ Konferenzveröffentlichung] , (2013)

Ali, Karim ; Lhoták, Ondřej :
Averroes: Whole-Program Analysis without the Whole Program.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16]
In: Proceedings of the 27th European Conference on Object-Oriented Programming. In: ECOOP '13 .
[ Konferenzveröffentlichung] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013)
[Artikel] , (2013)

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan :
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11]
In: 15th International Conference on Information Security, 19-21 Sep 2012, Passau, Germany. In: Lecture Notes in Computer Science (ISSN 0302-9743) , 7483 .
[ Konferenzveröffentlichung] , (2012)

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi :
Challenges for Refinement and Composition of Instrumentations (Position Paper).
[Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf]
In: International Conference on Software Composition (SC 2012).
[ Konferenzveröffentlichung] , (2012)

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian :
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3) S. 175-179.
[Artikel] , (2012)

Ali, Karim ; Lhoták, Ondřej :
Application-Only Call Graph Construction.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30]
In: Proceedings of the 26th European Conference on Object-Oriented Programming. In: ECOOP '12 .
[ Konferenzveröffentlichung] , (2012)

Ahn, T. ; Rainovski, G. ; Pietralla, N. ; Coquard, L. ; Möller, T. ; Costin, A. ; Janssens, R. V. ; Lister, C. ; Carpenter, M. ; Zhu, S. :
Identification of the 2_{1,ms}^{+} mixed-symmetry state in ^{136}Ce.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.014303]
In: Physical Review C, 86 (1) ISSN 0556-2813
[Artikel] , (2012)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
International Conference on Cryptology in Africa (AFRICACRYPT 2012) Springer
[ Konferenzveröffentlichung] , (2012)

Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef :
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7) S. 24-32.
[Artikel] , (2012)

Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf :
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
Proceedings of the 19th European Conference on Information Systems (ECIS)
[ Konferenzveröffentlichung] , (2011)

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
IEEE Symposium on Security and Privacy (SSP) IEEE Computer Society
[ Konferenzveröffentlichung] , (2011)

Armknecht, Frederik ; Strufe, Thorsten :
An Efficient Distributed Privacy-preserving Recommendation System.
Proceedings of the 10th IEEE/IFIP Med-Hoc-Net
[ Konferenzveröffentlichung] , (2011)

Ahmed, Sarah :
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt
[Masterarbeit] , (2011)

Alaoui, Sidi Mohamed El Yousfi ; Cayrel, Pierre-Louis ; Meziani, Mohammed
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science , 200 . Springer
[ Konferenzveröffentlichung] , (2011)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: LNCS , 6480 . Springer
[ Konferenzveröffentlichung] , (2010)

Ackermann, Tobias ; Buxmann, Peter :
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
Proceedings of the 16th Americas Conference on Information Systems (AMCIS) 2010
[ Konferenzveröffentlichung] , (2010)

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[ Konferenzveröffentlichung] , (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS , 6123 . Springer
[ Konferenzveröffentlichung] , (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: LNCS , 6370 . Springer
[ Konferenzveröffentlichung] , (2010)

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk :
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, Special Issue of IOPTS 1 - 7.
[Artikel] , (2010)

Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph :
A Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
Workshop on Program Semantics, Specification and Verification: Theory and Applications at the 5th International Computer Science Symposium in Russia
[ Konferenzveröffentlichung] , (2010)

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) :

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: TRUST 2010
[ Konferenzveröffentlichung] , (2010)

Anderl, Reiner ; Henriques, Joselito Rodrigues :
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt (2) S. 16-22.
[Artikel] , (2010)

Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj :
Data-based Agreement for Inter-Vehicle Coordination.
Proc. of the 11th International Conference on Mobile Data Management (MDM)
[ Konferenzveröffentlichung] , (2010)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
Proceedings of the 11th International Conference on Mobile Data Management (MDM)
[ Konferenzveröffentlichung] , (2010)

Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael :
Ubiquitous Home Control based on SIP and Presence Service.
Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS'10)
[ Konferenzveröffentlichung] , (2010)

Acker, Robin ; Massoth, Michael :
Secure Ubiquitous House and Facility Control Solution.
Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW'10), 2010
[ Konferenzveröffentlichung] , (2010)

Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia :
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.

[ Konferenzveröffentlichung] , (2010)

Anderl, Reiner ; Henriques, Joselito :
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
In: International Congress of Mechanical Engineering, Gramado, Brazil. Proceedings of the 20th International Congress of Mechanical Engineering (COBEM 2009)
[ Konferenzveröffentlichung] , (2009)

Ali, Karim ; Aib, Issam ; Boutaba, Raouf :
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[ Konferenzveröffentlichung] , (2009)

Ali, Karim ; Boutaba, Raouf :
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[ Konferenzveröffentlichung] , (2009)

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max :
Shaping the Future Internet.
Proceedings of the 3rd International CompanionAble Workshop IoPTS
[ Konferenzveröffentlichung] , (2009)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina :
Smart Products: Integration Challenges.
Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08)
[ Konferenzveröffentlichung] , (2008)

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru :
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Sixth Conference on Security and Cryptography for Networks (SCN 2008)
[ Konferenzveröffentlichung] , (2008)

Aciicmez, Onur ; Schindler, Werner
Malkin, T. (ed.) :

A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
In: LNCS (4964). Springer
[ Konferenzveröffentlichung] , (2008)

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim :
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6) S. 329-336.
[Artikel] , (2008)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina :
Smart Products: Integration Challenges.
AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence
[ Konferenzveröffentlichung] , (2008)

Alkassar, Ammar ; Volkamer, Melanie :
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
In:
[Artikel] , (2007)

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael :
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard] , (2006)

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie :
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8 S. 480-482.
[Artikel] , (2005)

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael :
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
FMSE ACM
[ Konferenzveröffentlichung] , (2004)

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael :
Using a Rules Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard] , (2001)

Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias :
Using an Object Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard] , (2001)

B

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André :
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?.
[ Konferenzveröffentlichung] , (2019)

Brand, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[ Konferenzveröffentlichung] , (2018)

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[ Konferenzveröffentlichung] , (2018)

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar :
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
[Online-Edition: https://www.raid2018.org/]
In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece. In: Lecture Notes in Computer Science , 11050 . Springer International Publishing
[ Konferenzveröffentlichung] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[ Konferenzveröffentlichung] , (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[ Konferenzveröffentlichung] , (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[ Konferenzveröffentlichung] , (2018)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit] , (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[ Konferenzveröffentlichung] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[ Konferenzveröffentlichung] , (2017)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[ Konferenzveröffentlichung] , (2017)

Borges, Fábio ; Lara, Pedro ; Portugal, Renato :
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292 406--416.
[Artikel] , (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[ Konferenzveröffentlichung] , (2017)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit] , (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[ Konferenzveröffentlichung] , (2016)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Anderes] , (2016)

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie :
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5) S. 300-304.
[Artikel] , (2016)

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel :
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7) 309–322.
[Artikel] , (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2016)

Brendel, Jacqueline :
Efficient Proactive Secret Sharing.
TU Darmstadt
[Masterarbeit] , (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[ Konferenzveröffentlichung] , (2016)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[ Konferenzveröffentlichung] , (2015)

Baluda, Mauro :
EvoSE: Evolutionary Symbolic Execution.
[Online-Edition: http://dx.doi.org/10.1145/2804322.2804325]
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015)
[Artikel] , (2015)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[ Konferenzveröffentlichung] , (2015)

Braun, Kristoffer ; Rack, Philipp :
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag
[Masterarbeit] , (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[ Konferenzveröffentlichung] , (2015)

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Financial Cryptography and Data Security
[ Konferenzveröffentlichung] , (2015)

Butin, Denis ; Métayer, Daniel Le :
A Guide to End-to-End Privacy Accountability.
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) IEEE
[ Konferenzveröffentlichung] , (2015)

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes :
Real-World Post-Quantum Digital Signatures.
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015) Springer CCIS
[ Konferenzveröffentlichung] , (2015)

Braun, Johannes :
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[ Konferenzveröffentlichung] , (2014)

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur :
Nearest Planes in Practice.
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[ Konferenzveröffentlichung] , (2014)

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[ Konferenzveröffentlichung] , (2014)

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) :

Towards Security Solutions for Emergent Business Software.
Future Business Software Conference 2012 Springer
[ Konferenzveröffentlichung] , (2014)

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014 Gesellschaft für Informatik
[ Konferenzveröffentlichung] , (2014)

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[ Konferenzveröffentlichung] , (2014)

Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
Peterson, Gilbert ; Shenoi, Sujeet (eds.) :

Using Approximate Matching to Reduce the Volume of Digital Data.
In: IFIP Advances in Information and Communication Technology , 433 . Springer
[ Konferenzveröffentlichung] , (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[ Konferenzveröffentlichung] , (2014)

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander :
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3) S. 459-478.
[Artikel] , (2014)

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max :
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014 913-959 (2014).
[Artikel] , (2014)

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) :

Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS , 8533 . Springer International Publishing Switzerland
[ Konferenzveröffentlichung] , (2014)

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) :

Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
International Conference for E-Democracy and Open Government 2014 Edition Donau-Universität Krems
[ Konferenzveröffentlichung] , (2014)

Bartsch, Steffen ; Volkamer, Melanie :
Expert Knowledge for Contextualized Warnings.

[Report] , (2014)

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie :
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2) S. 1-10.
[Artikel] , (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[ Konferenzveröffentlichung] , (2014)

Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
SPIE, IS&T (ed.) :

Robust Hashing for 3D Models.
Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, Februar 2014
[ Konferenzveröffentlichung] , (2014)

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie :
Unterstützung für ein risikobewusstes Verhalten im Internet.
Vielfalt der Informatik
[ Konferenzveröffentlichung] , (2014)

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie :
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht (2) S. 119-127.
[Artikel] , (2014)

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie :
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Workshop on Usable Security (USEC) Internet Society
[ Konferenzveröffentlichung] , (2014)

Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias :
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014)
[ Konferenzveröffentlichung] , (2014)

Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (eds.) :

Towards a Process Model for Hash Functions in Digital Forensics.
In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) , 132 . Springer
[ Konferenzveröffentlichung] , (2014)

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen :
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4) S. 267-297.
[Artikel] , (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 S. 114-125.
[Artikel] , (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[ Konferenzveröffentlichung] , (2014)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[ Konferenzveröffentlichung] , (2014)

Buchmann, Johannes ; Neumann, Stephan :
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2) S. 98-102.
[Artikel] , (2014)

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander:
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg ISBN 978-3-642-40656-0
[Buch] , (2013)

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander :
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 11/2013 720 - 725.
[Artikel] , (2013)

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira :
Reducing human factors in software security architectures.
[Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf]
In: Future Security Conference 2013.
[ Konferenzveröffentlichung] , (2013)

Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil :
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
[Artikel] , (2013)

Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas :
Security considerations on extending PACE to a biometric-based connection establishment.
In: 1 (13).
[ Konferenzveröffentlichung] , (2013)

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) :

Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS (8341). Springer Berlin Heidelberg
[ Konferenzveröffentlichung] , (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , S. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch] , (2013)

Bartsch, Steffen ; Volkamer, Melanie :
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
RiskKom-Workshop, INFORMATIK 2013 Gesellschaft für Informatik
[ Konferenzveröffentlichung] , (2013)

Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald :
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
[Artikel] , (2013)

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) :

Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing. Springer , 157 - 158.
[Buchkapitel] , (2013)

Braden, Kjell :
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt
[Masterarbeit] , (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
22nd USENIX Security Symposium (USENIX Security '13) USENIX
[ Konferenzveröffentlichung] , (2013)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw
[Artikel] , (2013)

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[ Konferenzveröffentlichung] , (2013)

Beckerle, Matthias ; Martucci, Leonardo :
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
Symposium on Usable Privacy and Security (SOUPS) 2013
[ Konferenzveröffentlichung] , (2013)

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) :

Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[ Konferenzveröffentlichung] , (2013)

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) :

The Transitivity-of-Trust Problem in Android Application Interaction.
8th International Conference on Availability, Reliability and Security (ARES 2013) IEEE
[ Konferenzveröffentlichung] , (2013)

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science , 7985 . Springer
[ Konferenzveröffentlichung] , (2013)

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) :

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
8th International Conference on Availability, Reliability and Security (AReS 2013) IEEE
[ Konferenzveröffentlichung] , (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
[Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf]
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
[ Konferenzveröffentlichung] , (2013)

Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin :
Leakage Detection and Tracing for Databases.
Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France
[ Konferenzveröffentlichung] , (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013)
[ Konferenzveröffentlichung] , (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[ Konferenzveröffentlichung] , (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS (7859). Springer
[ Konferenzveröffentlichung] , (2013)

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas :
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[ Konferenzveröffentlichung] , (2013)

Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph :
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
[Artikel] , (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) :

Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science , 7779 . Springer
[ Konferenzveröffentlichung] , (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[ Konferenzveröffentlichung] , (2013)

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten :
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4) S. 468-480.
[Artikel] , (2013)

Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas :
Video Game Watermarking.
Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013
[ Konferenzveröffentlichung] , (2013)

Breitinger, Frank ; Petrov, Kaloyan :
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9)
[Artikel] , (2013)

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) :

On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on Systems Science (HICSS-46) IEEE Computer Society
[ Konferenzveröffentlichung] , (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes :
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3) 997-1022 (2014).
[Artikel] , (2013)

Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. :
Multi-Biometrische Gesichtserkennung.
the 13. Deutscher IT-Sicherheitskongress
[ Konferenzveröffentlichung] , (2013)

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS (8282). Springer
[ Konferenzveröffentlichung] , (2013)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[ Konferenzveröffentlichung] , (2013)

Braun, Johannes ; Rynkowski, Gregor :
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Social Computing (SocialCom) - PASSAT2013
[ Konferenzveröffentlichung] , (2013)

Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten :
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2) 22 -- 44.
[Artikel] , (2013)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus :
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1) S. 84-96.
[Artikel] , (2013)

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih :
Contextualized Web warnings, and how they cause distrust.
Trust and Trustworthy Computing (TRUST 2013) Springer
[ Konferenzveröffentlichung] , (2013)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander :
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.

[Report] , (2012)

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira :
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf]

[Report] , (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.

[Report] , (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report] , (2012)

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker :
Delta-oriented Monitor Specification.
[Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf]
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[ Konferenzveröffentlichung] , (2012)

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried :
Challenges in defining a programming language for provably correct dynamic analyses.
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[ Konferenzveröffentlichung] , (2012)

Breitinger, Frank ; Baier, Harald :
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
[Artikel] , (2012)

Breitinger, Frank ; Baier, Harald :
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
[Artikel] , (2012)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) :

iPIN and mTAN for secure eID applications.
In: LNCS (7232). Springer
[ Konferenzveröffentlichung] , (2012)

Bartsch, Steffen ; Volkamer, Melanie :
Towards the Systematic Development of Contextualized Security Interventions.
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[ Konferenzveröffentlichung] , (2012)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS (7868). Springer
[ Konferenzveröffentlichung] , (2012)

Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse :
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
[Artikel] , (2012)

Breitinger, Frank ; Baier, Harald :
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
[Artikel] , (2012)

Baier, Harald ; Brand, Achim :
On the Investigation of Application Specific Data within Digital Forensics.
Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012)
[ Konferenzveröffentlichung] , (2012)

Breitinger, Frank ; Baier, Harald :
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL) S. 89-101.
[Artikel] , (2012)

Bartsch, Steffen :
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
[Artikel] , (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.

[Report] , (2012)

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) :

Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012 IEEE
[ Konferenzveröffentlichung] , (2012)

Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet :
An In-Depth Look at ALIA4J.
[Online-Edition: http://dx.doi.org/10.5381/jot.2012.11.1.a7]
In: The Journal of Object Technology, 11 (1) S. 1-28. ISSN 1660-1769
[Artikel] , (2012)

Busold, Christoph :
Hash-based Signatures on Smart Cards.
TU Darmstadt
[Masterarbeit] , (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , S. 160-186.
[Buch] , (2012)

Bulygin, Stanislav ; Walter, Michael :
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.

[Report] , (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2012)

Bodden, Eric :
Identifying meaningless parameterized linear-temporal-logic formulas.

[Report] , (2012)

Bodden, Eric :
On the Expressiveness of Parameterized Finite-state Runtime Monitors.

[Report] , (2012)

Bauer, C. ; Behrens, T. ; Bildstein, V. ; Blazhev, A. ; Bruyneel, B. ; Butterworth, J. ; Clément, E. ; Coquard, L. ; Egido, J. ; Ekström, A. ; Fitzpatrick, C. ; Fransen, C. ; Gernhäuser, R. ; Habs, D. ; Hess, H. ; Leske, J. ; Kröll, T. ; Krücken, R. ; Lutter, R. ; Marley, P. ; Möller, T. ; Otsuka, T. ; Patronis, N. ; Petts, A. ; Pietralla, N. ; Rodríguez, T. ; Shimizu, N. ; Stahl, C. ; Stefanescu, I. ; Stora, T. ; Thirolf, P. ; Voulot, D. ; Van de Walle, J. ; Warr, N. ; Wenander, F. ; Wiens, A. :
Prolate shape of ^{140}Ba from a first combined Doppler-shift and Coulomb-excitation measurement at the REX-ISOLDE facility.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.034310]
In: Physical Review C, 86 (3) ISSN 0556-2813
[Artikel] , (2012)

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie :
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
[Artikel] , (2012)

Bockisch, Christoph ; Sewe, Andreas :
The ALIA4J Approach to Efficient Language Implementation.
[Online-Edition: http://dx.doi.org/10.1145/2384716.2384726]
In: Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity
[ Konferenzveröffentlichung] , (2012)

Bodden, Eric :
MOPBox: A Library Approach to Runtime Verification.
[Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf]
In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30. In: Lecture notes in computer science , 7186 . Springer
[ Konferenzveröffentlichung] , (2012)

Baier, Harald ; Dichtelmüller, Christian :
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
DACH Security 2012
[ Konferenzveröffentlichung] , (2012)

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis :
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science . Springer-Verlag
[ Konferenzveröffentlichung] , (2012)

Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. :
Towards a more Secure Border Control with 3D Face Recognition.
the 5th Norsk Informasjons Sikkerhets Konferanse (NISK)
[ Konferenzveröffentlichung] , (2012)

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard :
The Transitivity of Trust Problem in the Interaction of Android Applications.

[Report] , (2012)

Bartsch, Steffen :
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
[Dissertation]

Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin :
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.

[Norm, Patent, Standard] , (2012)

Berchtold, Waldemar ; Schäfer, Marcel :
Rebound on Symmetric Tardos Codes.
Proceeding of The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012)
[ Konferenzveröffentlichung] , (2012)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Safe and Practical Decoupling of Aspects with Join Point Interfaces.

[Report] , (2012)

Bodden, Eric ; Thies, Andreas :
RefaFlex: Safer Refactorings for Reflective Java Programs.
International Symposium on Software Testing and Analysis (ISSTA 2012)
[ Konferenzveröffentlichung] , (2012)

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) :

Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12 . ACM
[ Konferenzveröffentlichung] , (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[ Konferenzveröffentlichung] , (2012)

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) :

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science , 7092 . Springer
[ Konferenzveröffentlichung] , (2011)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[ Konferenzveröffentlichung] , (2011)

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) :

XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS (7071). Springer Berlin / Heidelberg
[ Konferenzveröffentlichung] , (2011)

Breitinger, Frank ; Baier, Harald :
Performance Issues about Context-Triggered Piecewise Hashing.
3rd International ICST Conference on Digital Forensics & Cyber Crime
[ Konferenzveröffentlichung] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM) ACM Press
[ Konferenzveröffentlichung] , (2011)

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) :

Scalable Trust Establishment with Software Reputation.
Workshop on Scalable Trusted Computing (STC) ACM Press
[ Konferenzveröffentlichung] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[ Konferenzveröffentlichung] , (2011)

Bodden, Eric :
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
[Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[ Konferenzveröffentlichung] , (2011)

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang :
Der elektronische Safe als vertrauenswürdiger Cloud Service.

[Report] , (2011)

Bartsch, Steffen :
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
NSS '11: Proceedings of the 5th International Conference on Network and System Security IEEE Computer Society
[ Konferenzveröffentlichung] , (2011)

Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn :
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
DACH Security 2011
[ Konferenzveröffentlichung] , (2011)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
Schartner, Peter ; Taeger, Jürgen (eds.) :

Mobile Authentisierung und Signatur.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven syssec Verlag
[ Konferenzveröffentlichung] , (2011)

Bartsch, Steffen :
Practitioners Perspectives on Security in Agile Development.
FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security IEEE Computer Society
[ Konferenzveröffentlichung] , (2011)

Bodden, Eric :
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
[Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf]
In: WODA '11: International Workshop on Dynamic Analysis. ACM
[ Konferenzveröffentlichung] , (2011)

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (eds.) :

PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: Distributed Computing and Networking: 12th International Conference, ICDCN 2011 , 6522
[ Konferenzveröffentlichung] , (2011)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) :

On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS) (6737). Springer Berlin / Heidelberg
[ Konferenzveröffentlichung] , (2011)

Bodden, Eric :
Defining Access Control Policies as Tracematches.

[Report] , (2011)

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (eds.) :

Interactive Access Rule Learning for Access Control: Concepts and Design.
International Journal On Advances in Intelligent Systems
[ Konferenzveröffentlichung] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

[Report] , (2011)

Bodden, Eric :
Closure Joinpoints: Block joinpoints without surprises.
[Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf]
In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development. ACM
[ Konferenzveröffentlichung] , (2011)

Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing :
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD)
[Artikel] , (2011)

Bartsch, Steffen :
An Authorization Enforcement Usability Case Study.
ESSoS 2011 Springer
[ Konferenzveröffentlichung] , (2011)

Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin :
Collusion-secure patchwork embedding for transaction watermarking.
Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII
[ Konferenzveröffentlichung] , (2011)

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira :
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
[Online-Edition: http://doi.acm.org/10.1145/1985793.1985827]
In: International Conference on Software Engineering, 21-28 May 2011, Waikiki, Honolulu, HI, USA. Proceedings of the 33rd International Conference on Software Engineering New York, NY, USA
[ Konferenzveröffentlichung] , (2011)

Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
Bishop, Judith ; Vallecillo, Antonio (eds.) :

An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-21952-8_11]
In: Objects, Models, Components, Patterns. Lecture Notes in Computer Science, 6705. Springer, Berlin / Heidelberg , S. 131-146. ISSN 0302-9743
[Buchkapitel] , (2011)

Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin :
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
[Online-Edition: http://doi.acm.org/10.1145/2095050.2095101]
In: 5th workshop on Virtual Machines and Intermediate Languages, 24 Oct 2011, Portland, OR, USA. In: SPLASH '11 Workshops . ACM , New York, NY, USA
[ Konferenzveröffentlichung] , (2011)

Baier, Harald ; Breitinger, Frank :
Security Aspects of Piecewise Hashing in Computer Forensics.
6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011)
[ Konferenzveröffentlichung] , (2011)

Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin :
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
The 7th International Symposium on Applied Reconfigurable Computing, Belfast, UK
[ Konferenzveröffentlichung] , (2011)

Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan :
Physically Uncloneable Functions in the Universal Composition Framework.
Advances in Cryptography (CRYPTO 2011) Springer
[ Konferenzveröffentlichung] , (2011)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
Detecting Computer Worms in the Cloud.
Open Problems in Network Security (iNetSec 2011) Springer
[ Konferenzveröffentlichung] , (2011)

Bodden, Eric ; Hendren, Laurie :
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer)
[Artikel] , (2011)

Berjani, Betim ; Strufe, Thorsten :
A Recommendation System for Spots in Location-Based Online Social Networks.
Proceedings of the Eurosys Workshop on Social Network Systems
[ Konferenzveröffentlichung] , (2011)

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael :
Data network and method for checking nodes of a data network.

[Norm, Patent, Standard] , (2011)

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian :
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems. IARIA , S. 234-244.
[Buchkapitel] , (2011)

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) :

Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science , 6498 . Springer
[ Konferenzveröffentlichung] , (2010)

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems
[ Konferenzveröffentlichung] , (2010)

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira :
IDE 2.0: Collective Intelligence in Software Development.
[Online-Edition: http://www.bodden.de/pubs/bbmm10ide.pdf]
In: FSE/SDP Workshop on the Future of Software Engineering. ACM
[ Konferenzveröffentlichung] , (2010)

Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian :
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
In: ComputationWorld 2010 .
[ Konferenzveröffentlichung] , (2010)

Bugiel, Sven ; Ekberg, Jan-Erik :
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[ Konferenzveröffentlichung] , (2010)

Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique :
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Lecture Notes in Informatics . Gesellschaft fuer Informatik (GI)
[ Konferenzveröffentlichung] , (2010)

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max :
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.

[Report] , (2010)

Bartsch, Steffen :
A calculus for the qualitative risk assessment of policy override authorization.
SIN: Proceedings of the 3rd international conference on Security of information and networks ACM
[ Konferenzveröffentlichung] , (2010)

Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato :
The uncertainty principle in the presence of quantum memory.
In: Nature Physics
[Artikel] , (2010)

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
Bernstein, Daniel ; Lange, Tanja (eds.) :

Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS (6055). Springer
[ Konferenzveröffentlichung] , (2010)

Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. :
The PUF Promise.
3rd International Conference on Trust and Trustworthy Computing (TRUST 2010) Springer
[ Konferenzveröffentlichung] , (2010)

Bedner, Mark :
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR) S. 339-345.
[Artikel] , (2010)

Buchmann, Johannes ; Wiesmaier, Alexander :
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor (17) S. 21-23.
[Artikel] , (2010)

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique :
Unlinkability of Sanitizable Signatures.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[ Konferenzveröffentlichung] , (2010)

Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan :
Attribute-based Encryption with Break-Glass.
In: Lecture Notes in Computer Science , 6033 . Springer
[ Konferenzveröffentlichung] , (2010)

Bulygin, Stanislav ; Brickenstein, Michael :
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3) S. 185-200.
[Artikel] , (2010)

Bulygin, Stanislav ; Pellikaan, Ruud
Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (eds.) :

Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory. World Scientific , S. 585-622. ISBN 978-981-283-716-5
[Buchkapitel] , (2010)

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira :
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.

[Report] , (2010)

Bartsch, Steffen :
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
SecSE: Fourth International Workshop on Secure Software Engineering IEEE Computer Society
[ Konferenzveröffentlichung] , (2010)

Baier, Harald ; Busch, Christoph
Hochschule Darmstadt (3094) (ed.) :

CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung.
[Buchkapitel] , (2010)

Backs, Christian :
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
TU Darmstadt
[Masterarbeit] , (2010)

Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas :
Optimizing the evaluation of patterns in pointcuts.
[Online-Edition: http://doi.acm.org/10.1145/1941054.1941056]
In: Workshop on Virtual Machines and Intermediate Languages, 17 Oct 2010, Reno, Nevada, USA. Proceedings of the 4th workshop on Virtual Machines and Intermediate Languages ACM , New York, NY, USA
[ Konferenzveröffentlichung] , (2010)

Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert :
Quasi-dyadic CFS signatures.
In: LNCS . Springer
[ Konferenzveröffentlichung] , (2010)

Buchmann, Johannes:
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg , S. 274. ISBN 9783642111853
[Buch] , (2010)

Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter :
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2) 23--32.
[Artikel] , (2010)

Bedner, Mark ; Ackermann, Tobias :
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5) S. 323-328.
[Artikel] , (2010)

Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne :
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010
[ Konferenzveröffentlichung] , (2010)

Breitinger, Frank ; Nickel, Claudia :
User Survey on Phone Security and Usage.
BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures
[ Konferenzveröffentlichung] , (2010)

Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing :
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.

[ Konferenzveröffentlichung] , (2010)

Busch, Christoph ; Hartung, Daniel :
Biometrische Nachrichten-Authentisierung.

[ Konferenzveröffentlichung] , (2010)

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander :
Towards a mobile eCard Client.
13. Kryptotag
[ Konferenzveröffentlichung] , (2010)

Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul :
PUF-Based Authentication Protocols, Revisited.
International Workshop on Information Security Applications (WISA'09)
[ Konferenzveröffentlichung] , (2009)

Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan :
Foundations of Non-Malleable Hash and One-Way Functions.
In: Lecture Notes in Computer Science , 5912 . Springer
[ Konferenzveröffentlichung] , (2009)

Bras-Amoros, Maria ; Bulygin, Stanislav :
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3) S. 561-574.
[Artikel] , (2009)

Bulygin, Stanislav ; Pellikaan, Ruud :
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, Special Issue "Gröbner Ba (Issue 12) S. 1626-1643.
[Artikel] , (2009)

Braun, Johannes :
Nutzung des elektronischen Personalausweises im eCommerce.
TU Darmstadt
[Masterarbeit] , (2009)

Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian :
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
In: 7th ESCAR Embedded Security in Cars Conference, Düsseldorf
[ Konferenzveröffentlichung] , (2009)

Bedner, Mark :
Rechtmäßigkeit der "Deep Packet Inspection".

[Anderes] , (2009)

Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (eds.) :

BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
BIOSIG 2009
[ Konferenzveröffentlichung] , (2009)

Baier, Harald ; Straub, Tobias :
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Tagungsband Informatik 2009 LNI
[ Konferenzveröffentlichung] , (2009)

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten :
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6) S. 831-844.
[Artikel] , (2009)

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten :
PSP : private and secure payment with RFID WPES 2009.
WPES 2009, Workshop on Privacy in the Electronic Society
[ Konferenzveröffentlichung] , (2009)

Busch, Christoph :
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications
[ Konferenzveröffentlichung] , (2009)

Busch, Christoph :
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung S. 132-141.
[Artikel] , (2009)

Busch, Christoph :
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5
[Artikel] , (2009)

Busch, Christoph ; Reimer, Helmut :
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD) (5)
[Artikel] , (2009)

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique :
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Lecture Notes in Informatics . Gesellschaft fuer Informatik (GI)
[ Konferenzveröffentlichung] , (2009)

Buchmann, Johannes ; Roßnagel, Alexander :
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9 S. 543-548.
[Artikel] , (2009)

Baier, Harald ; Karatsiolis, Vangelis :
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI2009 - Sixth European Workshop on Public Key Services, Applications and Infrastructures Springer
[ Konferenzveröffentlichung] , (2009)

Baier, Harald ; Straub, Tobias :
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009 (6th workshop on biometrics and electronic signatures) LNI
[ Konferenzveröffentlichung] , (2009)

Bulygin, Stanislav:
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Südwestdeutscher Verlag für Hochschulschriften ISBN 978-3-8381-0948-0
[Buch] , (2009)

Bender, Jens ; Fischlin, Marc ; Kügler, Dennis :
Security Analysis of the PACE Key-Agreement Protocol.
In: Lecture Notes in Computer Science , 5735 . Springer
[ Konferenzveröffentlichung] , (2009)

Buchmann, Johannes ; Karatsiolis, Vangelis :
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5) S. 378-384.
[Artikel] , (2009)

Bulygin, Stanislav :
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern
[Dissertation]

Biere, Thomas ; Schindler, Werner
Horster, P. ; Schartner, P. (eds.) :

Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
In: D-A-CH Security syssec
[ Konferenzveröffentlichung] , (2009)

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten :
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99
[Artikel] , (2009)

Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi :
Demonstration of first response communication sandbox.
Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
[ Konferenzveröffentlichung] , (2009)

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten :
Supporting Agile Development of Authorization Rules for SME Applications.
TrustCol: 3rd International Workshop on Trusted Collaboration Springer
[ Konferenzveröffentlichung] , (2009)

Bodden, Eric ; Chen, Feng ; Rosu, Grigore :
Dependent advice: A general approach to optimizing history-based aspects.
In: ACM, 2009, AOSD ’09: Proceedings of pages 3–14.
[Artikel] , (2009)

Bulygin, Stanislav ; Pellikaan, Ruud
Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (eds.) :

Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography. Springer , S. 361-365. ISBN 978-3-540-93805-7
[Buchkapitel] , (2009)

Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin :
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
18th Intl. World Wide Web Conference (WWW'09)
[ Konferenzveröffentlichung] , (2009)

Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten :
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1)
[Artikel] , (2009)

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael :
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
[Artikel] , (2009)

Bedner, Mark :
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009 S. 372.
[Artikel] , (2009)

Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut :
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
Proc. of International Conference on Formal Engineering Methods (ICFEM)
[ Konferenzveröffentlichung] , (2009)

Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph :
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5
[Artikel] , (2009)

Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian :
Security of Sanitizable Signatures Revisited.
Public Key Cryptography (PKC 2009)
[ Konferenzveröffentlichung] , (2009)

Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max :
First Response Communication Sandbox.
In: 11th Communications and Networking Simulation Symposium S. 115-122.
[Artikel] , (2008)

Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max :
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.

[Report] , (2008)

Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely :
Incremental Pattern Matching in the VIATRA Model Transformation System.
Proc. of the 3rd International Workshop on Graph and Model Transformation
[ Konferenzveröffentlichung] , (2008)

Brickenstein, Michael ; Bulygin, Stanislav
Faugere, J.-C. ; Wang, D. (eds.) :

Attacking AES via Solving Systems in the Key Variables Only.
First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30
[ Konferenzveröffentlichung] , (2008)

Bartsch, Steffen ; Bormann, Carsten
Horster, Patrick (ed.) :

Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
D.A.CH. Security 2008 syssec Verlag
[ Konferenzveröffentlichung] , (2008)

Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair :
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008
[Artikel] , (2008)

Bodden, Eric ; Havelund, Klaus :
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008) pages 155–165.
[Artikel] , (2008)

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
Buchmann, Johannes ; Ding, Jintai (eds.) :

Merkle Tree Traversal Revisited.
In: LNCS (5299). Springer
[ Konferenzveröffentlichung] , (2008)

Bulygin, Stanislav ; Pellikaan, Ruud :
Decoding error-correcting codes with Groebner bases.
Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25
[ Konferenzveröffentlichung] , (2007)

Backes, Michael ; Basin, David ; Waidner, Michael :
Preface.
In: Journal of Computer Security, 15 (6) S. 561.
[Artikel] , (2007)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12) 1685--1720.
[Artikel] , (2007)

Bulygin, Stanislav :
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10) S. 4664-4669.
[Artikel] , (2006)

Bulygin, Stanislav :
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern
[Masterarbeit] , (2006)

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.

[Norm, Patent, Standard] , (2006)

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael :
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006)
[ Konferenzveröffentlichung] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Non-determinism in multi-party computation.

[Report] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS '06 (European Symposium on Research in Computer Security) Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Formal Methods and Cryptography.
FM 2006: Formal Methods Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Soundness limits of Dolev-Yao models.

[Report] , (2006)

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael :
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.

[Norm, Patent, Standard] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3) 135--154.
[Artikel] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4) 242--252.
[Artikel] , (2005)

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Creating a Privacy Policy From a Process Model and Verifying the Compliance.

[Norm, Patent, Standard] , (2005)

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko :
Trusted Virtual Domains: Secure Foundations for Business and IT Services.

[Report] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.

[Report] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Justifying a Dolev-Yao Model under Active Attacks.
Special Issue of International School of Foundations of Security Analysis and Design (FOSAD) Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2005)

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan :
Privacy-protecting Integrity Attestation of a Computing Platform.

[Norm, Patent, Standard] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Low-Level Ideal Signatures and General Integrity Idealization.
7th Information Security Conference (ISC)
[ Konferenzveröffentlichung] , (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A General Composition Theorem for Secure Reactive Systems.
Theory of Cryptography Conference (TCC) Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2004)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4) 589--617.
[Artikel] , (2004)

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.

[Norm, Patent, Standard] , (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
6th Information Security Conference (ISC) Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
ESORICS 2003 Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library.

[Report] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library with Nested Operations.
10th ACM Conference on Computer and Communications Security
[ Konferenzveröffentlichung] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Security in Business Process Engineering.
Conference on Business Process Management (BPM 2003) Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2003)

Bulygin, Stanislav :
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics (2) S. 24-28.
[Artikel] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Fairness and Liveness.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[ Konferenzveröffentlichung] , (2002)

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael :
Secure Password-based Cipher Suite for TLS.
Symposium on Network and Distributed Systems Security (NDSS '00) CA, Internet Society
[ Konferenzveröffentlichung] , (2000)

Baum-Waidner, Birgit ; Waidner, Michael :
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
27th International Colloquium on Automata, Languages and Programming (ICALP' 2000) Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2000)

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael :
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4) 611--627.
[Artikel] , (2000)

Baum-Waidner, Birgit ; Waidner, Michael :
Optimistic Asynchronous Multi-Party Contract Signing.

[Report] , (1998)

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
iKP -- a family of secure electronic payment protocols.
Proc. First USENIX Workshop on Electronic Commerce
[ Konferenzveröffentlichung] , (1995)

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; de Rooij, Peter ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael :
The ESPRIT Project CAFE - High Security Digital Payment Systems.
The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875, Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (1994)

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael :
A remark on a signature scheme where forgery can be proved.
Eurocrypt '90, LNCS 473 Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (1991)

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael :
Unconditional Byzantine Agreement with Good Majority.
STACS '91, LNCS 480 Springer-Verlag, Heidelberg
[ Konferenzveröffentlichung] , (1991)

C

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes] , (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[ Konferenzveröffentlichung] , (2018)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[ Konferenzveröffentlichung] , (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes] , (2017)

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias :
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: Privacy, Security and Trust Conference IEEE
[ Konferenzveröffentlichung] , (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[ Konferenzveröffentlichung] , (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[ Konferenzveröffentlichung] , (2016)

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le :
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6) S. 749-762.
[Artikel] , (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2015)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2015)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max :
ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems.
IEEE Conference on Communications and Network Security (CNS) IEEE
[ Konferenzveröffentlichung] , (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[ Konferenzveröffentlichung] , (2015)

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas :
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.

[Report] , (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf :
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology . Springer
[ Konferenzveröffentlichung] , (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[ Konferenzveröffentlichung] , (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin :
NoPhish App Evaluation: Lab and Retention Study.
NDSS Workshop on Usable Security 2015 Internet Society
[ Konferenzveröffentlichung] , (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[ Konferenzveröffentlichung] , (2015)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max :
Community-based Collaborative Intrusion Detection.
International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm) Springer International Publishing
[ Konferenzveröffentlichung] , (2015)

Charfi, Ahmed :
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt
[Masterarbeit] , (2014)

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon :
Poster: Password Entering and Transmission Security.

[Anderes] , (2014)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) :

NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science , 8743 . Springer International Publishing
[ Konferenzveröffentlichung] , (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
Analyzing the Effectiveness of DoS Attacks on Tor.
7th International Conference on Security of Information and Networks (SIN 2014)
[ Konferenzveröffentlichung] , (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
A Survey on Tor and I2P.
Ninth International Conference on Internet Monitoring and Protection (ICIMP2014)
[ Konferenzveröffentlichung] , (2014)

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil :
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) S. 1-6.
[Artikel] , (2014)

Classen, Jiska :
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt
[Masterarbeit] , (2014)

Conrad, Bernd :
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt
[Masterarbeit] , (2014)

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza :
A trusted versioning file system for passive mobile storage devices.
J. Network and Computer Applications
[ Konferenzveröffentlichung] , (2014)

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias :
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP) S. 92-107.
[Artikel] , (2014)

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias :
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5) S. 695-707.
[Artikel] , (2013)

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil :
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3) S. 353-371.
[Artikel] , (2013)

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela :
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3) 105–116.
[Artikel] , (2013)

Christin, Delphine ; Büchner, C. ; Leibecke, N. :
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop)
[ Konferenzveröffentlichung] , (2013)

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick :
Provably Secure LWE-Encryption with Uniform Secret.

[Anderes] , (2013)

Christin, Delphine ; Hollick, Matthias
Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (eds.) :

European Data Protection: Coming of Age.
In: nicht bekannt Springer Netherlands , 203–222.
[Buchkapitel] , (2013)

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias :
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN)
[ Konferenzveröffentlichung] , (2013)

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian :
k-anonymous reputation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13 ACM
[ Konferenzveröffentlichung] , (2013)

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. :
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM)
[ Konferenzveröffentlichung] , (2012)

Christin, Delphine ; Büttner, C. ; Repp, Nicolas :
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp)
[ Konferenzveröffentlichung] , (2012)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Véron, Pascal ; Hoffmann, Gerhard :
An improved threshold ring signature scheme based on error correcting codes.
In: WAIFI 2012, LNCS (7369) 45 - 63.
[Artikel] , (2012)

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (eds.) :

Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP). LNCS, 7322. Springer , S. 71-86. ISBN 978-3-642-30954-0
[Buchkapitel] , (2012)

Christin, Delphine ; Bentolila, A. ; Hollick, Matthias :
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU)
[ Konferenzveröffentlichung] , (2012)

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil :
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom)
[ Konferenzveröffentlichung] , (2012)

Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York :
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.

[Report] , (2012)

Cooper, N. ; Reichel, F. ; Werner, V. ; Bettermann, L. ; Alikhani, B. ; Aslanidou, S. ; Bauer, C. ; Coquard, L. ; Fritzsche, M. ; Fritzsche, Y. ; Glorius, J. ; Goddard, P. ; Möller, T. ; Pietralla, N. ; Reese, M. ; Romig, C. ; Savran, D. ; Schnorrenberger, L. ; Siebenhühner, F. ; Simon, V. ; Sonnabend, K. ; Smith, M. ; Walz, C. ; Yates, S. ; Yevetska, O. ; Zweidinger, M. :
Photoresponse of ^{76}Se below 9 MeV.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.034313]
In: Physical Review C, 86 (3) ISSN 0556-2813
[Artikel] , (2012)

Cuong, N. ; Katzenbeisser, Stefan :
Robust Resampling Detection in Digital Images.
Conference on Communications and Multimedia Security (CMS 2012) Springer
[ Konferenzveröffentlichung] , (2012)

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias :
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11) S. 1928-1946.
[Artikel] , (2011)

Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil :
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011)
[ Konferenzveröffentlichung] , (2011)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Recent Progress in Code-Based Cryptography.
In: LNCS (200). Springer
[ Konferenzveröffentlichung] , (2011)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger :
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
[Artikel] , (2011)

Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias :
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU)
[ Konferenzveröffentlichung] , (2011)

Coquard, L. ; Rainovski, G. ; Pietralla, N. ; Ahn, T. ; Bettermann, L. ; Carpenter, M. ; Janssens, R. ; Leske, J. ; Lister, C. ; Möller, O. ; Möller, T. ; Rother, W. ; Werner, V. ; Zhu, S. :
O(6)-symmetry breaking in the γ-soft nucleus ^{126}Xe and its evolution in the light stable xenon isotopes.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.83.044318]
In: Physical Review C, 83 (4) ISSN 0556-2813
[Artikel] , (2011)

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael :
GPU Implementation of the Keccak Hash Function Family.
ISA 2011 - The 5th International Conference on Information Security and Assurance
[ Konferenzveröffentlichung] , (2011)

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael :
GPU Implementation of the Keccak Hash Function Family.
The 5th International Conference on Information Security and Assurance - ISA 2011
[ Konferenzveröffentlichung] , (2011)

Canova, Gamze :
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
TU Darmstadt
[Masterarbeit] , (2011)

Cuong, N. ; Katzenbeisser, Stefan :
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
International Workshop on Digital Forensics and Watermarking (IWDW 2011) Springer
[ Konferenzveröffentlichung] , (2011)

Cuong, N. ; Katzenbeisser, Stefan :
Security of Copy-Move Forgery Detection Techniques.
International Conference on Acoustics, Speech and Signal Processing (ICASSP'11) IEEE Press
[ Konferenzveröffentlichung] , (2011)

Christin, Delphine ; Hollick, Matthias :
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11)
[ Konferenzveröffentlichung] , (2011)

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Reducing access to sensitive information.

[Norm, Patent, Standard] , (2011)

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg :
Improved Zero-knowledge Identification with Lattices.
In: LNCS (6402). Springer
[ Konferenzveröffentlichung] , (2010)

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes :
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS , 6531 . Springer
[ Konferenzveröffentlichung] , (2010)

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel :
Return-Oriented Programming without Returns.
In: CCS '10 . ACM
[ Konferenzveröffentlichung] , (2010)

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias :
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
Proceedings of 9th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Würzburg, Germany
[ Konferenzveröffentlichung] , (2010)

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark :
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010)
[ Konferenzveröffentlichung] , (2010)

Cayrel, Pierre-Louis ; Véron, Pascal ; Alaoui, Sidi Mohamed El Yousfi :
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010)
[ Konferenzveröffentlichung] , (2010)

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg :
A Lattice-Based Threshold Ring Signature Scheme.
In: LNCS (6212). Springer
[ Konferenzveröffentlichung] , (2010)

Cayrel, Pierre-Louis ; Meziani, Mohammed :
Post-Quantum Cryptography: Code-based Signatures.
In: 4th International Conference on Information Security and Assurance ISA 2010 , Lecture Notes in Computer (6059)
[ Konferenzveröffentlichung] , (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 S. 289-298.
[Artikel] , (2010)

Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias :
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2 S. 96-125.
[Artikel] , (2010)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi :
Dual Construction of Stern-based Signature Schemes.
In: International Conference on Cryptography, Coding and Information Security ICCCIS 2010 , 63 March 2010
[ Konferenzveröffentlichung] , (2010)

Cayrel, Pierre-Louis ; Strenzke, Falko :
Side channels attacks in code-based cryptography.
In: International Workshop on Constructive Side-Channel Analysis and Secure Design COSADE 2010
[ Konferenzveröffentlichung] , (2010)

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
Furht, Borko (ed.) :

Handbook of Social Network Technologies and Applications.
In: nicht bekannt Springer
[Buchkapitel] , (2010)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
Proceedings of the 6th International IFIP AICT 320 Summer School
[ Konferenzveröffentlichung] , (2010)

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
International Conference on Trusted Systems (INTRUST) Springer
[ Konferenzveröffentlichung] , (2009)

Charnes, Christopher
Atallah, Mikhail ; Blanton, Marina (eds.) :

Algorithms and Theory of Computation Handbook.
In: nicht bekannt Chapman & Hall/CRC Applied Algorithms and Data Structures series, 2. ISBN 978-1-58488-820-8
[Buchkapitel] , (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Leveraging social links for trust and privacy in networks.
INetSec 2009 Open Research Problems in Network Security
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Privacy preserving social networking through decentralization.
WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services
[ Konferenzveröffentlichung] , (2009)

Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira :
A Plugin-Architecture for Self-Adaptive WS Compositions.
Proceedings of the IEEE 7th International Conference on Web Services (ICWS 2009) IEEE
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Leveraging Social Links for Trust and Privacy in Networks.
INetSec, Open Research Problems in Network Security
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Privacy Preserving Social Networking Through Decentralization.
6th International Conference on Wireless On-demand Network Systems and Services (WONS)
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications
[ Konferenzveröffentlichung] , (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12) 94 -- 101.
[Artikel] , (2009)

Camenisch, Jan ; Waidner, Michael :
Minimizing information gathered by access decision engines in access control systems.

[Norm, Patent, Standard] , (2004)

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael :
Anonymous Access to a Service.

[Norm, Patent, Standard] , (2003)

Camenisch, Jan ; Waidner, Michael :
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
[Artikel] , (2001)

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd :
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.

[Report] , (1995)

D

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel :
Perun: Virtual Payment Hubs over Cryptocurrencies.
[Online-Edition: https://www.ieee-security.org/TC/SP2018/]
In: 39th IEEE Symposium on Security and Privacy, MAY 21-23, 2018, THE HYATT REGENCY, SAN FRANCISCO, CA. IEEE Computer Society
[ Konferenzveröffentlichung] , (2019)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
[Online-Edition: http://fps2018.encs.concordia.ca/]
In: The 11th International Symposium on Foundations & Practice of Security (FPS), 13, 14 and 15 November 2018, Montreal, Canada. In: LNCS . Springer
[ Konferenzveröffentlichung] , (2018) ((Noch) nicht publiziert)

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian :
FairSwap: How to fairly exchange digital goods.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[ Konferenzveröffentlichung] , (2018)

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina :
General State Channel Networks.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[ Konferenzveröffentlichung] , (2018)

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil :
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies IEEE
[ Konferenzveröffentlichung] , (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs) S. 159-178.
[Artikel] , (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[ Konferenzveröffentlichung] , (2018)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[ Konferenzveröffentlichung] , (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[ Konferenzveröffentlichung] , (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[ Konferenzveröffentlichung] , (2017)

Deckwerth, Frederik :
Static Verification Techniques for Attributed Graph Transformations.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6150]
Technische Universität , Darmstadt
[Dissertation], (2016)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[ Konferenzveröffentlichung] , (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2016)

Dix, Isabella :
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt
[Masterarbeit] , (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[ Konferenzveröffentlichung] , (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 S. 42-53. ISSN 0140-3664
[Artikel] , (2016)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch] , (2015)

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian :
Learning With Errors in the Exponent.
In: LNCS . Springer
[ Konferenzveröffentlichung] , (2015)

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin :
Toward a Just-in-Time Static Analysis.
In:
[Artikel] , (2015)

Demirel, Denise ; Lancrenon, Jean :
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.

[Report] , (2015)

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis :
A View on Privacy & Trust in IoT.
In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK. IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security) IEEE
[ Konferenzveröffentlichung] , (2015)

Dogan, Ferit :
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt
[Masterarbeit] , (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[ Konferenzveröffentlichung] , (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2015)

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
Financial Cryptography and Data Security
[ Konferenzveröffentlichung] , (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[ Konferenzveröffentlichung] , (2014)

Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max :
Twitterize: Anonymous Micro-Blogging.
In: International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA). Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), International Workshop on Internet of Things, Systems, Management and Security (IOTSMS) IEEE Computer Society
[ Konferenzveröffentlichung] , (2014)

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung :
The Cubic Simple Matrix Encryption Scheme.
In: LNCS (8772). Springer
[ Konferenzveröffentlichung] , (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS (9024). Springer
[ Konferenzveröffentlichung] , (2014)

Dagdelen, Özgür ; El Bansarkhani, Rachid ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter :
High-speed signatures from standard lattices.
Latincrypt 2014
[ Konferenzveröffentlichung] , (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[ Konferenzveröffentlichung] , (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[ Konferenzveröffentlichung] , (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[ Konferenzveröffentlichung] , (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel] , (2014)

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[ Konferenzveröffentlichung] , (2014)

do Carmo, Rodrigo ; Hollick, Matthias :
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014) IEEE/IFIP
[ Konferenzveröffentlichung] , (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.

[Report] , (2014)

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
FC'2014: Financial Cryptography and Data Security Conference
[ Konferenzveröffentlichung] , (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[ Konferenzveröffentlichung] , (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Second Look at Fischlin’s Transformation.
Africacrypt 2014
[ Konferenzveröffentlichung] , (2014)

Dagdelen, Özgür ; Fischlin, Marc :
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
ISIT 2014 - IEEE International Symposium on Information Theory
[ Konferenzveröffentlichung] , (2014)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: LNCS . Springer
[ Konferenzveröffentlichung] , (2013)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive
[Artikel] , (2013)

Demmler, Daniel :
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt
[Masterarbeit] , (2013)

Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (eds.) :

Distributed and Anonymous Publish-Subscribe.
The 7th International Conference on Network and System Security (NSS 2013) Springer
[ Konferenzveröffentlichung] , (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[ Konferenzveröffentlichung] , (2013)

do Carmo, Rodrigo ; Hollick, Matthias :
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
[Artikel] , (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
[Artikel] , (2013)

Demirel, Denise ; Henning, Maria ; van de Graaf, Jeroen ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) :

Prêt à Voter Providing Everlasting Privacy.
In: LNCS (7985). Springer
[ Konferenzveröffentlichung] , (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in the Quantum World.
ASIACRYPT 2013
[ Konferenzveröffentlichung] , (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: LNCS . Springer
[ Konferenzveröffentlichung] , (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[ Konferenzveröffentlichung] , (2012)

do Carmo, R. ; Werner, M. ; Hollick, Matthias :
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet)
[ Konferenzveröffentlichung] , (2012)

Demirel, Denise ; Henning, Maria :
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
[Online-Edition: https://jusletter-it.weblaw.ch/redaktion.html]
In: Jusletter IT - Die Zeitschrift für IT und Recht
[Artikel] , (2012)

Demirel, Denise ; van de Graaf, Jeroen ; Araújo, Roberto :
Improving Helios with Everlasting Privacy Towards the Public.
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[ Konferenzveröffentlichung] , (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[ Konferenzveröffentlichung] , (2012)

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[ Konferenzveröffentlichung] , (2012)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18 S. 1-14.
[Artikel] , (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[ Konferenzveröffentlichung] , (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
19th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[ Konferenzveröffentlichung] , (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
POSTER: Control-Flow Integrity for Smartphones.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[ Konferenzveröffentlichung] , (2011)

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie :
Feasibility Analysis of Pret a Voter for German Federal Elections.
3rd international conference on e-voting and identity (VoteID 2011) Springer
[ Konferenzveröffentlichung] , (2011)

Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie :
Readiness of various eVoting systems for complex elections.

[Report] , (2011)

Demmler, Daniel :
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt
[Bachelorarbeit] , (2011)

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J ; Noella, Edelmann (eds.) :

Voting software to support election preparation, counting, and tallying.
CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government Edition Donau-Universität Krems
[ Konferenzveröffentlichung] , (2011)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
[ Konferenzveröffentlichung] , (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics
[ Konferenzveröffentlichung] , (2011)

Danchev, M. ; Rainovski, G. ; Pietralla, N. ; Gargano, A. ; Covello, A. ; Baktash, C. ; Beene, J. ; Bingham, C. ; Galindo-Uribarri, A. ; Gladnishki, K. ; Gross, C. ; Ponomarev, V. ; Radford, D. ; Riedinger, L. ; Scheck, M. ; Stuchbery, A. ; Wambach, J. ; Yu, C.-H. ; Zamfir, N. :
One-phonon isovector 2_{1,MS}^{+} state in the neutron-rich nucleus ^{132}Te.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.84.061306]
In: Physical Review C, 84 (6) ISSN 0556-2813
[Artikel] , (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED). Leuven, Belgium
[Buchkapitel] , (2011)

Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie :
Vertrauensbildung bei Internetwahlen.
Digma - Zeitschrift für Datenrecht und Informationssicherheit
[ Konferenzveröffentlichung] , (2011)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Trust-based Content Distribution for Mobile Ad Hoc Networks.
19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2011) [to appear]
[ Konferenzveröffentlichung] , (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
Biomedical Engineering Systems and Technologies
[ Konferenzveröffentlichung] , (2011)

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Secure Computations on Real-Valued Signals.
IEEE Workshop on Information Forensics and Security (WIFS'10) IEEE Press
[ Konferenzveröffentlichung] , (2010)

Dagdelen, Özgür ; Fischlin, Marc :
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science . Springer
[ Konferenzveröffentlichung] , (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Privilege Escalation Attacks on Android.
ISC 2010: Proceedings of the 13th Information Security Conference
[ Konferenzveröffentlichung] , (2010)

Demirel, Denise :
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
TU Darmstadt
[Masterarbeit] , (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.

[Report] , (2010)

Dagdelen, Özgür ; Schneider, Michael :
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS , 6272 . Springer
[ Konferenzveröffentlichung] , (2010)

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[ Konferenzveröffentlichung] , (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.

[Report] , (2010)

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Towards Secure Bioinformatics Services.
Financial Cryptography and Data Security (FC2011)
[ Konferenzveröffentlichung] , (2010)

Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
Furht, Borko (ed.) :

Handbook of Social Network Technologies and Applications.
In: nicht bekannt Springer
[Buchkapitel] , (2010)

Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph :
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
[ Konferenzveröffentlichung] , (2010)

Dahmen, Erik ; Krauß, Christoph
Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (eds.) :

Short Hash-Based Signatures for Wireless Sensor Networks.
In: LNCS (5888). Springer
[ Konferenzveröffentlichung] , (2009)

Deußer, Clemens ; Reubold, Jan :
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt
[Masterarbeit] , (2009)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09 . ACM
[ Konferenzveröffentlichung] , (2009)

Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj :
Efficient Robust Storage Using Secret Tokens.
11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
[ Konferenzveröffentlichung] , (2009)

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Buchmann, Johannes ; Ding, Jintai (eds.) :

Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS (5299). Springer
[ Konferenzveröffentlichung] , (2008)

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
Horster, Patrick (ed.) :

Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
D.A.CH. Security 2008 syssec Verlag
[ Konferenzveröffentlichung] , (2008)

E

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira :
Lattice Based Modularization of Static Analyses.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509]
In: SOAP 2018, Amsterdam, Netherlands. Companion Proceedings for the ISSTA/ECOOP 2018 Workshops ACM
[ Konferenzveröffentlichung] , (2018)

Erbenich, Vanessa :
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt
[Masterarbeit] , (2016)

Engel, Andreas :
A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-Intensive Distributed Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5778]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2015)

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes :
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015 Springer
[ Konferenzveröffentlichung] , (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes :
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive S. 20.
[Artikel] , (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) :

Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS (8469). Springer
[ Konferenzveröffentlichung] , (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes :
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
IACR Cryptology ePrint Archive 2014: 334
[ Konferenzveröffentlichung] , (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS (8282).
[ Konferenzveröffentlichung] , (2013)

Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya :
Ethical Considerations When Employing Fake Identities for Research in OSN.
In:
[Artikel] , (2013)

Egert, Rolf :
Lattice-based Signatures.
TU Darmstadt
[Masterarbeit] , (2013)

El Bansarkhani, Rachid ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael :
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53 S. 81-102.
[Artikel] , (2012)

Engels, Heinrich-Alexander :
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt
[Masterarbeit] , (2012)

Enders, J.
Oberstedt, S. (ed.) :

Reactions induced by real photons for nuclear structure and nuclear astrophysics.
In: Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011). In: Physics Procedia , 31 Elsevier Science BV , Amsterdam
[ Konferenzveröffentlichung] , (2012)

Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Göök, A. ; von Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S.
Oberstedt, S. (ed.) :

Development of an active ²³⁸UF₆ gas target.
In: Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011). In: Physics Procedia , 31 Elsevier Science BV , Amsterdam
[ Konferenzveröffentlichung] , (2012)

Endres, J. ; Savran, D. ; Butler, P. ; Harakeh, M. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Litvinova, E. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Schlüter, F. ; Sonnabend, K. ; Stoica, V. ; Wörtche, H. ; Zilges, A. :
Structure of the pygmy dipole resonance in ^{124}Sn.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.85.064331]
In: Physical Review C, 85 (6) ISSN 0556-2813
[Artikel] , (2012)

El Bansarkhani, Rachid ; Meziani, Mohammed :
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS . Springer
[ Konferenzveröffentlichung] , (2012)

Eichberg, Michael ; Sewe, Andreas :
Encoding the Java Virtual Machine's Instruction Set.
[Online-Edition: http://dx.doi.org/10.1016/j.entcs.2011.02.004]
In: Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010), 27 Mar 2010, Paphos, Cyprus. In: Electronic Notes in Theoretical Computer Science , 264 (4)
[ Konferenzveröffentlichung] , (2011)

Enders, J. ; Litvinova, E. ; Savran, D. ; Butler, P. A. ; Harakeh, M. N. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Sonnabend, K. ; Stoica, V. I. ; Wörtche, H. J. ; Zilges, A. :
Isospin Character of the Pygmy Dipole Resonance in 124Sn.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevLett.105.212503]
In: Physical Review Letters, 105 (21) S. 212503. ISSN 0031-9007
[Artikel] , (2010)

Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel :
History-Free Aggregate Message Authentication Codes.
In: Lecture Notes in Computer Science . Springer
[ Konferenzveröffentlichung] , (2010)

Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (eds.) :

A Task-based Messaging Approach To Facilitate Staff Work.
Proceedings of the 7th International Conference on Information Systems for Crisis Response and Management. International Conference on Information Systems for Crisis Response and Management (ISCRAM-2010)
[ Konferenzveröffentlichung] , (2010)

Ekberg, Jan-Erik ; Bugiel, Sven :
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
4th Annual Workshop on Scalable Trusted Computing (STC2009)
[ Konferenzveröffentlichung] , (2009)

Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas :
Privacy-Preserving Face Recognition.
Privacy Enhancing Technologies Symposium (PETS 2009)
[ Konferenzveröffentlichung] , (2009)

Eu, Joy Boy Joy :
Specification of Dependable Trusted Third Parties.

[Report] , (2001)

F

Franke, Fabian :
Learning the Beams.
TU Darmstadt
[Masterarbeit] , (2018)

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES) ACM
[ Konferenzveröffentlichung] , (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP S. 1.
[Artikel] , (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[ Konferenzveröffentlichung] , (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017 , München
[ Konferenzveröffentlichung] , (2017)

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat :
Consumer oriented privacy preserving access control for electronic health records in the cloud.
IEEE cloud
[ Konferenzveröffentlichung] , (2016)

Falzon, Kevin ; Bodden, Eric
Lopez, Javier ; Mitchell, Chris J. (eds.) :

Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Information Security Conference, Trondheim. In: Lecture Notes in Computer Science , 9290 .
[ Konferenzveröffentlichung] , (2015)

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max :
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), poster proceedings IEEE
[ Konferenzveröffentlichung] , (2015)

Follner, Andreas ; Bodden, Eric :
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.

[Report] , (2015)

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) :

Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government Münster: Edition Donau-Universität Krems
[ Konferenzveröffentlichung] , (2014)

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[ Konferenzveröffentlichung] , (2014)

Franke, Daniel :
Risk Simulations for the Web PKI.
TU Darmstadt
[Masterarbeit] , (2014)

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut :
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Compiler Construction (CC)2014, Lecture Notes in Computer Science
[ Konferenzveröffentlichung] , (2014)

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof :
Robust Multi-Property Combiners for Hash Functions.
J. Cryptology
[ Konferenzveröffentlichung] , (2014)

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul :
Distributed Finite-State Runtime Monitoring with Aggregated Events.
In: Runtime Verification 2013 (RV'13), LNCS
[Artikel] , (2013)

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Highly Precise Taint Analysis for Android Applications.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report] , (2013)

Funke, Sebastian :
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
[Masterarbeit] , (2013)

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. :
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3) S. 117-128.
[Artikel] , (2013)

Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj :
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS)
[ Konferenzveröffentlichung] , (2013)

Fontein, Felix ; Schneider, Michael ; Wagner, Urs :
A Polynomial Time Version of LLL With Deep Insertions.
International Workshop on Coding and Cryptography - WCC 2013
[ Konferenzveröffentlichung] , (2013)

Fischlin, Marc ; Onete, Cristina :
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: LNCS . Springer
[ Konferenzveröffentlichung] , (2013)

Falzon, Kevin ; Pace, Gordon J.
Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (eds.) :

Combining Testing and Runtime Verification.
[Online-Edition: http://www.di.uminho.pt/mompes]
In: 8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, September 04, 2012, Essen, Germany.
[ Konferenzveröffentlichung] , (2012)

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian :
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
[ Konferenzveröffentlichung] , (2012)

Faber, Natalie :
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt
[Masterarbeit] , (2012)

Fuhrmann, Tino :
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt
[Masterarbeit] , (2012)

Filtschew, Konstantin :
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt
[Masterarbeit] , (2012)

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian :
Curve-based Planar Graph Routing in Multihop Wireless Networks.
8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
[ Konferenzveröffentlichung] , (2011)

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie :
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11) IEEE
[ Konferenzveröffentlichung] , (2011)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011)
[ Konferenzveröffentlichung] , (2011)

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie :
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy S. 14.
[Artikel] , (2011)

Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin :
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2011)
[ Konferenzveröffentlichung] , (2011)

Franz, M. ; Katzenbeisser, Stefan :
Processing Encrypted Floating Point Signals.
Workshop on Multimedia and Security (MMSEC'11) ACM Press
[ Konferenzveröffentlichung] , (2011)

Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas :
Oblivious Outsourced Storage with Delegation.
Financial Cryptography and Data Security (FC 2011) Springer
[ Konferenzveröffentlichung] , (2011)

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael :
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1) 5--7.
[Artikel] , (2011)

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael :
Online Privacy: Towards Informational Self-Determination on the Internet.
Dagstuhl Perspectives Workshop 11061 Dagstuhl Reports
[ Konferenzveröffentlichung] , (2011)

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael :
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2) 1--15.
[Artikel] , (2011)

Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano :
Random Oracles With(out) Programmability.
In: Lecture Notes in Computer Science . Springer
[ Konferenzveröffentlichung] , (2010)

Feller, Thomas ; Demirezen, Aziz :
Hardware Trojans: Data Leakage Using General Purpose LEDs.

[Report] , (2010)

Fischlin, Marc ; Schröder, Dominique :
On the Impossibility of Three-Move Blind Signature Schemes.
In: Lecture Notes in Computer Science , 6110 . Springer-Verlag
[ Konferenzveröffentlichung] , (2010)

Fischlin, Marc ; Lehmann, Anja :
Hash Function Combiners in SSL and TLS.
In: Lecture Notes in Computer Science . Springer-Verlag
[ Konferenzveröffentlichung] , (2010)

Fischlin, Marc ; Lehmann, Anja :
Delayed-Key Message Authentication for Streams.
In: Lecture Notes in Computer Science . Springer-Verlag
[ Konferenzveröffentlichung] , (2010)

Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto :
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
Proceeding of the Seventh IASTED International Conference on Signal Processing, Pattern Recognition and Applications (SPPRA 2010), Innsbruck, Austria ACTA Press
[ Konferenzveröffentlichung] , (2010)

Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
Clavier, C. ; Gaj, K. (eds.) :

A New Side-Channel Attack on RSA Prime Generation.
In: Cryptographic Hardware and Embedded Systems, CHES 2009 Springer
[ Konferenzveröffentlichung] , (2009)

Freiling, Felix ; Heinson, Dennis :
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9) S. 547-552.
[Artikel] , (2009)

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications IEEE
[ Konferenzveröffentlichung] , (2009)

Fischlin, Marc:
RSA Cryptographers' Track. Lecture Notes in Computer Science.
Springer
[Buch] , (2009)

Fischlin, Marc ; Schröder, Dominique :
Security of Blind Signatures under Aborts.
Public Key Cryptography (PKC 2009)
[ Konferenzveröffentlichung] , (2009)

Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia :
Measuring Unlinkability Revisited.
In: ACM Workshop on Privacy in the Electronic Society (WPES 2008) ACM
[ Konferenzveröffentlichung] , (2008)

Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas :
Designing Context-Aware HCI for Collaborative Emergency Management.
Int'l Workshop on HCI for Emergencies in conjunction with CHI 2008 (electronic proceedings)
[ Konferenzveröffentlichung] , (2008)

Field, Simon ; Waidner, Michael :
Electronic Commerce.
In: Computer Networks, 32 (6) 667--668.
[Artikel] , (2000)

G

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
[Artikel] , (2018)

Günther, Daniel :
Private Function Evaluation with Universal Circuits.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2018)

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael :
Path MTU Discovery Considered Harmful.
[Online-Edition: http://icdcs2018.ocg.at]
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, 2.-5.7.2018, Vienna, Austria.
[ Konferenzveröffentlichung] , (2018)

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , S. 83-98.
[Buchkapitel] , (2018)

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[ Konferenzveröffentlichung] , (2018)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[ Konferenzveröffentlichung] , (2017)

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval :
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
[Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...]
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA , Athens, Greece
[ Konferenzveröffentlichung] , (2017)

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) :

Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[ Konferenzveröffentlichung] , (2017)

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen :
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017 , 10292 Springer, Cham
[ Konferenzveröffentlichung] , (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit] , (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colonies for Efficient and Anonymous Group Communication Systems.
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958]
2017 International Conference on Networked Systems (NetSys) IEEE , Göttingen, Germany
[ Konferenzveröffentlichung] , (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
[Online-Edition: https://ieeexplore.ieee.org/document/7983129]
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) IEEE , Las Vegas, NV, USA
[ Konferenzveröffentlichung] , (2017)

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina :
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing Springer Fachmedien Wiesbaden
[ Konferenzveröffentlichung] , (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[ Konferenzveröffentlichung] , (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[ Konferenzveröffentlichung] , (2017)

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) S. 8-26.
[Artikel] , (2016)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[ Konferenzveröffentlichung] , (2016)

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim :
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[ Konferenzveröffentlichung] , (2016)

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen :
Memorable And Secure: How Do You Choose Your PIN?
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[ Konferenzveröffentlichung] , (2016)

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[ Konferenzveröffentlichung] , (2016)

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj :
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
[ Konferenzveröffentlichung] , (2015)

Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil :
A Survey of Technologies for the Internet of Things.
International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop IEEE
[ Konferenzveröffentlichung] , (2015)

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael :
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken .
[ Konferenzveröffentlichung] , (2015)

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[ Konferenzveröffentlichung] , (2015)

Ghiglieri, Marco ; Müller, Jan :
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
14. Deutscher IT-Sicherheitskongress
[ Konferenzveröffentlichung] , (2015)

Ghiglieri, Marco ; Oswald, Florian :
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
14. Deutscher IT-Sicherheitskongress
[ Konferenzveröffentlichung] , (2015)

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen :
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1) S. 16-21.
[Artikel] , (2015)

Gerber, Paul ; Volkamer, Melanie :
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2/2015 108 - 113.
[Artikel] , (2015)

Ghiglieri, Marco :
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
IEEE CCNC
[ Konferenzveröffentlichung] , (2015)

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin :
Lattice Basis Reduction Attack against Physically Unclonable Functions.
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[ Konferenzveröffentlichung] , (2015)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Codes, Cryptology and Information Security Springer
[ Konferenzveröffentlichung] , (2015)

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV – aktueller Stand 2014.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[ Konferenzveröffentlichung] , (2014)

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) :

Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS (8895). Springer
[ Konferenzveröffentlichung] , (2014)

Ghiglieri, Marco :
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.

[Anderes] , (2014)

Ghiglieri, Marco :
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.

[Report] , (2014)

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael :
Personal DLP for Facebook.
In: 6 . IEEE
[ Konferenzveröffentlichung] , (2014)

Ghiglieri, Marco ; Tews, Erik :
A Privacy Protection System for HbbTV in Smart TVs.
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) IEEE
[ Konferenzveröffentlichung] , (2014)

Günther, Felix ; Manulis, Mark ; Peter, Andreas :
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptology ePrint Archive 2014
[ Konferenzveröffentlichung] , (2014)

Gutmann, Andreas ; Matsuura, Kanta :
The use of linguistics in cryptography and its application to improve the HB protocol.

[Anderes] , (2013)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[ Konferenzveröffentlichung] , (2013)

Gleser, Michael :
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt
[Masterarbeit] , (2013)

Geihs, Matthias :
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt
[Masterarbeit] , (2013)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik :
HbbTV - I Know What You Are Watching.
13. Deutschen IT-Sicherheitskongresses SecuMedia Verlags-GmbH
[ Konferenzveröffentlichung] , (2013)

Grimm, Marco ; Anderl, Reiner :
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Procedia Computer Science (16). Elsevier
[ Konferenzveröffentlichung] , (2013)

Guo, Sheng :
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.

[Report] , (2013)

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David :
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
13. Deutschen IT-Sicherheitskongress SecuMedia Verlags-GmbH
[ Konferenzveröffentlichung] , (2013)

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias :
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5) S. 631-645.
[Artikel] , (2012)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[ Konferenzveröffentlichung] , (2012)

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias :
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
[ Konferenzveröffentlichung] , (2012)

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael :
Technical Aspects of Online Privacy.

[Report] , (2012)

Göök, A. ; Eckardt, C. ; Enders, J. ; Freudenberger, M. ; von Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S. ; Richter, A.
Oberstedt, S. (ed.) :

Fragment properties from fission of actinide nuclei induced by 6-10 MeV bremsstrahlung.
In: Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011). In: Physics Procedia , 31 Elsevier Science BV , Amsterdam
[ Konferenzveröffentlichung] , (2012)

Grieser, M. ; Litvinov, Yu. A. ; Raabe, R. ; Blaum, K. ; Blumenfeld, Y. ; Butler, P. A. ; Wenander, F. ; Woods, P. J. ; Aliotta, M. ; Andreyev, A. ; Artemyev, A. ; Atanasov, D. ; Aumann, T. ; Balabanski, D. ; Barzakh, A. ; Batist, L. ; Bernardes, A.-P. ; Bernhardt, D. ; Billowes, J. ; Bishop, S. ; Borge, M. ; Borzov, I. ; Bosch, F. ; Boston, A. J. ; Brandau, C. ; Catford, W. ; Catherall, R. ; Cederkäll, J. ; Cullen, D. ; Davinson, T. ; Dillmann, I. ; Dimopoulou, C. ; Dracoulis, G. ; Düllmann, Ch. E. ; Egelhof, P. ; Estrade, A. ; Fischer, D. ; Flanagan, K. ; Fraile, L. ; Fraser, M. A. ; Freeman, S. J. ; Geissel, H. ; Gerl, J. ; Greenlees, P. ; Grisenti, R. E. ; Habs, D. ; Hahn, R. ; Hagmann, S. ; Hausmann, M. ; He, J. J. ; Heil, M. ; Huyse, M. ; Jenkins, D. ; Jokinen, A. ; Jonson, B. ; Joss, D. T. ; Kadi, Y. ; Kalantar-Nayestanaki, N. ; Kay, B. P. ; Kiselev, O. ; Kluge, H.-J. ; Kowalska, M. ; Kozhuharov, C. ; Kreim, S. ; Kröll, T. ; Kurcewicz, J. ; Labiche, M. ; Lemmon, R. C. ; Lestinsky, M. ; Lotay, G. ; Ma, X. W. ; Marta, M. ; Meng, J. ; Mücher, D. ; Mukha, I. ; Müller, A. ; Murphy, A. St. J. ; Neyens, G. ; Nilsson, T. ; Nociforo, C. ; Nörtershäuser, W. ; Page, R. D. ; Pasini, M. ; Petridis, N. ; Pietralla, N. ; Pfützner, M. ; Podolyák, Z. ; Regan, P. ; Reed, M. W. ; Reifarth, R. ; Reiter, P. ; Repnow, R. ; Riisager, K. ; Rubio, B. ; Sanjari, M. S. ; Savin, D. W. ; Scheidenberger, C. ; Schippers, S. ; Schneider, D. ; Schuch, R. ; Schwalm, D. ; Schweikhard, L. ; Shubina, D. ; Siesling, E. ; Simon, H. ; Simpson, J. ; Smith, J. ; Sonnabend, K. ; Steck, M. ; Stora, T. ; Stöhlker, T. ; Sun, B. ; Surzhykov, A. ; Suzaki, F. ; Tarasov, O. ; Trotsenko, S. ; Tu, X. L. ; Duppen, P. ; Volpe, C. ; Voulot, D. ; Walker, P. M. ; Wildner, E. ; Winckler, N. ; Winters, D. F. A. ; Wolf, A. ; Xu, H. S. ; Yakushev, A. ; Yamaguchi, T. ; Yuan, Y. J. ; Zhang, Y. H. ; Zuber, K. :
Storage ring at HIE-ISOLDE.
[Online-Edition: http://dx.doi.org/10.1140/epjst/e2012-01599-9]
In: The European Physical Journal Special Topics, 207 (1) S. 1. ISSN 1951-6355
[Artikel] , (2012)

Göttert, Norman :
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt
[Masterarbeit] , (2012)

Glorius, J. ; Knörzer, M. ; Müller, S. ; Pietralla, N. ; Sauerwein, A. ; Sonnabend, K. ; Wälzlein, C. ; Wiescher, M. :
p-process nucleosynthesis: Activation experiments.
[Online-Edition: http://dx.doi.org/10.1016/j.ppnp.2011.01.038]
In: Progress in Particle and Nuclear Physics, 66 (2) S. 379. ISSN 01466410
[Artikel] , (2011)

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten :
Key Management in Distributed Online Social Networks.
Proceedings of WoWMoM/DSPAN
[ Konferenzveröffentlichung] , (2011)

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten :
Cryptographic Treatment of Private User Profiles.
15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS
[ Konferenzveröffentlichung] , (2011)

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara :
Service Automata for Secure Distributed Systems.

[Anderes] , (2010)

Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. :
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
Proceedings of IEEE LCN 2010
[ Konferenzveröffentlichung] , (2010)

Geibig, Joanna ; Bradler, Dirk :
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10)
[Artikel] , (2010)

Gladnishki, K. A. ; Rainovski, G. ; Petkov, P. ; Jolie, J. ; Pietralla, N. ; Blazhev, A. ; Damyanova, A. ; Danchev, M. ; Dewald, A. ; Fransen, C. ; Hackstein, M. ; Karagyozov, D. ; Möller, O. ; Pissulla, T. ; Reese, M. ; Rother, W. ; Topchiyska, R. :
Search for one-phonon mixed-symmetry states in the radioactive nucleus 140Nd.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.82.037302]
In: Physical Review C, 82 (3) 037302. ISSN 0556-2813
[Artikel] , (2010)

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique :
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science , 6055 . Springer
[ Konferenzveröffentlichung] , (2010)

Gharadaghy, Rojan :
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
TU Darmstadt
[Masterarbeit] , (2010)

Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj :
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
Proc. International Symposium on Architecting Critical Systems (ISARCS)
[ Konferenzveröffentlichung] , (2010)

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (eds.) :

A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI , 167 .
[ Konferenzveröffentlichung] , (2010)

Gharadaghy, Rojan ; Volkamer, Melanie :
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI (167).
[ Konferenzveröffentlichung] , (2010)

Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf :
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
Proceedings of IFIP Wireless Days 2009
[ Konferenzveröffentlichung] , (2009)

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
4th ACM Workshop on Scalable Trusted Computing
[ Konferenzveröffentlichung] , (2009)

Gebhardt, Max ; Illies, Georg ; Schindler, Werner :
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI SecuMedia
[ Konferenzveröffentlichung] , (2009)

Ghiglieri, Marco ; Fürnkranz, Johannes :
Learning To Recognize Missing E-mail Attachments.

[Report] , (2009)

Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj :
Threat Modeling and Dynamic Profiling.
In: nicht bekannt Annals of Emerging Research in Information Assurance, Security and Privacy Services. Elsevier
[Buchkapitel] , (2009)

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel :
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI , 1 (133).
[ Konferenzveröffentlichung] , (2008)

Grimm, Rüdiger ; Volkamer, Melanie
Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (eds.) :

Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
GI Jahrestagung
[ Konferenzveröffentlichung] , (2008)

Grimm, Rüdiger ; Volkamer, Melanie :
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI , 131 . Gesellschaft für Informatik
[ Konferenzveröffentlichung] , (2008)

Gebhardt, Max ; Illies, Georg ; Schindler, Werner
Alkassar, A. ; Siekmann, J. (eds.) :

On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
In: Lecture Notes in Informatics (P-128). Köllen
[ Konferenzveröffentlichung] , (2008)

Gebhardt, Max ; Illies, Georg ; Schindler, Werner :
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.

[Anderes] , (2008)

Grimm, Rüdiger ; Volkamer, Melanie
Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (eds.) :

Trust Models for Remote Electronic Voting.
Electronic Government 7th International Conference EGOV 2008
[ Konferenzveröffentlichung] , (2008)

Grimm, Rüdiger ; Volkamer, Melanie :
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.

[Report] , (2007)

Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (ed.) :

Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI , 86 .
[ Konferenzveröffentlichung] , (2006)

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
Krimmer, Robert (ed.)
LNI, GI (eds.) :

Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006. Gesellschaft für Informatik, Bonn , S. 203-212. ISBN 978-3-88579-180-5
[Buchkapitel] , (2006)

H

Hartwig, Katrin ; Reuter, Christian :
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany. Siegen, Germany
[ Konferenzveröffentlichung] , (2019)

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira :
A unified lattice model and framework for purity analyses.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226]
In: ASE 2018, 3.-7.9.2018, Corum, Montpellier, France. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering ACM
[ Konferenzveröffentlichung] , (2018)

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[ Konferenzveröffentlichung] , (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit] , (2018)

Heuss, Oliver :
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7337]
Technische Universität , Darmstadt
[Dissertation], (2017)

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[ Konferenzveröffentlichung] , (2017)

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich :
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.

[Report] , (2017)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit] , (2016)

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes :
Password Requirements Markup Language.
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[ Konferenzveröffentlichung] , (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.

[Report] , (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[ Konferenzveröffentlichung] , (2016)

Heuser, Stephan :
Towards Modular and Flexible Access Control on Smart Mobile Devices.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Halvani, Oren ; Winter, Christian ; Pflug, Anika :
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement) S33–S43.
[Artikel] , (2016)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[ Konferenzveröffentlichung] , (2015)

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes :
PALPAS - PAsswordLess PAssword Synchronization.
International Conference on Availability, Reliability and Security (ARES)
[ Konferenzveröffentlichung] , (2015)

Halvani, Oren ; Winter, Christian
Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (eds.) :

A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
In: CEUR Workshop Proceedings , Vol-1391 . Sun SITE Central Europe
[ Konferenzveröffentlichung] , (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier S. 463-493.
[Artikel] , (2015)

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg :
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM) ACM
[ Konferenzveröffentlichung] , (2015)

Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj :
Event pattern discovery on IDS traces of Cloud Services.
IEEE International Conference on Big Data and Cloud Computing (BDCloud)
[ Konferenzveröffentlichung] , (2014)

Halvani, Oren ; Steinebach, Martin :
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management (2014) S. 33-43.
[Artikel] , (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
23rd USENIX Security Symposium
[ Konferenzveröffentlichung] , (2014)

Hiemenz, Benedikt :
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt
[Bachelorarbeit] , (2014)

Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (eds.) :

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: LNI (228).
[ Konferenzveröffentlichung] , (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.

[Report] , (2014)

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie :
Öffentlichkeitsgrundsatz und Stimmzettelbelege.

[Report] , (2014)

Halvani, Oren ; Steinebach, Martin
Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (eds.) :

VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Working Notes for CLEF 2014 Conference, Sheffield, UK, September 15-18, 2014.
[ Konferenzveröffentlichung] , (2014)

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie :
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR) S. 154-158.
[Artikel] , (2014)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing Marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks (SCN), 7 (11) S. 2185-2200.
[Artikel] , (2014)

Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (eds.) :

Authorship Verification via k-Nearest Neighbor Estimation.
In: CEUR - Workshop Proceedings (1179). CEUR-WS.org
[ Konferenzveröffentlichung] , (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on IEEE
[ Konferenzveröffentlichung] , (2013)

Hamann, Tobias :
The BKZ Simulation Algorithm.
Tu Darmstadt
[Masterarbeit] , (2013)

Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf :
Natural Language Watermarking for German Texts.
In: IH&MMSec '13 .
[ Konferenzveröffentlichung] , (2013)

Henecka, Wilko ; Schneider, Thomas :
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13) ACM
[ Konferenzveröffentlichung] , (2013)

Hülsing, Andreas ; Braun, Johannes :
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[ Konferenzveröffentlichung] , (2013)

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias :
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[ Konferenzveröffentlichung] , (2013)

Hülsing, Andreas :
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Africa Crypt 2013
[ Konferenzveröffentlichung] , (2013)

Hauke, Sascha ; Biedermann, Sebastian ; Heider, Dominik ; Mühlhäuser, Max :
On the Application of Supervised Machine Learning to Trustworthiness Assessment.

[Report] , (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of 28th ACM SAC 2013 ACM
[ Konferenzveröffentlichung] , (2013)

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes :
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013. LNCS (8128). Springer Regensburg, Germany , S. 194-208.
[Buchkapitel] , (2013)

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[ Konferenzveröffentlichung] , (2013)

Hornschuch, Marian :
Multivariate-based identification and signature schemes with additional properties.
TU Darmstadt
[Masterarbeit] , (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander :
Decoupling Authentication from the Usage of Services.

[Report] , (2012)

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut :
Secure Two-Party Computations in ANSI C.
Conference on Computer and Communications Security (CCS 2012) ACM Press
[ Konferenzveröffentlichung] , (2012)

Heinrich, Markus :
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
[Bachelorarbeit] , (2012)

Halvani, Oren :
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
TU Darmstadt
[Masterarbeit] , (2012)

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) :

Forward Secure Signatures on Smart Cards.
In: LNCS (7707). Springer Berlin Heidelberg
[ Konferenzveröffentlichung] , (2012)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max :
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
Proceedings of the IEEE TrustCom 2012 IEEE
[ Konferenzveröffentlichung] , (2012)

Heuser, Annelie ; Zohner, Michael :
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[ Konferenzveröffentlichung] , (2012)

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph :
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1) S. 25-36.
[Artikel] , (2012)

Hartung, Daniel ; Pflug, Anika ; Busch, Christoph :
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: LNI . Gesellschaft für Informatik e.V.
[ Konferenzveröffentlichung] , (2012)

Henriques, Joselito ; von Lukas, Uwe ; Mesing, Benjamin :
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2 S. 84-86. ISSN 1866-5004
[Artikel] , (2012)

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) :

Post-Quantum Signaturverfahren Heute.
22. SIT-Smartcard Workshop 2012 Fraunhofer Verlag Stuttgart
[ Konferenzveröffentlichung] , (2012)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max :
Fusion of Opinions under Uncertainty and Conflict -- Trust Assessment for Cloud Marketplaces (Full version).

[Report] , (2012)

Halvani, Oren ; Steinebach, Martin
Schartner, Peter ; Taeger, Jürgen (eds.) :

Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Prof. Dr. Patrick Horster Deutschland , S. 174-185. ISBN 978-3000392214
[Buchkapitel] , (2012)

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko :
On the design and implementation of the Open eCard App.
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[ Konferenzveröffentlichung] , (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas :
Verteilte Dienstnutzung mit dem neuen Personalausweis.
D-A-CH Security 2012, 25. - 26. September
[ Konferenzveröffentlichung] , (2012)

Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner :
Data Exchange Processes based on Trust and Rights Management.
In: Tools and Methods of Competitive Engineering (TMCE 2012)
[ Konferenzveröffentlichung] , (2012)

Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten :
Friendship in German Online Social Networks.
SOUPS
[ Konferenzveröffentlichung] , (2012)

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie :
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012)
[ Konferenzveröffentlichung] , (2012)

Halvani, Oren Avni :
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
TU Darmstadt
[Masterarbeit] , (2012)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing.
2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 (TrustCom 2011) IEEE CS
[ Konferenzveröffentlichung] , (2011)

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph :
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011)
[Artikel] , (2011)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander :
Mobile eID application for the German identity card.

[Report] , (2011)

Hoffmann, Gerhard :
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt
[Masterarbeit] , (2011)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max :
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).

[Report] , (2011)

Horsch, Moritz ; Stopczynski, Martin :
The German eCard-Strategy.

[Report] , (2011)

Horsch, Moritz :
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
TU Darmstadt
[Masterarbeit] , (2011)

Hamacher, Kay ; Katzenbeisser, Stefan :
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011). ACM Press , S. 115-124.
[Buchkapitel] , (2011)

Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc :
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
14th EUROMICRO Conference on Digital System Design (DSD2011)
[ Konferenzveröffentlichung] , (2011)

Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco :
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
Proceeding of ASME 2010 International Mechanical Engineering Congress & Exposition
[ Konferenzveröffentlichung] , (2010)

Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro :
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen (2) S. 56-59.
[Artikel] , (2010)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max :
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing IEEE Computer Society
[ Konferenzveröffentlichung] , (2010)

Heinson, Dennis ; Schmidt, Bernd :
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8) S. 540-547.
[Artikel] , (2010)

Halvani, Oren ; Steinebach, Martin :
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 5/2010 S. 285-291.
[Artikel] , (2010)

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (eds.) :

Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS , 6055 . Springer
[ Konferenzveröffentlichung] , (2010)

Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus :
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2) 75–79.
[Artikel] , (2010)

Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
Freiling, Felix (ed.) :

Quantifying the Attack Surface of a Web Application.
In: Lecture Notes in Informatics (LNI) , P-170 . Bonner Köllen Verlag
[ Konferenzveröffentlichung] , (2010)

Hartmann, Frank :
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
TU Darmstadt
[Masterarbeit] , (2010)

Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph :
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.

[ Konferenzveröffentlichung] , (2010)

Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander :
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
3rd International Conference on New Technologies, Mobility and Security (NTMS) IEEE Press
[ Konferenzveröffentlichung] , (2009)

Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas :
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10) S. 968-975.
[Artikel] , (2009)

Horsch, Moritz :
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
TU Darmstadt
[Masterarbeit] , (2009)

Hornung, Gerrit ; Schnabel, Christoph :
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2) S. 115-122.
[Artikel] , (2009)

Hornung, Gerrit ; Schnabel, Christoph :
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1) S. 84-88.
[Artikel] , (2009)

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James :
Software protection using an installation product having an entitlement file.

[Norm, Patent, Standard] , (2009)

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim :
Software Protection Using an Installaton Product Having an Entitlement File.

[Norm, Patent, Standard] , (2009)

Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max :
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1) S. 90-111.
[Artikel] , (2009)

Hartung, Daniel :
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5
[Artikel] , (2009)

Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel :
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR S. 723-728.
[Artikel] , (2008)

Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf :
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Proceedings of the 15th IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA
[ Konferenzveröffentlichung] , (2007)

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie :
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6) S. 434-440.
[Artikel] , (2007)

Hutter, Dieter ; Volkamer, Melanie
Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (eds.) :

Information Flow Control to Secure Dynamic Web Service Composition.
Security in Pervasive Computing
[ Konferenzveröffentlichung] , (2006)

Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (eds.) :

Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Proceedings of the ECEH'06
[ Konferenzveröffentlichung] , (2006)

Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf :
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Proceedings of 30th Annual IEEE Conference on Local Computer Networks (LCN2005), Sydney, Australia
[ Konferenzveröffentlichung] , (2005)

Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. :
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference (EUROMICRO 2004), Rennes, France IEEE Computer Society Press, Los Alamitos
[ Konferenzveröffentlichung] , (2004)

Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf :
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Proceedings of Second International Conference on Wired/Wireless Internet Communications (WWIC 2004), Frankfurt (Oder), Germany Springer-Verlag Berlin/Heidelberg/New York
[ Konferenzveröffentlichung] , (2004)

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael :
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1) 35--44.
[Artikel] , (2004)

Hollick, Matthias ; Krop, T. ; Schmitt, J. :
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.

[Report] , (2003)

Hollick, Matthias ; Steinmetz, Ralf :
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
Enterprise Security IT Verlag fr Informationstechnik GmbH, Höhenkirchen
[ Konferenzveröffentlichung] , (2002)

Hollick, Matthias ; Schmitt, J. :
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.

[Report] , (2002)

Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf :
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Innovative Anwendungen in Kommunikationsnetzen, Proceedings der 15. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Germany Gesellschaft für Informatik, Bonn
[ Konferenzveröffentlichung] , (2001)

Hollick, Matthias ; Steinmetz, Ralf :
Security Goals for Service Discovery in Ad-hoc Environments.
Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2001), Split, Croatia FESB-Split
[ Konferenzveröffentlichung] , (2001)

Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf :
A Security Model for Multicast Group Integrity Management.
Poster Session of Third International Workshop on Networked Group Communication, UCL, London, UK, Organised by UCL and COST 264 in cooperation with ACM SIGCOMM
[Anderes] , (2001)

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael :
Micro-payments based on iKP.
SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection
[ Konferenzveröffentlichung] , (1996)

I

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) :

Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding. Routledge, London London
[Buchkapitel] , (2018)

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit] , (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[ Konferenzveröffentlichung] , (2016)

Inel, Miray :
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt
[Masterarbeit] , (2014)

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric :
Modular Reasoning with Join Point Interfaces.

[Report] , (2011)

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric :
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
[Online-Edition: http://www.bodden.de/pubs/itb11jpi.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[ Konferenzveröffentlichung] , (2011)

Isaak, J. ; Savran, D. ; Fritzsche, M. ; Galaviz, D. ; Hartmann, T. ; Kamerdzhiev, S. ; Kelley, J. ; Kwan, E. ; Pietralla, N. ; Romig, C. ; Rusev, G. ; Sonnabend, K. ; Tonchev, A. ; Tornow, W. ; Zilges, A. :
Investigation of low-lying electric dipole strength in the semimagic nucleus ^{44}Ca.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.83.034304]
In: Physical Review C, 83 (3) ISSN 0556-2813
[Artikel] , (2011)

Ivanova, Vanya :
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt
[Masterarbeit] , (2010)

Israr, Adeel ; Shoufan, Abdulhadi ; Huss, Sorin :
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
IEEE Int. Symposium on Quality Electronic Design, ISQED'09.
[ Konferenzveröffentlichung] , (2009)

J

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit] , (2017)

Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim :
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
In: International Conference on Networked Systems (NetSys). IEEE Computer Society
[ Konferenzveröffentlichung] , (2015)

Jamison, Emily ; Gurevych, Iryna
Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (eds.) :

Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
[Online-Edition: http://www.aclweb.org/anthology/Y/Y14/Y14-1030.pdf]
Proceedings of the 28th Pacific Asia Conference on Language, Information and Computing Department of Linguistics, Chulalongkorn University
[ Konferenzveröffentlichung] , (2014)

Jamison, Emily ; Gurevych, Iryna
Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (eds.) :

Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
[Online-Edition: http://www.arts.chula.ac.th/~ling/paclic28/program/pdf/479.p...]
Proceedings of the The 28th Pacific Asia Conference on Language, Information and Computing Department of Linguistics, Chulalongkorn University
[ Konferenzveröffentlichung] , (2014)

Jeutter, Bennet :
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
[Masterarbeit] , (2013)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[ Konferenzveröffentlichung] , (2012)

Jolos, R. ; Pietralla, N. ; Shirikova, N. ; Voronov, V. :
Schematic microscopic approach to the description of M1 transitions between mixed-symmetry and fully symmetric collective states in γ-soft nuclei based on RPA-IBM boson mapping.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.84.014315]
In: Physical Review C, 84 (1) ISSN 0556-2813
[Artikel] , (2011)

Jungclaus, A. ; Walker, J. ; Leske, J. ; Speidel, K.-H. ; Stuchbery, A. E. ; East, M. ; Boutachkov, P. ; Cederkäll, J. ; Doornenbal, P. ; Egido, J. L. ; Ekström, A. ; Gerl, J. ; Gernhäuser, R. ; Goel, N. ; Górska, M. ; Kojouharov, I. ; Maier-Komor, P. ; Modamio, V. ; Naqvi, F. ; Pietralla, N. ; Pietri, S. ; Prokopowicz, W. ; Schaffner, H. ; Schwengner, R. ; Wollersheim, H.-J. :
Evidence for reduced collectivity around the neutron mid-shell in the stable even-mass Sn isotopes from new lifetime measurements.
[Online-Edition: http://dx.doi.org/10.1016/j.physletb.2010.11.012]
In: Physics Letters B, 695 (1-4) S. 110. ISSN 03702693
[Artikel] , (2011)

Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. :
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
[Artikel] , (2010)

Jonker, Hugo ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) :

Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID'07 , 4896 . Springer-Verlag
[ Konferenzveröffentlichung] , (2007)

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, April, Special Issue "Cop 495--509.
[Artikel] , (1998)

Janson, Phil ; Waidner, Michael :
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6) 10--15.
[Artikel] , (1996)

K

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Artikel] , (2019)

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (ed.) :

Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany
[Buchkapitel] , (2019)

Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias :
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany. Siegen, Germany
[ Konferenzveröffentlichung] , (2019)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[ Konferenzveröffentlichung] , (2018)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Anderes] , (2018)

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan :
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias :
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...]
In: Mensch und Computer 2018: Tagungsband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar
Dachselt, Raimund ; Weber, Gerhard (eds.) :

Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria :
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1) S. 1-19.
[Artikel] , (2018)

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo :
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK. Portsmouth, UK
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita :
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...]
In: Journal of Contingencies and Crisis Management (JCCM) S. 1-16.
[Artikel] , (2018)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[ Konferenzveröffentlichung] , (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 S. 88-99.
[Artikel] , (2017)

Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd :
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
IEEE Conference on Local Computer Networks (LCN) IEEE
[ Konferenzveröffentlichung] , (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit] , (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit] , (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[ Konferenzveröffentlichung] , (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie :
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
International Conference on Human-Computer Interaction (HCII) Springer
[ Konferenzveröffentlichung] , (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) S. 177-197.
[Artikel] , (2017)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie :
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3) S. 24-29.
[Artikel] , (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[ Konferenzveröffentlichung] , (2017)

Kaufhold, Marc-André ; Reuter, Christian :
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...]
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1) S. 78-88.
[Artikel] , (2017)

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Eibl, Maximilian ; Gaedke, Martin (eds.) :

Social Media Analytics: Eine Marktstudie im Krisenmanagement.
[Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...]
In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn. Bonn
[ Konferenzveröffentlichung] , (2017)

Kaufhold, Marc-André ; Reuter, Christian
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) :

The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
[Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...]
In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, May 21-24, 2017, Albi, France. Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM) Albi, France
[ Konferenzveröffentlichung] , (2017)

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236]
Mensch und Computer 2017 - Workshopband Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Kolb, Nina
Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (eds.) :

Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Mensch und Computer 2016 - Tagungsband Gesellschaft für Informatik e.V.
[ Konferenzveröffentlichung] , (2016)

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie :
Introducing Proxy Voting to Helios.
11th International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[ Konferenzveröffentlichung] , (2016)

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric :
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Jahrestagung der Gesellschaft für Informatik Lecture Notes in Informatics (LNI)
[ Konferenzveröffentlichung] , (2016)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion-resistant Proxy Voting.
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 Springer
[ Konferenzveröffentlichung] , (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[ Konferenzveröffentlichung] , (2016)

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[ Konferenzveröffentlichung] , (2016)

Kulyk, Oksana ; Volkamer, Melanie :
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers Springer
[ Konferenzveröffentlichung] , (2016)

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[ Konferenzveröffentlichung] , (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15) Springer
[ Konferenzveröffentlichung] , (2015)

Kolb, Nina ; Diefenbach, Sarah ; Niklas, Susanne
Endmann, Anja ; Fischer, Holger ; Krökel, Malte (eds.) :

3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
Mensch und Computer 2015 – Usability Professionals De Gruyter Oldenbourg
[ Konferenzveröffentlichung] , (2015)

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) :

Extending Helios Towards Private Eligibility Verifiability.
E-Voting and Identity: 5th International Conference - VoteID 2015 Springer
[ Konferenzveröffentlichung] , (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15) Springer
[ Konferenzveröffentlichung] , (2015)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
10th International Conference on Availability, Reliability and Security - ARES 2015 IEEE
[ Konferenzveröffentlichung] , (2015)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.

[Anderes] , (2015)

Karuppayah, Shankar ; Roos, Stefanie ; Rossow, Christian ; Fischer, Mathias ; Mühlhäuser, Max :
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
International Conference in Distributed Computing Systems IEEE
[ Konferenzveröffentlichung] , (2015)

Kulcsar, Geza ; Deckwerth, Frederik ; Lochau, Malte ; Varró, Gergely ; Schürr, Andy
Rensink, Arend ; Zambon, Eduardo (eds.) :

Improved Conflict Detection for Graph Transformation with Attributes.
[Online-Edition: http://dx.doi.org/10.4204/EPTCS.181.7]
In: Graphs as Models, GaM 2015. In: Electronic Proceedings in Theoretical Computer Science , 181 .
[ Konferenzveröffentlichung] , (2015)

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben :
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
6th International Conference on Electronic Voting - EVOTE 2014 IEEE
[ Konferenzveröffentlichung] , (2014)

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim :
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science Springer, Cham
[ Konferenzveröffentlichung] , (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[ Konferenzveröffentlichung] , (2014)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic protocol selection in secure two-party computations.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33]
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14).
[ Konferenzveröffentlichung] , (2014)

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay :
TrustLite: A Security Architecture for Tiny Embedded Devices.
European Conference on Computer Systems (EuroSys) ACM
[ Konferenzveröffentlichung] , (2014)

Klose, Robin ; Loch, Adrian ; Hollick, Matthias :
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
Proceedings of the 2nd Workshop of Software Radio Implementation Forum (SRIF 2013), co-located with ACM Sigcomm 2013
[ Konferenzveröffentlichung] , (2013)

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas :
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8) S. 512-516.
[Artikel] , (2013)

Klose, Robin ; Loch, Adrian ; Hollick, Matthias :
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
Proceedings of the 2013 IEEE International Conference on Sensing, Communication, and Networking (SECON 2013)
[ Konferenzveröffentlichung] , (2013)

Kühne, Alexander ; Loch, Adrian ; Hollick, Matthias ; Klein, Anja :
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
Wireless Communications and Networking Conference (WCNC'13)
[ Konferenzveröffentlichung] , (2013)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[ Konferenzveröffentlichung] , (2013)

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie :
A Comparison of American and German Folk Models of Home Computer Security.
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013 Springer LNCS
[ Konferenzveröffentlichung] , (2013)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Anderes] , (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464]
In: Journal of Computer Security (JCS), 21 (2) S. 283-315.
[Artikel] , (2013)

Kauer, M. ; Franz, B. ; Pfeiffer, T. ; Heine, M. ; Christin, Delphine :
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress)
[ Konferenzveröffentlichung] , (2013)

Katzenbeisser, Stefan ; Schaller, André :
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit S. 881-885.
[Artikel] , (2012)

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes :
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4) S. 305-308.
[Artikel] , (2012)

Knauer, Julian ; Baier, Harald :
Zur Sicherheit von ATA-Festplattenpasswörtern.
DACH Security 2012
[ Konferenzveröffentlichung] , (2012)

Kirchbuchner, Florian :
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt
[Masterarbeit] , (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[ Konferenzveröffentlichung] , (2012)

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) :

State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE). Springer Verlag Heidelberg , S. 189-279. ISBN 978-3-642-31942-6
[Buchkapitel] , (2012)

Kononenko, Kirill :
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
International Conference on Mobile Computing and Networking
[ Konferenzveröffentlichung] , (2012)

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian :
Practical Security in E-Mail Applications.
The 2012 International Conference on Security and Management (SAM’12)
[ Konferenzveröffentlichung] , (2012)

Kelm, David :
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt
[Masterarbeit] , (2012)

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Buch] , (2012)

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) :

It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI , 195 . GI
[ Konferenzveröffentlichung] , (2012)

Kalabis, Lukas ; Selzer, Annika :
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9) 670--675.
[Artikel] , (2012)

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph :
The Influence of trustworthiness of website layout on security perception of websites.
Current Issues in IT Security 2012 Duncker & Humblot
[ Konferenzveröffentlichung] , (2012)

Kocabaş, Ünal ; Schulz, Steffen :
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[ Konferenzveröffentlichung] , (2011)

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS (6917). Springer
[ Konferenzveröffentlichung] , (2011)

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. :
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
[Artikel] , (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) S. 177-186.
[Artikel] , (2011)

Karuppayah, Shankar ; Samad, Fahad :
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
In: Lecture Notes in Informatics GI-Edition, S-10 (Informatiktage 2011) S. 279-282.
[Artikel] , (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[ Konferenzveröffentlichung] , (2011)

Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. :
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing
[Artikel] , (2010)

Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc :
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implementations.
Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010
[ Konferenzveröffentlichung] , (2010)

Kasper, Michael ; Schindler, Werner ; Stöttinger, Marc :
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implemenations.
Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010
[ Konferenzveröffentlichung] , (2010)

Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten :
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
IEEE Globecom
[ Konferenzveröffentlichung] , (2010)

Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten :
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom to appear.
[Artikel] , (2010)

Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz :
Reducing Configurations to Monitor in a Software Product Line.
[Online-Edition: http://www.bodden.de/pubs/kbbk10reducing.pdf]
In: 1st International Conference on Runtime Verification (RV). In: LNCS , 6418 . Springer
[ Konferenzveröffentlichung] , (2010)

Kinder, Johannes ; Veith, Helmut
Bloem, Roderick ; Sharygina, Natasha (eds.) :

Precise Static Analysis of Untrusted Driver Binaries.
Proceedings of the 10th International Conference on Formal Methods in Computer-Aided Design (FMCAD 2010) IEEE Computer Society
[ Konferenzveröffentlichung] , (2010)

Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Li, Chang-Tsun (ed.) :

Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
In: nicht bekannt Handbook of Research. Idea Group Reference , S. 155-175. ISBN 1605668362
[Buchkapitel] , (2010)

Kiefer, Franziskus :
Effiziente Implementierung des PACE- und EACProtokolls für mobile Geräte.
TU Darmstadt
[Masterarbeit] , (2010)

Kern, Oliver ; Ranade, Kedar ; Seyfarth, Ulrich :
Complete sets of cyclic mutually unbiased bases in even prime-power dimensions.
In: J. Phys. A, 43 (27) 5305--5321.
[Artikel] , (2010)

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[ Konferenzveröffentlichung] , (2010)

Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander :
Cryptographic Application Scenarios.

[Report] , (2010)

Krumov, Lachezar ; Andreeva, Adriana ; Strufe, Thorsten :
Resilient Peer-to-Peer Live-Streaming using Motifs.
11th IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM)
[ Konferenzveröffentlichung] , (2010)

Khelil, Abdelmajid ; Germanus, Daniel ; Suri, Neeraj :
Protection of SCADA Communication Channels.
In: nicht bekannt Advances in Critical Infrastructure Protection. Springer
[Buchkapitel] , (2010)

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. :
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63
[ Konferenzveröffentlichung] , (2010)

Khelil, Abdelmajid ; Jeckel, Sebastian ; Germanus, Daniel ; Suri, Neeraj :
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
Proc. of The 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT)
[ Konferenzveröffentlichung] , (2010)

Kemetmüller, Christoph ; Seeger, Mark ; Baier, Harald ; Busch, Christoph :
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
Eighth International Network Conference (INC 2010)
[ Konferenzveröffentlichung] , (2010)

Kevenaar, Tom ; Korte, Ulrike ; Merkle, Johannes ; Niesing, Matthias ; Ihmor, Heinrich ; Busch, Christoph ; Zhou, Xuebing :
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.

[ Konferenzveröffentlichung] , (2010)

Khalilbeigi, Mohammadreza ; Bradler, Dirk ; Schweizer, Immanuel ; Probst, Florian ; Steimle, Jürgen :
Towards Computer Support of Paper Workflows in Emergency Management.
7th International Conference on Information Systems for Crisis Response and Management
[ Konferenzveröffentlichung] , (2010)

König, André ; Seither, Daniel ; Hollick, Matthias ; Steinmetz, Ralf :
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
Proceedings of IEEE GLOBECOM 2009
[ Konferenzveröffentlichung] , (2009)

Katzenbeisser, Stefan ; Kursawe, Klaus ; Stumpf, Frederic :
Revocation of TPM Keys.
Second International Conference on Trusted Computing (TRUST 2009)
[ Konferenzveröffentlichung] , (2009)

Kallel, Slim ; Charfi, Anis ; Mezini, Mira ; Klose, Karl ; Jmaiel, Mohamed :
From Formal Access Control Policies to Runtime Enforcement Aspects.
Proc. of the International Symposium on Engineering Secure Software and Systems (ESSOS) Springer Verlag
[ Konferenzveröffentlichung] , (2009)

Kinder, Johannes ; Veith, Helmut ; Zuleger, Florian :
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
In: Lecture Notes in Computer Science , 5403 . Springer
[ Konferenzveröffentlichung] , (2009)

König, A. ; Hollick, Matthias ; Steinmetz, R. :
An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract).
Proceedings of the 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop Visions of Future Generation Networks (EuroView2009), Würzburg, Germany
[ Konferenzveröffentlichung] , (2009)

König, A. ; Hollick, Matthias ; Steinmetz, R. :
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
Procedings of the IEEE International Conference on Communications (IEEE ICC 2009), Dresden, Germany IEEE Computer Society Press
[ Konferenzveröffentlichung] , (2009)

Kern, Oliver :
Randomized Dynamical Decoupling Strategies and Improved One-Way Key Rates for Quantum Cryptography.
TU-Darmstadt
[Dissertation]

König, André ; Gottron, Christian ; Hollick, Matthias ; Steinmetz, Ralf :
Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes.
Procedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2008), Atlanta, USA IEEE Computer Society Press
[ Konferenzveröffentlichung] , (2008)

Killmann, Wolfgang ; Schindler, Werner
Oswald, E. ; Rohatgi, P. (eds.) :

A Design for a Physical RNG with Robust Entropy Estimators.
In: LNCS (5154). Springer
[ Konferenzveröffentlichung] , (2008)

König, André ; Hollick, Matthias ; Steinmetz, Ralf :
Security for Future Wireless and Decentralized Communication Networks - Harnessing Cooperation, Space, and Time.
Proceedings of the 8th Wuerzburg Workshop on IP: Joint EuroNF, ITC, and ITG Workshop "Visions of Future Generation Networks" (EuroView2008)
[ Konferenzveröffentlichung] , (2008)

Kinder, Johannes ; Veith, Helmut :
Jakstab: A Static Analysis Platform for Binaries.
In: Proceedings of the 20th International Conference on Computer Aided Verification (CAV 2008) , 5123 Springer
[ Konferenzveröffentlichung] , (2008)

König, A. ; Hollick, Matthias ; Krop, T. ; Steinmetz, R. :
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
In: Security and Communication Networks (SCN), 2 271--288.
[Artikel] , (2008)

Krimmer, Robert ; Volkamer, Melanie :
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.

[Report] , (2008)

Krimmer, Robert ; Volkamer, Melanie
Krishna, Jaya ; Agarwal, Naveen Kumar (eds.) :

Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press .
[ Konferenzveröffentlichung] , (2008)

Krimm, Rüdiger ; Volkamer, Melanie :
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008 Boorberg Verlag
[ Konferenzveröffentlichung] , (2008)

Krop, T. ; Bredel, M. ; Hollick, Matthias ; Steinmetz, Ralf :
JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks.
Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2007) co-located with ACM MobiCom 2007, Montreal, Canada
[ Konferenzveröffentlichung] , (2007)

König, André ; Hollick, Matthias ; Ackermann, R. ; Steinmetz, R. :
Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach.
Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security Nova Science Publishers
[ Konferenzveröffentlichung] , (2007)

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) :

The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID'07 , 4896 . Springer-Verlag
[ Konferenzveröffentlichung] , (2007)

Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen :
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4) S. 225.
[Artikel] , (2007)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security Springer-Verlag, Berlin
[ Konferenzveröffentlichung] , (2006)

König, A. ; Hollick, Matthias ; Schmitt, J. ; Steinmetz, R. :
Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract).
Proceedings of 2. Essener Workshop zu Neuen Herausforderungen in der Netzsicherheit (EWNS 2006), Essen, Germany
[ Konferenzveröffentlichung] , (2006)

Krop, T. ; Widmer, J. ; Hollick, Matthias ; Prehofer, C. ; Steinmetz, Ralf :
Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post).
Proceedings of Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Montreal, Canada
[ Konferenzveröffentlichung] , (2006)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.

[Report] , (2005)

Krop, T. ; Kappes, M. ; Hollick, Matthias :
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
Proceedings of Kommunikation in Verteilten Systemen (KiVS 2005), Workshop Peer-to-Peer-Systeme und -Anwendungen, Kaiserslautern, Germany
[ Konferenzveröffentlichung] , (2005)

Krop, T. ; Hollick, Matthias ; Krist, F. ; Mogre, Parag S. ; Steinmetz, R. :
Modeling Static and Dynamic Behavior of Routes in Mobile Ad hoc Networks (Extended Abstract and Poster).
Proceedings of ACM MobiCom 2005, Köln, Germany
[ Konferenzveröffentlichung] , (2005)

Krimmer, Robert ; Volkamer, Melanie
Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (eds.) :

Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag .
[ Konferenzveröffentlichung] , (2005)

Krimmer, Robert ; Volkamer, Melanie :
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005
[ Konferenzveröffentlichung] , (2005)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, 27 (1) 3--9.
[Artikel] , (2004)

Karjoth, Günter ; Waidner, Michael :
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1) 18--21.
[Artikel] , (2004)

Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael :
Amending P3P for Clearer Privacy Promises.
TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03))
[ Konferenzveröffentlichung] , (2003)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Services for Enterprises.
TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)) Aix-en-Provence
[ Konferenzveröffentlichung] , (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Services for Enterprises.

[Report] , (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
Workshop on Privacy Enhancing Technologies
[ Konferenzveröffentlichung] , (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Unternehmensweites Datenschutzmanagement.
Datenschutz Sommerakademie 2001 Datenschuts als Wettbewerbsvorteil, Vieweg Verlag
[ Konferenzveröffentlichung] , (2001)

Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael :
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.

[Report] , (1994)

L

Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian :
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Wien, AUT
[ Konferenzveröffentlichung] , (2019)

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP) S. 45-67.
[Artikel] , (2018)

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report] , (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[ Konferenzveröffentlichung] , (2017)

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar :
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016_Ludwigetal_Situa...]
In: International Journal on Human-Computer Studies (IJHCS), 102 (C) S. 103-121.
[Artikel] , (2017)

Leopold, Inken ; Reuter, Christian
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...]
In: Mensch & Computer: Tagungsband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh :
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5) S. 64-75.
[Artikel] , (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[ Konferenzveröffentlichung] , (2016)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch] , (2015)

Lilien, Leszek ; Othmane, Lotfi Ben ; Angin, Pelin ; Bhargava, Bharat ; Salih, Raed ; DeCarlo, Andrew :
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW)
[ Konferenzveröffentlichung] , (2015)

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil :
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[ Konferenzveröffentlichung] , (2015)

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel :
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
[Artikel] , (2015)

Letzkus, Fabian :
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
TU Darmstadt
[Masterarbeit] , (2015)

Loch, Adrian ; Quesada, Pablo ; Hollick, Matthias ; Kühne, Alexander ; Klein, Anja :
Building Cross-Layer Corridors in Wireless Multihop Networks.
11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2014)
[ Konferenzveröffentlichung] , (2014)

Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. :
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN 2014)
[ Konferenzveröffentlichung] , (2014)

Loch, Adrian ; Hong, Wei-Chih ; Hollick, Matthias :
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
39th IEEE Conference on Local Computer Networks (LCN)
[ Konferenzveröffentlichung] , (2014)

Loch, Adrian ; Schulz, Matthias ; Hollick, Matthias :
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
Proceedings of the 3rd Workshop of Software Radio Implementation Forum (SRIF 2014), co-located with ACM Sigcomm 2014
[ Konferenzveröffentlichung] , (2014)

Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, J. ; Kühne, A. ; Klein, A. :
Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks.
15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014)
[ Konferenzveröffentlichung] , (2014)

Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. :
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014)
[ Konferenzveröffentlichung] , (2014)

Loch, Adrian ; Meier, David ; Hollick, Matthias :
How did you get here? PHY-Layer Path Signatures.
Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014)
[ Konferenzveröffentlichung] , (2014)

Liu, Huajian ; Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin
SPIE, IS&T (ed.) :

Watermarking Textures in Video Games.
Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014
[ Konferenzveröffentlichung] , (2014)

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Traon, Yves Le ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick :
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Online-Edition: http://www.abartel.net/static/p/tr-iccta.pdf]
In: arXiv preprint arXiv:1404.7431
[Report] , (2014)

Loch, Adrian ; Klose, Robin ; Hollick, Matthias ; Kuehne, Alexander ; Klein, Anja :
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013, Demo Session)
[ Konferenzveröffentlichung] , (2013)

Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, Jörg ; Kuehne, Alexander ; Klein, Anja :
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013)
[ Konferenzveröffentlichung] , (2013)

Loch, Adrian ; Frey, Hannes ; Hollick, Matthias :
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing
[Artikel] , (2013)

Loch, Adrian ; Hollick, Matthias :
Face the Enemy: Attack Detection for Planar Graph Routing.
Proceedings of the 2013 Conference on Networked Systems (NetSys 2013)
[ Konferenzveröffentlichung] , (2013)

Liu, H. ; Li, Y. ; Steinebach, M. :
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
In: Lecture Notes in Computer Science ((tba)). Springer
[ Konferenzveröffentlichung] , (2013)

Luna, Jesus ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj ; Rak, Massimiliano ; Liccardo, Loredana :
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proc. of the International Conference on Cloud Computing and Services Science (CLOSER)
[ Konferenzveröffentlichung] , (2013)

Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin :
Privacy Risks in Named Data Networking: What is the Cost of Performance?

[Anderes] , (2012)

Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin :
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.

[Report] , (2012)

Liu, Huajian ; Steinebach, Martin :
Improved Fourier domain template and patchwork embedding using spatial masking.
In: Proceedings of SPIE (8303).
[ Konferenzveröffentlichung] , (2012)

Luna, Jesus ; Langenberg, Robert ; Suri, Neeraj :
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees.
Proc. of the ACM Cloud Computing Security Workshop
[ Konferenzveröffentlichung] , (2012)

Luna, Jesus ; Suri, Neeraj ; Krontiris, Ioannis :
Privacy-by-Design Based on Quantitative Threat Modeling.
Proc. of 7th Intl Conference on Risks and Security of Internet and Systems (CRISIS)
[ Konferenzveröffentlichung] , (2012)

Luna, Jesus ; Ghani, Hamza ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj :
Quantitative Assessment of Cloud Security Level Agreements: A Case Study.
Proc. of International Conference on Security and Cryptography (SECRYPT)
[ Konferenzveröffentlichung] , (2012)

Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie :
The Soot framework for Java program analysis: a retrospective.
[Online-Edition: http://www.bodden.de/pubs/lblh11soot.pdf]
In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011).
[ Konferenzveröffentlichung] , (2011)

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel :
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
15th International Conference on Financial Cryptography and Data Security (FC)
[ Konferenzveröffentlichung] , (2011)

Likavec, Lena :
Application of Lattice Basis Reduction.
TU Darmstadt
[Masterarbeit] , (2011)

Lux, Alexander ; Starostin, Artem :
A Tool for Static Detection of Timing Channels in Java.
2nd International Workshop on Constructive Side-Channel Analysis and Secure Design
[ Konferenzveröffentlichung] , (2011)

Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes :
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review (7) S. 14-15.
[Artikel] , (2011)

Lindner, Richard ; Peikert, Chris :
Better Key Sizes (and Attacks) for LWE-Based Encryption.
CT-RSA 2011
[ Konferenzveröffentlichung] , (2011)

Lux, Alexander ; Starostin, Artem :
Side Channel Finder (Version 1.0).

[Anderes] , (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
1st ACM International Health Informatics Symposium (IHI 2010)
[ Konferenzveröffentlichung] , (2010)

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel :
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[ Konferenzveröffentlichung] , (2010)

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem :
Side Channel Finder (Version 1.0).

[Report] , (2010)

Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding (IH 2010) Springer
[ Konferenzveröffentlichung] , (2010)

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander :
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.

[Report] , (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Patterns for Secure Boot and Secure Storage in Computer Systems.
4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),
[ Konferenzveröffentlichung] , (2010)

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes :
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Fifth International Conference on Availability, Reliability and Security (ARES 2010) IEEE Computer Society
[ Konferenzveröffentlichung] , (2010)

Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter :
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
ICICS
[ Konferenzveröffentlichung] , (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
ESORICS
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (eds.) :

Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie :
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009) ACM Press
[ Konferenzveröffentlichung] , (2009)

Lodrova, Dana ; Busch, Christoph ; Tabassi, Elham ; Krodel, Wolfgang ; Drahansky, Martin :
Semantic Conformance Testing Methodology for Finger Minutiae Data.
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Wiesmaier, Alexander :
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
8th European Conference on Digital Archiving (ECA2010)
[ Konferenzveröffentlichung] , (2009)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS (5789). Springer
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie :
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4
[Artikel] , (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) :

Classifying Privacy and Verifiability Requirements for Electronic Voting.
Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI)
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander :
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9 .
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Wiesmaier, Alexander :
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.

[Report] , (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel :
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS , 5471 . Springer
[ Konferenzveröffentlichung] , (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel :
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS , 5451 . Springer
[ Konferenzveröffentlichung] , (2009)

Liu, Huajian ; Steinebach, Martin ; Schneider, Marcel :
Efficient watermark embedding for web images.
Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander :
From Student Smartcard Applications to the German Electronic Identity Card.
ECEG09 ACI
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Opitz-Talidou, Zoi :
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
IRIS 2009
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Opitz-Talidou, Zoi :
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9
[Artikel] , (2009)

Langer, Lucie :
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement. Practical studies in e-Governement
[Buchkapitel] , (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (eds.) :

Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich OCG Verlag
[ Konferenzveröffentlichung] , (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie :
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
[Artikel] , (2009)

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael:
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag
[Buch] , (2000)

Lacoste, Gérard ; Waidner, Michael :
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press 147--157.
[Artikel] , (2000)

Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael :
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2) 71--75.
[Artikel] , (1991)

M

Mantz, Dennis :
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt
[Masterarbeit] , (2018)

Mehmedovic, Damir :
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt
[Bachelorarbeit] , (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[ Konferenzveröffentlichung] , (2018)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit] , (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit] , (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[ Konferenzveröffentlichung] , (2017)

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar :
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z]
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6) S. 959-1003.
[Artikel] , (2017)

Moschner, K. ; Blazhev, A. ; Jolie, J. ; Warr, N. ; Boutachkov, P. ; Bednarczyk, P. ; Sieja, K. ; Algora, A. ; Ameil, F. ; Bentley, M. A. ; Brambilla, S. ; Braun, N. ; Camera, F. ; Cederkaell, J. ; Corsi, A. ; Danchev, M. ; DiJulio, D. ; Fahlander, C. ; Gerl, J. ; Giaz, A. ; Golubev, P. ; Gorska, M. ; Grebosz, J. ; Habermann, T. ; Hackstein, M. ; Hoischen, R. ; Kojouharov, I. ; Kurz, N. ; Margincan, N. ; Merchan, E. ; Moeller, T. ; Naqvi, F. ; Singh, B. S. Nara ; Nociforo, C. ; Pietralla, N. ; Pietri, S. ; Podolyak, Zs. ; Prochazka, A. ; Reese, M. ; Reiter, P. ; Rudigier, M. ; Rudolph, D. ; Sava, T. ; Schaffner, H. ; Scruton, L. ; Taprogge, J. ; Thomas, T. ; Weick, H. ; Wendt, A. ; Wieland, O. ; Wollersheim, H.-J. :
Relativistic Coulomb excitation of Kr-88.
In: PHYSICAL REVIEW C, 94 (5) ISSN 2469-9985
[Artikel] , (2016)

Mayer, Peter ;