TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "LOEWE > LOEWE-Zentren"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z
Anzahl der Einträge auf dieser Ebene: 1794.

A

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit], (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit], (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes], (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Artikel], (2017)

Arzt, Steven :
Static Data Flow Analysis for Android Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937]
Technische Universität , Darmstadt
[Dissertation], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Ali, Azmzt ; Othmane, Lotfi Ben :
Towards effective security assurance for incremental software development - the case of zen cart application,.
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes], (2016)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira :
Towards Secure Integration of Cryptographic Software.
[Online-Edition: http://2015.splashcon.org/track/onward2015-papers]
In: OOPSLA Onward!, 25.10.2015, Piitsburgh. In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software .
[Konferenz- oder Workshop-Beitrag], (2015)

Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben :
Incremental Development of RBAC-controlled E-marking System Using the B Method.
Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report], (2015)

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric :
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 14.06.2015, Portland, USA. Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis
[Konferenz- oder Workshop-Beitrag], (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Alkeilani Alkadri, Nabil :
Post-Quantum Commitment Schemes.
TU Darmstadt
[Masterarbeit], (2015)

Arabadzhieva, Vladislava :
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt
[Masterarbeit], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés :
Blended Identity: Pervasive IdM for Continuous Authentication.
In: IEEE Security & Privacy Magazine, 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel], (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Artikel], (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
International Conference on Software Engineering(ICSE) 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad.
[Konferenz- oder Workshop-Beitrag], (2014)

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank :
Constructing Call Graphs of Scala Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3]
In: Proceedings of the 28th European Conference on Object-Oriented Programming. In: ECOOP '14 .
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh.
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric :
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices .
[Konferenz- oder Workshop-Beitrag], (2014)

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas :
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science , 8383 .
[Konferenz- oder Workshop-Beitrag], (2014)

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian :
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
ICISC 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13) pp. 364-381.
[Artikel], (2013)

Arzt, Steven ; Bodden, Eric :
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf]

[Report], (2013)

Alaoui, Sidi Mohamed El Yousfi ; El Bansarkhani, Rachid ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard :
Code based Identification and Signature Schemes in Software.
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report], (2013)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2) pp. 209-232.
[Artikel], (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Ali, Karim ; Lhoták, Ondřej :
Averroes: Whole-Program Analysis without the Whole Program.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16]
In: Proceedings of the 27th European Conference on Object-Oriented Programming. In: ECOOP '13 .
[Konferenz- oder Workshop-Beitrag], (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013)
[Artikel], (2013)

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan :
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11]
In: 15th International Conference on Information Security, 19-21 Sep 2012, Passau, Germany. In: Lecture Notes in Computer Science (ISSN 0302-9743) , 7483 .
[Konferenz- oder Workshop-Beitrag], (2012)

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi :
Challenges for Refinement and Composition of Instrumentations (Position Paper).
[Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf]
In: International Conference on Software Composition (SC 2012).
[Konferenz- oder Workshop-Beitrag], (2012)

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian :
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3) pp. 175-179.
[Artikel], (2012)

Ali, Karim ; Lhoták, Ondřej :
Application-Only Call Graph Construction.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30]
In: Proceedings of the 26th European Conference on Object-Oriented Programming. In: ECOOP '12 .
[Konferenz- oder Workshop-Beitrag], (2012)

Ahn, T. ; Rainovski, G. ; Pietralla, N. ; Coquard, L. ; Möller, T. ; Costin, A. ; Janssens, R. V. ; Lister, C. ; Carpenter, M. ; Zhu, S. :
Identification of the 2_{1,ms}^{+} mixed-symmetry state in ^{136}Ce.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.014303]
In: Physical Review C, 86 (1) ISSN 0556-2813
[Artikel], (2012)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
International Conference on Cryptology in Africa (AFRICACRYPT 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef :
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7) pp. 24-32.
[Artikel], (2012)

Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf :
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
Proceedings of the 19th European Conference on Information Systems (ECIS)
[Konferenz- oder Workshop-Beitrag], (2011)

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
IEEE Symposium on Security and Privacy (SSP) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2011)

Armknecht, Frederik ; Strufe, Thorsten :
An Efficient Distributed Privacy-preserving Recommendation System.
Proceedings of the 10th IEEE/IFIP Med-Hoc-Net
[Konferenz- oder Workshop-Beitrag], (2011)

Ahmed, Sarah :
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt
[Masterarbeit], (2011)

Alaoui, Sidi Mohamed El Yousfi ; Cayrel, Pierre-Louis ; Meziani, Mohammed
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science , 200 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: LNCS , 6480 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Ackermann, Tobias ; Buxmann, Peter :
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
Proceedings of the 16th Americas Conference on Information Systems (AMCIS) 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS , 6123 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: LNCS , 6370 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk :
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, Special Issue of IOPTS 1 - 7.
[Artikel], (2010)

Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph :
A Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
Workshop on Program Semantics, Specification and Verification: Theory and Applications at the 5th International Computer Science Symposium in Russia
[Konferenz- oder Workshop-Beitrag], (2010)

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) :

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: TRUST 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Anderl, Reiner ; Henriques, Joselito Rodrigues :
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt (2) pp. 16-22.
[Artikel], (2010)

Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj :
Data-based Agreement for Inter-Vehicle Coordination.
Proc. of the 11th International Conference on Mobile Data Management (MDM)
[Konferenz- oder Workshop-Beitrag], (2010)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
Proceedings of the 11th International Conference on Mobile Data Management (MDM)
[Konferenz- oder Workshop-Beitrag], (2010)

Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael :
Ubiquitous Home Control based on SIP and Presence Service.
Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS'10)
[Konferenz- oder Workshop-Beitrag], (2010)

Acker, Robin ; Massoth, Michael :
Secure Ubiquitous House and Facility Control Solution.
Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW'10), 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia :
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.

[Konferenz- oder Workshop-Beitrag], (2010)

Anderl, Reiner ; Henriques, Joselito Rodrigues :
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
Proceeding of 20th International Congress of Mechanical Engineering (COBEM 2009), Gramado, Brazil
[Konferenz- oder Workshop-Beitrag], (2009)

Ali, Karim ; Aib, Issam ; Boutaba, Raouf :
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[Konferenz- oder Workshop-Beitrag], (2009)

Ali, Karim ; Boutaba, Raouf :
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[Konferenz- oder Workshop-Beitrag], (2009)

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max :
Shaping the Future Internet.
Proceedings of the 3rd International CompanionAble Workshop IoPTS
[Konferenz- oder Workshop-Beitrag], (2009)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina :
Smart Products: Integration Challenges.
Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08)
[Konferenz- oder Workshop-Beitrag], (2008)

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru :
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Sixth Conference on Security and Cryptography for Networks (SCN 2008)
[Konferenz- oder Workshop-Beitrag], (2008)

Aciicmez, Onur ; Schindler, Werner
Malkin, T. (ed.) :

A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
In: LNCS (4964). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim :
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6) pp. 329-336.
[Artikel], (2008)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina :
Smart Products: Integration Challenges.
AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence
[Konferenz- oder Workshop-Beitrag], (2008)

Alkassar, Ammar ; Volkamer, Melanie :
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
In:
[Artikel], (2007)

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael :
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard], (2006)

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie :
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8 pp. 480-482.
[Artikel], (2005)

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael :
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
FMSE ACM
[Konferenz- oder Workshop-Beitrag], (2004)

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael :
Using a Rules Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard], (2001)

Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias :
Using an Object Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard], (2001)

B

Brand, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[Konferenz- oder Workshop-Beitrag], (2018)

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar :
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
[Online-Edition: https://www.raid2018.org/]
In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece. In: Lecture Notes in Computer Science , 11050 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Konferenz- oder Workshop-Beitrag], (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag], (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[Konferenz- oder Workshop-Beitrag], (2018)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Borges, Fábio ; Lara, Pedro ; Portugal, Renato :
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292 406--416.
[Artikel], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit], (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag], (2016)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Anderes], (2016)

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie :
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5) pp. 300-304.
[Artikel], (2016)

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel :
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7) 309–322.
[Artikel], (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2016)

Brendel, Jacqueline :
Efficient Proactive Secret Sharing.
TU Darmstadt
[Masterarbeit], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Baluda, Mauro :
EvoSE: Evolutionary Symbolic Execution.
[Online-Edition: http://dx.doi.org/10.1145/2804322.2804325]
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015)
[Artikel], (2015)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Braun, Kristoffer ; Rack, Philipp :
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag
[Masterarbeit], (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2015)

Butin, Denis ; Métayer, Daniel Le :
A Guide to End-to-End Privacy Accountability.
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes :
Real-World Post-Quantum Digital Signatures.
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015) Springer CCIS
[Konferenz- oder Workshop-Beitrag], (2015)

Braun, Johannes :
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur :
Nearest Planes in Practice.
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) :

Towards Security Solutions for Emergent Business Software.
Future Business Software Conference 2012 Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Konferenz- oder Workshop-Beitrag], (2014)

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014 Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2014)

Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
Peterson, Gilbert ; Shenoi, Sujeet (eds.) :

Using Approximate Matching to Reduce the Volume of Digital Data.
In: IFIP Advances in Information and Communication Technology , 433 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander :
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3) pp. 459-478.
[Artikel], (2014)

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max :
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014 913-959 (2014).
[Artikel], (2014)

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) :

Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS , 8533 . Springer International Publishing Switzerland
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) :

Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
International Conference for E-Democracy and Open Government 2014 Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag], (2014)

Bartsch, Steffen ; Volkamer, Melanie :
Expert Knowledge for Contextualized Warnings.

[Report], (2014)

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie :
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2) pp. 1-10.
[Artikel], (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Konferenz- oder Workshop-Beitrag], (2014)

Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
SPIE, IS&T (ed.) :

Robust Hashing for 3D Models.
Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, Februar 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie :
Unterstützung für ein risikobewusstes Verhalten im Internet.
Vielfalt der Informatik
[Konferenz- oder Workshop-Beitrag], (2014)

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie :
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht (2) pp. 119-127.
[Artikel], (2014)

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie :
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Workshop on Usable Security (USEC) Internet Society
[Konferenz- oder Workshop-Beitrag], (2014)

Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias :
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (eds.) :

Towards a Process Model for Hash Functions in Digital Forensics.
In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) , 132 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen :
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4) pp. 267-297.
[Artikel], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 pp. 114-125.
[Artikel], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Neumann, Stephan :
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2) pp. 98-102.
[Artikel], (2014)

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander:
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg ISBN 978-3-642-40656-0
[Buch], (2013)

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander :
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 11/2013 720 - 725.
[Artikel], (2013)

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira :
Reducing human factors in software security architectures.
[Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf]
In: Future Security Conference 2013.
[Konferenz- oder Workshop-Beitrag], (2013)

Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil :
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
[Artikel], (2013)

Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas :
Security considerations on extending PACE to a biometric-based connection establishment.
In: 1 (13).
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) :

Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS (8341). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch], (2013)

Bartsch, Steffen ; Volkamer, Melanie :
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
RiskKom-Workshop, INFORMATIK 2013 Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald :
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
[Artikel], (2013)

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) :

Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing. Springer , 157 - 158.
[Buchkapitel], (2013)

Braden, Kjell :
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt
[Masterarbeit], (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
22nd USENIX Security Symposium (USENIX Security '13) USENIX
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw
[Artikel], (2013)

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Beckerle, Matthias ; Martucci, Leonardo :
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
Symposium on Usable Privacy and Security (SOUPS) 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) :

Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Konferenz- oder Workshop-Beitrag], (2013)

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) :

The Transitivity-of-Trust Problem in Android Application Interaction.
8th International Conference on Availability, Reliability and Security (ARES 2013) IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) :

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
8th International Conference on Availability, Reliability and Security (AReS 2013) IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
[Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf]
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin :
Leakage Detection and Tracing for Databases.
Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas :
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS (7859). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph :
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
[Artikel], (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) :

Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science , 7779 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten :
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4) pp. 468-480.
[Artikel], (2013)

Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas :
Video Game Watermarking.
Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Breitinger, Frank ; Petrov, Kaloyan :
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9)
[Artikel], (2013)

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) :

On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on Systems Science (HICSS-46) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes :
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3) 997-1022 (2014).
[Artikel], (2013)

Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. :
Multi-Biometrische Gesichtserkennung.
the 13. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS (8282). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Rynkowski, Gregor :
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Social Computing (SocialCom) - PASSAT2013
[Konferenz- oder Workshop-Beitrag], (2013)

Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten :
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2) 22 -- 44.
[Artikel], (2013)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus :
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1) pp. 84-96.
[Artikel], (2013)

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih :
Contextualized Web warnings, and how they cause distrust.
Trust and Trustworthy Computing (TRUST 2013) Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander :
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.

[Report], (2012)

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira :
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf]

[Report], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.

[Report], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report], (2012)

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker :
Delta-oriented Monitor Specification.
[Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf]
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried :
Challenges in defining a programming language for provably correct dynamic analyses.
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Breitinger, Frank ; Baier, Harald :
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
[Artikel], (2012)

Breitinger, Frank ; Baier, Harald :
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
[Artikel], (2012)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) :

iPIN and mTAN for secure eID applications.
In: LNCS (7232). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Volkamer, Melanie :
Towards the Systematic Development of Contextualized Security Interventions.
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse :
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
[Artikel], (2012)

Breitinger, Frank ; Baier, Harald :
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
[Artikel], (2012)

Baier, Harald ; Brand, Achim :
On the Investigation of Application Specific Data within Digital Forensics.
Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Breitinger, Frank ; Baier, Harald :
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL) pp. 89-101.
[Artikel], (2012)

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) :

Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012 IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen :
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
[Artikel], (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.

[Report], (2012)

Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet :
An In-Depth Look at ALIA4J.
[Online-Edition: http://dx.doi.org/10.5381/jot.2012.11.1.a7]
In: The Journal of Object Technology, 11 (1) pp. 1-28. ISSN 1660-1769
[Artikel], (2012)

Busold, Christoph :
Hash-based Signatures on Smart Cards.
TU Darmstadt
[Masterarbeit], (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Buch], (2012)

Bulygin, Stanislav ; Walter, Michael :
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.

[Report], (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric :
Identifying meaningless parameterized linear-temporal-logic formulas.

[Report], (2012)

Bodden, Eric :
On the Expressiveness of Parameterized Finite-state Runtime Monitors.

[Report], (2012)

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie :
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
[Artikel], (2012)

Bockisch, Christoph ; Sewe, Andreas :
The ALIA4J Approach to Efficient Language Implementation.
[Online-Edition: http://dx.doi.org/10.1145/2384716.2384726]
In: Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric :
MOPBox: A Library Approach to Runtime Verification.
[Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf]
In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30. In: Lecture notes in computer science , 7186 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bauer, C. ; Behrens, T. ; Bildstein, V. ; Blazhev, A. ; Bruyneel, B. ; Butterworth, J. ; Clément, E. ; Coquard, L. ; Egido, J. ; Ekström, A. ; Fitzpatrick, C. ; Fransen, C. ; Gernhäuser, R. ; Habs, D. ; Hess, H. ; Leske, J. ; Kröll, T. ; Krücken, R. ; Lutter, R. ; Marley, P. ; Möller, T. ; Otsuka, T. ; Patronis, N. ; Petts, A. ; Pietralla, N. ; Rodríguez, T. ; Shimizu, N. ; Stahl, C. ; Stefanescu, I. ; Stora, T. ; Thirolf, P. ; Voulot, D. ; van de Walle, J. ; Warr, N. ; Wenander, F. ; Wiens, A. :
Prolate shape of ^{140}Ba from a first combined Doppler-shift and Coulomb-excitation measurement at the REX-ISOLDE facility.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.034310]
In: Physical Review C, 86 (3) ISSN 0556-2813
[Artikel], (2012)

Baier, Harald ; Dichtelmüller, Christian :
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
DACH Security 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis :
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2012)

Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. :
Towards a more Secure Border Control with 3D Face Recognition.
the 5th Norsk Informasjons Sikkerhets Konferanse (NISK)
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard :
The Transitivity of Trust Problem in the Interaction of Android Applications.

[Report], (2012)

Bartsch, Steffen :
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
[Dissertation]

Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin :
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.

[Norm, Patent, Standard], (2012)

Berchtold, Waldemar ; Schäfer, Marcel :
Rebound on Symmetric Tardos Codes.
Proceeding of The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Safe and Practical Decoupling of Aspects with Join Point Interfaces.

[Report], (2012)

Bodden, Eric ; Thies, Andreas :
RefaFlex: Safer Refactorings for Reflective Java Programs.
International Symposium on Software Testing and Analysis (ISSTA 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) :

Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[Konferenz- oder Workshop-Beitrag], (2012)

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) :

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science , 7092 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Konferenz- oder Workshop-Beitrag], (2011)

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) :

XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS (7071). Springer Berlin / Heidelberg
[Konferenz- oder Workshop-Beitrag], (2011)

Breitinger, Frank ; Baier, Harald :
Performance Issues about Context-Triggered Piecewise Hashing.
3rd International ICST Conference on Digital Forensics & Cyber Crime
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) :

Scalable Trust Establishment with Software Reputation.
Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric :
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
[Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[Konferenz- oder Workshop-Beitrag], (2011)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
Schartner, Peter ; Taeger, Jürgen (eds.) :

Mobile Authentisierung und Signatur.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven syssec Verlag
[Konferenz- oder Workshop-Beitrag], (2011)

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang :
Der elektronische Safe als vertrauenswürdiger Cloud Service.

[Report], (2011)

Bartsch, Steffen :
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
NSS '11: Proceedings of the 5th International Conference on Network and System Security IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2011)

Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn :
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
DACH Security 2011
[Konferenz- oder Workshop-Beitrag], (2011)

Bartsch, Steffen :
Practitioners Perspectives on Security in Agile Development.
FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric :
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
[Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf]
In: WODA '11: International Workshop on Dynamic Analysis. ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (eds.) :

PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: Distributed Computing and Networking: 12th International Conference, ICDCN 2011 , 6522
[Konferenz- oder Workshop-Beitrag], (2011)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) :

On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS) (6737). Springer Berlin / Heidelberg
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric :
Defining Access Control Policies as Tracematches.

[Report], (2011)

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (eds.) :

Interactive Access Rule Learning for Access Control: Concepts and Design.
International Journal On Advances in Intelligent Systems
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

[Report], (2011)

Bodden, Eric :
Closure Joinpoints: Block joinpoints without surprises.
[Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf]
In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development. ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing :
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD)
[Artikel], (2011)

Bartsch, Steffen :
An Authorization Enforcement Usability Case Study.
ESSoS 2011 Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin :
Collusion-secure patchwork embedding for transaction watermarking.
Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira :
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
[Online-Edition: http://doi.acm.org/10.1145/1985793.1985827]
In: International Conference on Software Engineering, 21-28 May 2011, Waikiki, Honolulu, HI, USA. Proceedings of the 33rd International Conference on Software Engineering New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2011)

Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
Bishop, Judith ; Vallecillo, Antonio (eds.) :

An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-21952-8_11]
In: Objects, Models, Components, Patterns. Lecture Notes in Computer Science, 6705. Springer, Berlin / Heidelberg , pp. 131-146. ISSN 0302-9743
[Buchkapitel], (2011)

Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin :
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
[Online-Edition: http://doi.acm.org/10.1145/2095050.2095101]
In: 5th workshop on Virtual Machines and Intermediate Languages, 24 Oct 2011, Portland, OR, USA. In: SPLASH '11 Workshops . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2011)

Baier, Harald ; Breitinger, Frank :
Security Aspects of Piecewise Hashing in Computer Forensics.
6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin :
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
The 7th International Symposium on Applied Reconfigurable Computing, Belfast, UK
[Konferenz- oder Workshop-Beitrag], (2011)

Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan :
Physically Uncloneable Functions in the Universal Composition Framework.
Advances in Cryptography (CRYPTO 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
Detecting Computer Worms in the Cloud.
Open Problems in Network Security (iNetSec 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric ; Hendren, Laurie :
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer)
[Artikel], (2011)

Berjani, Betim ; Strufe, Thorsten :
A Recommendation System for Spots in Location-Based Online Social Networks.
Proceedings of the Eurosys Workshop on Social Network Systems
[Konferenz- oder Workshop-Beitrag], (2011)

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael :
Data network and method for checking nodes of a data network.

[Norm, Patent, Standard], (2011)

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian :
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems. IARIA , pp. 234-244.
[Buchkapitel], (2011)

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) :

Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science , 6498 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems
[Konferenz- oder Workshop-Beitrag], (2010)

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira :
IDE 2.0: Collective Intelligence in Software Development.
[Online-Edition: http://www.bodden.de/pubs/bbmm10ide.pdf]
In: FSE/SDP Workshop on the Future of Software Engineering. ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian :
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
In: ComputationWorld 2010 .
[Konferenz- oder Workshop-Beitrag], (2010)

Bugiel, Sven ; Ekberg, Jan-Erik :
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique :
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Lecture Notes in Informatics . Gesellschaft fuer Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2010)

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max :
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.

[Report], (2010)

Bartsch, Steffen :
A calculus for the qualitative risk assessment of policy override authorization.
SIN: Proceedings of the 3rd international conference on Security of information and networks ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato :
The uncertainty principle in the presence of quantum memory.
In: Nature Physics
[Artikel], (2010)

Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. :
The PUF Promise.
3rd International Conference on Trust and Trustworthy Computing (TRUST 2010) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
Bernstein, Daniel ; Lange, Tanja (eds.) :

Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS (6055). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Bedner, Mark :
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR) pp. 339-345.
[Artikel], (2010)

Buchmann, Johannes ; Wiesmaier, Alexander :
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor (17) pp. 21-23.
[Artikel], (2010)

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique :
Unlinkability of Sanitizable Signatures.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan :
Attribute-based Encryption with Break-Glass.
In: Lecture Notes in Computer Science , 6033 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Bulygin, Stanislav ; Brickenstein, Michael :
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3) pp. 185-200.
[Artikel], (2010)

Bulygin, Stanislav ; Pellikaan, Ruud
Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (eds.) :

Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory. World Scientific , pp. 585-622. ISBN 978-981-283-716-5
[Buchkapitel], (2010)

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira :
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.

[Report], (2010)

Bartsch, Steffen :
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
SecSE: Fourth International Workshop on Secure Software Engineering IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2010)

Baier, Harald ; Busch, Christoph
Hochschule Darmstadt (3094) (ed.) :

CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung.
[Buchkapitel], (2010)

Backs, Christian :
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
TU Darmstadt
[Masterarbeit], (2010)

Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas :
Optimizing the evaluation of patterns in pointcuts.
[Online-Edition: http://doi.acm.org/10.1145/1941054.1941056]
In: Workshop on Virtual Machines and Intermediate Languages, 17 Oct 2010, Reno, Nevada, USA. Proceedings of the 4th workshop on Virtual Machines and Intermediate Languages ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2010)

Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert :
Quasi-dyadic CFS signatures.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Buchmann, Johannes:
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg , p. 274. ISBN 9783642111853
[Buch], (2010)

Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter :
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2) 23--32.
[Artikel], (2010)

Bedner, Mark ; Ackermann, Tobias :
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5) pp. 323-328.
[Artikel], (2010)

Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne :
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Breitinger, Frank ; Nickel, Claudia :
User Survey on Phone Security and Usage.
BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures
[Konferenz- oder Workshop-Beitrag], (2010)

Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing :
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.

[Konferenz- oder Workshop-Beitrag], (2010)

Busch, Christoph ; Hartung, Daniel :
Biometrische Nachrichten-Authentisierung.

[Konferenz- oder Workshop-Beitrag], (2010)

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander :
Towards a mobile eCard Client.
13. Kryptotag
[Konferenz- oder Workshop-Beitrag], (2010)

Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul :
PUF-Based Authentication Protocols, Revisited.
International Workshop on Information Security Applications (WISA'09)
[Konferenz- oder Workshop-Beitrag], (2009)

Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan :
Foundations of Non-Malleable Hash and One-Way Functions.
In: Lecture Notes in Computer Science , 5912 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bras-Amoros, Maria ; Bulygin, Stanislav :
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3) pp. 561-574.
[Artikel], (2009)

Bulygin, Stanislav ; Pellikaan, Ruud :
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, Special Issue "Gröbner Ba (Issue 12) pp. 1626-1643.
[Artikel], (2009)

Braun, Johannes :
Nutzung des elektronischen Personalausweises im eCommerce.
TU Darmstadt
[Masterarbeit], (2009)

Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian :
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
In: 7th ESCAR Embedded Security in Cars Conference, Düsseldorf
[Konferenz- oder Workshop-Beitrag], (2009)

Bedner, Mark :
Rechtmäßigkeit der "Deep Packet Inspection".

[Anderes], (2009)

Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (eds.) :

BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
BIOSIG 2009
[Konferenz- oder Workshop-Beitrag], (2009)

Baier, Harald ; Straub, Tobias :
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Tagungsband Informatik 2009 LNI
[Konferenz- oder Workshop-Beitrag], (2009)

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten :
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6) pp. 831-844.
[Artikel], (2009)

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten :
PSP : private and secure payment with RFID WPES 2009.
WPES 2009, Workshop on Privacy in the Electronic Society
[Konferenz- oder Workshop-Beitrag], (2009)

Busch, Christoph :
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications
[Konferenz- oder Workshop-Beitrag], (2009)

Busch, Christoph :
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung pp. 132-141.
[Artikel], (2009)

Busch, Christoph :
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5
[Artikel], (2009)

Busch, Christoph ; Reimer, Helmut :
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD) (5)
[Artikel], (2009)

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique :
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Lecture Notes in Informatics . Gesellschaft fuer Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2009)

Buchmann, Johannes ; Roßnagel, Alexander :
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9 pp. 543-548.
[Artikel], (2009)

Baier, Harald ; Karatsiolis, Vangelis :
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI2009 - Sixth European Workshop on Public Key Services, Applications and Infrastructures Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Baier, Harald ; Straub, Tobias :
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009 (6th workshop on biometrics and electronic signatures) LNI
[Konferenz- oder Workshop-Beitrag], (2009)

Bulygin, Stanislav:
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Südwestdeutscher Verlag für Hochschulschriften ISBN 978-3-8381-0948-0
[Buch], (2009)

Bender, Jens ; Fischlin, Marc ; Kügler, Dennis :
Security Analysis of the PACE Key-Agreement Protocol.
In: Lecture Notes in Computer Science , 5735 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Buchmann, Johannes ; Karatsiolis, Vangelis :
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5) pp. 378-384.
[Artikel], (2009)

Bulygin, Stanislav :
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern
[Dissertation]

Biere, Thomas ; Schindler, Werner
Horster, P. ; Schartner, P. (eds.) :

Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
In: D-A-CH Security syssec
[Konferenz- oder Workshop-Beitrag], (2009)

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten :
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99
[Artikel], (2009)

Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi :
Demonstration of first response communication sandbox.
Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
[Konferenz- oder Workshop-Beitrag], (2009)

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten :
Supporting Agile Development of Authorization Rules for SME Applications.
TrustCol: 3rd International Workshop on Trusted Collaboration Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bodden, Eric ; Chen, Feng ; Rosu, Grigore :
Dependent advice: A general approach to optimizing history-based aspects.
In: ACM, 2009, AOSD ’09: Proceedings of pages 3–14.
[Artikel], (2009)

Bulygin, Stanislav ; Pellikaan, Ruud
Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (eds.) :

Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography. Springer , pp. 361-365. ISBN 978-3-540-93805-7
[Buchkapitel], (2009)

Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin :
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
18th Intl. World Wide Web Conference (WWW'09)
[Konferenz- oder Workshop-Beitrag], (2009)

Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten :
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1)
[Artikel], (2009)

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael :
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
[Artikel], (2009)

Bedner, Mark :
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009 p. 372.
[Artikel], (2009)

Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut :
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
Proc. of International Conference on Formal Engineering Methods (ICFEM)
[Konferenz- oder Workshop-Beitrag], (2009)

Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph :
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5
[Artikel], (2009)

Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian :
Security of Sanitizable Signatures Revisited.
Public Key Cryptography (PKC 2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max :
First Response Communication Sandbox.
In: 11th Communications and Networking Simulation Symposium pp. 115-122.
[Artikel], (2008)

Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max :
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.

[Report], (2008)

Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely :
Incremental Pattern Matching in the VIATRA Model Transformation System.
Proc. of the 3rd International Workshop on Graph and Model Transformation
[Konferenz- oder Workshop-Beitrag], (2008)

Brickenstein, Michael ; Bulygin, Stanislav
Faugere, J.-C. ; Wang, D. (eds.) :

Attacking AES via Solving Systems in the Key Variables Only.
First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30
[Konferenz- oder Workshop-Beitrag], (2008)

Bartsch, Steffen ; Bormann, Carsten
Horster, Patrick (ed.) :

Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
D.A.CH. Security 2008 syssec Verlag
[Konferenz- oder Workshop-Beitrag], (2008)

Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair :
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008
[Artikel], (2008)

Bodden, Eric ; Havelund, Klaus :
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008) pages 155–165.
[Artikel], (2008)

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
Buchmann, Johannes ; Ding, Jintai (eds.) :

Merkle Tree Traversal Revisited.
In: LNCS (5299). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Bulygin, Stanislav ; Pellikaan, Ruud :
Decoding error-correcting codes with Groebner bases.
Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25
[Konferenz- oder Workshop-Beitrag], (2007)

Backes, Michael ; Basin, David ; Waidner, Michael :
Preface.
In: Journal of Computer Security, 15 (6) p. 561.
[Artikel], (2007)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12) 1685--1720.
[Artikel], (2007)

Bulygin, Stanislav :
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10) pp. 4664-4669.
[Artikel], (2006)

Bulygin, Stanislav :
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern
[Masterarbeit], (2006)

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.

[Norm, Patent, Standard], (2006)

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael :
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006)
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Non-determinism in multi-party computation.

[Report], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS '06 (European Symposium on Research in Computer Security) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Formal Methods and Cryptography.
FM 2006: Formal Methods Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Soundness limits of Dolev-Yao models.

[Report], (2006)

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael :
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.

[Norm, Patent, Standard], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3) 135--154.
[Artikel], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4) 242--252.
[Artikel], (2005)

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Creating a Privacy Policy From a Process Model and Verifying the Compliance.

[Norm, Patent, Standard], (2005)

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko :
Trusted Virtual Domains: Secure Foundations for Business and IT Services.

[Report], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.

[Report], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Justifying a Dolev-Yao Model under Active Attacks.
Special Issue of International School of Foundations of Security Analysis and Design (FOSAD) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2005)

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan :
Privacy-protecting Integrity Attestation of a Computing Platform.

[Norm, Patent, Standard], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Low-Level Ideal Signatures and General Integrity Idealization.
7th Information Security Conference (ISC)
[Konferenz- oder Workshop-Beitrag], (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A General Composition Theorem for Secure Reactive Systems.
Theory of Cryptography Conference (TCC) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2004)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4) 589--617.
[Artikel], (2004)

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.

[Norm, Patent, Standard], (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
6th Information Security Conference (ISC) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
ESORICS 2003 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library.

[Report], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library with Nested Operations.
10th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Security in Business Process Engineering.
Conference on Business Process Management (BPM 2003) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2003)

Bulygin, Stanislav :
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics (2) pp. 24-28.
[Artikel], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Fairness and Liveness.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag], (2002)

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael :
Secure Password-based Cipher Suite for TLS.
Symposium on Network and Distributed Systems Security (NDSS '00) CA, Internet Society
[Konferenz- oder Workshop-Beitrag], (2000)

Baum-Waidner, Birgit ; Waidner, Michael :
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
27th International Colloquium on Automata, Languages and Programming (ICALP' 2000) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2000)

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael :
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4) 611--627.
[Artikel], (2000)

Baum-Waidner, Birgit ; Waidner, Michael :
Optimistic Asynchronous Multi-Party Contract Signing.

[Report], (1998)

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
iKP -- a family of secure electronic payment protocols.
Proc. First USENIX Workshop on Electronic Commerce
[Konferenz- oder Workshop-Beitrag], (1995)

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; de Rooij, Peter ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael :
The ESPRIT Project CAFE - High Security Digital Payment Systems.
The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875, Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1994)

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael :
A remark on a signature scheme where forgery can be proved.
Eurocrypt '90, LNCS 473 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1991)

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael :
Unconditional Byzantine Agreement with Good Majority.
STACS '91, LNCS 480 Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag], (1991)

C

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes], (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes], (2017)

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias :
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le :
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6) pp. 749-762.
[Artikel], (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max :
ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems.
IEEE Conference on Communications and Network Security (CNS) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[Konferenz- oder Workshop-Beitrag], (2015)

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas :
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.

[Report], (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf :
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin :
NoPhish App Evaluation: Lab and Retention Study.
NDSS Workshop on Usable Security 2015 Internet Society
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Konferenz- oder Workshop-Beitrag], (2015)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max :
Community-based Collaborative Intrusion Detection.
International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm) Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2015)

Charfi, Ahmed :
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt
[Masterarbeit], (2014)

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon :
Poster: Password Entering and Transmission Security.

[Anderes], (2014)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) :

NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science , 8743 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
Analyzing the Effectiveness of DoS Attacks on Tor.
7th International Conference on Security of Information and Networks (SIN 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
A Survey on Tor and I2P.
Ninth International Conference on Internet Monitoring and Protection (ICIMP2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil :
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) pp. 1-6.
[Artikel], (2014)

Classen, Jiska :
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt
[Masterarbeit], (2014)

Conrad, Bernd :
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt
[Masterarbeit], (2014)

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza :
A trusted versioning file system for passive mobile storage devices.
J. Network and Computer Applications
[Konferenz- oder Workshop-Beitrag], (2014)

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias :
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP) pp. 92-107.
[Artikel], (2014)

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias :
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5) pp. 695-707.
[Artikel], (2013)

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil :
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3) pp. 353-371.
[Artikel], (2013)

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela :
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3) 105–116.
[Artikel], (2013)

Christin, Delphine ; Büchner, C. ; Leibecke, N. :
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop)
[Konferenz- oder Workshop-Beitrag], (2013)

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick :
Provably Secure LWE-Encryption with Uniform Secret.

[Anderes], (2013)

Christin, Delphine ; Hollick, Matthias
Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (eds.) :

European Data Protection: Coming of Age.
In: Keine Angabe Springer Netherlands , 203–222.
[Buchkapitel], (2013)

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian :
k-anonymous reputation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13 ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias :
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN)
[Konferenz- oder Workshop-Beitrag], (2013)

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. :
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM)
[Konferenz- oder Workshop-Beitrag], (2012)

Christin, Delphine ; Büttner, C. ; Repp, Nicolas :
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp)
[Konferenz- oder Workshop-Beitrag], (2012)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Véron, Pascal ; Hoffmann, Gerhard :
An improved threshold ring signature scheme based on error correcting codes.
In: WAIFI 2012, LNCS (7369) 45 - 63.
[Artikel], (2012)

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (eds.) :

Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP). LNCS, 7322. Springer , pp. 71-86. ISBN 978-3-642-30954-0
[Buchkapitel], (2012)

Christin, Delphine ; Bentolila, A. ; Hollick, Matthias :
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU)
[Konferenz- oder Workshop-Beitrag], (2012)

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil :
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom)
[Konferenz- oder Workshop-Beitrag], (2012)

Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York :
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.

[Report], (2012)

Cooper, N. ; Reichel, F. ; Werner, V. ; Bettermann, L. ; Alikhani, B. ; Aslanidou, S. ; Bauer, C. ; Coquard, L. ; Fritzsche, M. ; Fritzsche, Y. ; Glorius, J. ; Goddard, P. ; Möller, T. ; Pietralla, N. ; Reese, M. ; Romig, C. ; Savran, D. ; Schnorrenberger, L. ; Siebenhühner, F. ; Simon, V. ; Sonnabend, K. ; Smith, M. ; Walz, C. ; Yates, S. ; Yevetska, O. ; Zweidinger, M. :
Photoresponse of ^{76}Se below 9 MeV.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.034313]
In: Physical Review C, 86 (3) ISSN 0556-2813
[Artikel], (2012)

Cuong, N. ; Katzenbeisser, Stefan :
Robust Resampling Detection in Digital Images.
Conference on Communications and Multimedia Security (CMS 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias :
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11) pp. 1928-1946.
[Artikel], (2011)

Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil :
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Recent Progress in Code-Based Cryptography.
In: LNCS (200). Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger :
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
[Artikel], (2011)

Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias :
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU)
[Konferenz- oder Workshop-Beitrag], (2011)

Coquard, L. ; Rainovski, G. ; Pietralla, N. ; Ahn, T. ; Bettermann, L. ; Carpenter, M. ; Janssens, R. ; Leske, J. ; Lister, C. ; Möller, O. ; Möller, T. ; Rother, W. ; Werner, V. ; Zhu, S. :
O(6)-symmetry breaking in the γ-soft nucleus ^{126}Xe and its evolution in the light stable xenon isotopes.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.83.044318]
In: Physical Review C, 83 (4) ISSN 0556-2813
[Artikel], (2011)

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael :
GPU Implementation of the Keccak Hash Function Family.
ISA 2011 - The 5th International Conference on Information Security and Assurance
[Konferenz- oder Workshop-Beitrag], (2011)

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael :
GPU Implementation of the Keccak Hash Function Family.
The 5th International Conference on Information Security and Assurance - ISA 2011
[Konferenz- oder Workshop-Beitrag], (2011)

Canova, Gamze :
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
TU Darmstadt
[Masterarbeit], (2011)

Cuong, N. ; Katzenbeisser, Stefan :
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
International Workshop on Digital Forensics and Watermarking (IWDW 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Cuong, N. ; Katzenbeisser, Stefan :
Security of Copy-Move Forgery Detection Techniques.
International Conference on Acoustics, Speech and Signal Processing (ICASSP'11) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2011)

Christin, Delphine ; Hollick, Matthias :
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11)
[Konferenz- oder Workshop-Beitrag], (2011)

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Reducing access to sensitive information.

[Norm, Patent, Standard], (2011)

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg :
Improved Zero-knowledge Identification with Lattices.
In: LNCS (6402). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes :
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS , 6531 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel :
Return-Oriented Programming without Returns.
In: CCS '10 . ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias :
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
Proceedings of 9th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Würzburg, Germany
[Konferenz- oder Workshop-Beitrag], (2010)

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark :
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Cayrel, Pierre-Louis ; Véron, Pascal ; Alaoui, Sidi Mohamed El Yousfi :
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg :
A Lattice-Based Threshold Ring Signature Scheme.
In: LNCS (6212). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Cayrel, Pierre-Louis ; Meziani, Mohammed :
Post-Quantum Cryptography: Code-based Signatures.
In: 4th International Conference on Information Security and Assurance ISA 2010 , Lecture Notes in Computer (6059)
[Konferenz- oder Workshop-Beitrag], (2010)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel :
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5 pp. 289-298.
[Artikel], (2010)

Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias :
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2 pp. 96-125.
[Artikel], (2010)

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi :
Dual Construction of Stern-based Signature Schemes.
In: International Conference on Cryptography, Coding and Information Security ICCCIS 2010 , 63 March 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Cayrel, Pierre-Louis ; Strenzke, Falko :
Side channels attacks in code-based cryptography.
In: International Workshop on Constructive Side-Channel Analysis and Secure Design COSADE 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
Furht, Borko (ed.) :

Handbook of Social Network Technologies and Applications.
In: Keine Angabe Springer
[Buchkapitel], (2010)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
Proceedings of the 6th International IFIP AICT 320 Summer School
[Konferenz- oder Workshop-Beitrag], (2010)

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing :
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
International Conference on Trusted Systems (INTRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Charnes, Christopher
Atallah, Mikhail ; Blanton, Marina (eds.) :

Algorithms and Theory of Computation Handbook.
In: Keine Angabe Chapman & Hall/CRC Applied Algorithms and Data Structures series, 2. ISBN 978-1-58488-820-8
[Buchkapitel], (2009)

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Transparent Mobile Storage Protection in Trusted Virtual Domains.
23rd Large Installation System Administration Conference (LISA '09)
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Leveraging social links for trust and privacy in networks.
INetSec 2009 Open Research Problems in Network Security
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Privacy preserving social networking through decentralization.
WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services
[Konferenz- oder Workshop-Beitrag], (2009)

Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira :
A Plugin-Architecture for Self-Adaptive WS Compositions.
Proceedings of the IEEE 7th International Conference on Web Services (ICWS 2009) IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Leveraging Social Links for Trust and Privacy in Networks.
INetSec, Open Research Problems in Network Security
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Privacy Preserving Social Networking Through Decentralization.
6th International Conference on Wireless On-demand Network Systems and Services (WONS)
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications
[Konferenz- oder Workshop-Beitrag], (2009)

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten :
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12) 94 -- 101.
[Artikel], (2009)

Camenisch, Jan ; Waidner, Michael :
Minimizing information gathered by access decision engines in access control systems.

[Norm, Patent, Standard], (2004)

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael :
Anonymous Access to a Service.

[Norm, Patent, Standard], (2003)

Camenisch, Jan ; Waidner, Michael :
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
[Artikel], (2001)

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd :
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.

[Report], (1995)

D

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel :
Perun: Virtual Payment Hubs over Cryptocurrencies.
[Online-Edition: https://www.ieee-security.org/TC/SP2018/]
In: 39th IEEE Symposium on Security and Privacy, MAY 21-23, 2018, THE HYATT REGENCY, SAN FRANCISCO, CA. IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2019)

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian :
FairSwap: How to fairly exchange digital goods.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina :
General State Channel Networks.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil :
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies IEEE
[Konferenz- oder Workshop-Beitrag], (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

Deckwerth, Frederik :
Static Verification Techniques for Attributed Graph Transformations.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6150]
Technische Universität , Darmstadt
[Dissertation], (2016)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Dix, Isabella :
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt
[Masterarbeit], (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 pp. 42-53. ISSN 0140-3664
[Artikel], (2016)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch], (2015)

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian :
Learning With Errors in the Exponent.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin :
Toward a Just-in-Time Static Analysis.
In:
[Artikel], (2015)

Demirel, Denise ; Lancrenon, Jean :
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.

[Report], (2015)

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis :
A View on Privacy & Trust in IoT.
In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK. IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Dogan, Ferit :
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt
[Masterarbeit], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Konferenz- oder Workshop-Beitrag], (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2015)

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max :
Twitterize: Anonymous Micro-Blogging.
In: International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA). Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), International Workshop on Internet of Things, Systems, Management and Security (IOTSMS) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2014)

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung :
The Cubic Simple Matrix Encryption Scheme.
In: LNCS (8772). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS (9024). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; El Bansarkhani, Rachid ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter :
High-speed signatures from standard lattices.
Latincrypt 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel], (2014)

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[Konferenz- oder Workshop-Beitrag], (2014)

do Carmo, Rodrigo ; Hollick, Matthias :
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014) IEEE/IFIP
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.

[Report], (2014)

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
FC'2014: Financial Cryptography and Data Security Conference
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Second Look at Fischlin’s Transformation.
Africacrypt 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Fischlin, Marc :
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
ISIT 2014 - IEEE International Symposium on Information Theory
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive
[Artikel], (2013)

Demmler, Daniel :
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt
[Masterarbeit], (2013)

Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (eds.) :

Distributed and Anonymous Publish-Subscribe.
The 7th International Conference on Network and System Security (NSS 2013) Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

do Carmo, Rodrigo ; Hollick, Matthias :
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
[Artikel], (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
[Artikel], (2013)

Demirel, Denise ; Henning, Maria ; van de Graaf, Jeroen ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) :

Prêt à Voter Providing Everlasting Privacy.
In: LNCS (7985). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in the Quantum World.
ASIACRYPT 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Demirel, Denise :
Universally Veriable Poll-Site Voting Schemes Providing Everlasting Privacy.
TU Darmstadt
[Dissertation]

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[Konferenz- oder Workshop-Beitrag], (2012)

do Carmo, R. ; Werner, M. ; Hollick, Matthias :
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet)
[Konferenz- oder Workshop-Beitrag], (2012)

Demirel, Denise ; Henning, Maria
Weblaw, Editions (ed.) :

Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
[Artikel], (2012)

Demirel, Denise ; van de Graaf, Jeroen ; Araújo, Roberto :
Improving Helios with Everlasting Privacy Towards the Public.
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18 pp. 1-14.
[Artikel], (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel :
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
POSTER: Control-Flow Integrity for Smartphones.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie :
Feasibility Analysis of Pret a Voter for German Federal Elections.
3rd international conference on e-voting and identity (VoteID 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie :
Readiness of various eVoting systems for complex elections.

[Report], (2011)

Demmler, Daniel :
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt
[Bachelorarbeit], (2011)

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J ; Noella, Edelmann (eds.) :

Voting software to support election preparation, counting, and tallying.
CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag], (2011)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Security Architecture for Accessing Health Records on Mobile Phones.
HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics
[Konferenz- oder Workshop-Beitrag], (2011)

Danchev, M. ; Rainovski, G. ; Pietralla, N. ; Gargano, A. ; Covello, A. ; Baktash, C. ; Beene, J. ; Bingham, C. ; Galindo-Uribarri, A. ; Gladnishki, K. ; Gross, C. ; Ponomarev, V. ; Radford, D. ; Riedinger, L. ; Scheck, M. ; Stuchbery, A. ; Wambach, J. ; Yu, C.-H. ; Zamfir, N. :
One-phonon isovector 2_{1,MS}^{+} state in the neutron-rich nucleus ^{132}Te.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.84.061306]
In: Physical Review C, 84 (6) ISSN 0556-2813
[Artikel], (2011)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED). Leuven, Belgium
[Buchkapitel], (2011)

Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie :
Vertrauensbildung bei Internetwahlen.
Digma - Zeitschrift für Datenrecht und Informationssicherheit
[Konferenz- oder Workshop-Beitrag], (2011)

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian :
Trust-based Content Distribution for Mobile Ad Hoc Networks.
19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2011) [to appear]
[Konferenz- oder Workshop-Beitrag], (2011)

Dmitrienko, Alexandra ; Hadzic, Zecir ; Lhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the Access to Electronic Health Records on Mobile Phones.
Biomedical Engineering Systems and Technologies
[Konferenz- oder Workshop-Beitrag], (2011)

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Secure Computations on Real-Valued Signals.
IEEE Workshop on Information Forensics and Security (WIFS'10) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2010)

Dagdelen, Özgür ; Fischlin, Marc :
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Privilege Escalation Attacks on Android.
ISC 2010: Proceedings of the 13th Information Security Conference
[Konferenz- oder Workshop-Beitrag], (2010)

Demirel, Denise :
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
TU Darmstadt
[Masterarbeit], (2010)

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Return-Oriented Programming without Returns on ARM.

[Report], (2010)

Dagdelen, Özgür ; Schneider, Michael :
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS , 6272 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.

[Report], (2010)

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Towards Secure Bioinformatics Services.
Financial Cryptography and Data Security (FC2011)
[Konferenz- oder Workshop-Beitrag], (2010)

Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
Furht, Borko (ed.) :

Handbook of Social Network Technologies and Applications.
In: Keine Angabe Springer
[Buchkapitel], (2010)

Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph :
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
[Konferenz- oder Workshop-Beitrag], (2010)

Dahmen, Erik ; Krauß, Christoph
Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (eds.) :

Short Hash-Based Signatures for Wireless Sensor Networks.
In: LNCS (5888). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Deußer, Clemens ; Reubold, Jan :
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt
[Masterarbeit], (2009)

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09 . ACM
[Konferenz- oder Workshop-Beitrag], (2009)

Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj :
Efficient Robust Storage Using Secret Tokens.
11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
[Konferenz- oder Workshop-Beitrag], (2009)

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Buchmann, Johannes ; Ding, Jintai (eds.) :

Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS (5299). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
Horster, Patrick (ed.) :

Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
D.A.CH. Security 2008 syssec Verlag
[Konferenz- oder Workshop-Beitrag], (2008)

E

Erbenich, Vanessa :
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt
[Masterarbeit], (2016)

Engel, Andreas :
A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-Intensive Distributed Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5778]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2015)

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes :
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes :
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive p. 20.
[Artikel], (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) :

Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS (8469). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes :
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
IACR Cryptology ePrint Archive 2014: 334
[Konferenz- oder Workshop-Beitrag], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS (8282).
[Konferenz- oder Workshop-Beitrag], (2013)

Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya :
Ethical Considerations When Employing Fake Identities for Research in OSN.
In:
[Artikel], (2013)

Egert, Rolf :
Lattice-based Signatures.
TU Darmstadt
[Masterarbeit], (2013)

El Bansarkhani, Rachid ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael :
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53 pp. 81-102.
[Artikel], (2012)

Engels, Heinrich-Alexander :
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt
[Masterarbeit], (2012)

Enders, J.
Oberstedt, S. (ed.) :

Reactions induced by real photons for nuclear structure and nuclear astrophysics.
In: Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011). In: Physics Procedia , 31 Elsevier Science BV , Amsterdam
[Konferenz- oder Workshop-Beitrag], (2012)

Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Göök, A. ; von Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S.
Oberstedt, S (ed.) :

Development of an active ²³⁸UF₆ gas target.
In: Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011). In: Physics Procedia , 31 Elsevier Science BV , Amsterdam
[Konferenz- oder Workshop-Beitrag], (2012)

Endres, J. ; Savran, D. ; Butler, P. ; Harakeh, M. ; Harissopulos, S. ; Herzberg, R.- D. ; Krücken, R. ; Lagoyannis, A. ; Litvinova, E. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Schlüter, F. ; Sonnabend, K. ; Stoica, V. ; Wörtche, H. ; Zilges, A. :
Structure of the pygmy dipole resonance in ^{124}Sn.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.85.064331]
In: Physical Review C, 85 (6) ISSN 0556-2813
[Artikel], (2012)

El Bansarkhani, Rachid ; Meziani, Mohammed :
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Eichberg, Michael ; Sewe, Andreas :
Encoding the Java Virtual Machine's Instruction Set.
[Online-Edition: http://dx.doi.org/10.1016/j.entcs.2011.02.004]
In: Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010), 27 Mar 2010, Paphos, Cyprus. In: Electronic Notes in Theoretical Computer Science , 264 (4)
[Konferenz- oder Workshop-Beitrag], (2011)

Enders, J. ; Litvinova, E. ; Savran, D. ; Butler, P. A. ; Harakeh, M. N. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Sonnabend, K. ; Stoica, V. I. ; Wörtche, H. J. ; Zilges, A. :
Isospin Character of the Pygmy Dipole Resonance in 124Sn.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevLett.105.212503]
In: Physical Review Letters, 105 (21) p. 212503. ISSN 0031-9007
[Artikel], (2010)

Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel :
History-Free Aggregate Message Authentication Codes.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (eds.) :

A Task-based Messaging Approach To Facilitate Staff Work.
Proceedings of the 7th International Conference on Information Systems for Crisis Response and Management. International Conference on Information Systems for Crisis Response and Management (ISCRAM-2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Ekberg, Jan-Erik ; Bugiel, Sven :
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
4th Annual Workshop on Scalable Trusted Computing (STC2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas :
Privacy-Preserving Face Recognition.
Privacy Enhancing Technologies Symposium (PETS 2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Eu, Joy Boy Joy :
Specification of Dependable Trusted Third Parties.

[Report], (2001)

F

Franke, Fabian :
Learning the Beams.
TU Darmstadt
[Masterarbeit], (2018)

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP p. 1.
[Artikel], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag], (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017 , München
[Konferenz- oder Workshop-Beitrag], (2017)

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat :
Consumer oriented privacy preserving access control for electronic health records in the cloud.
IEEE cloud
[Konferenz- oder Workshop-Beitrag], (2016)

Falzon, Kevin ; Bodden, Eric
Lopez, Javier ; Mitchell, Chris J. (eds.) :

Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Information Security Conference, Trondheim. In: Lecture Notes in Computer Science , 9290 .
[Konferenz- oder Workshop-Beitrag], (2015)

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max :
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), poster proceedings IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Follner, Andreas ; Bodden, Eric :
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.

[Report], (2015)

Faraon, Montathar ; Stenberg, Georg J H ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) :

Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government Münster: Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag], (2014)

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Konferenz- oder Workshop-Beitrag], (2014)

Franke, Daniel :
Risk Simulations for the Web PKI.
TU Darmstadt
[Masterarbeit], (2014)

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut :
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Compiler Construction (CC)2014, Lecture Notes in Computer Science
[Konferenz- oder Workshop-Beitrag], (2014)

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof :
Robust Multi-Property Combiners for Hash Functions.
J. Cryptology
[Konferenz- oder Workshop-Beitrag], (2014)

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul :
Distributed Finite-State Runtime Monitoring with Aggregated Events.
In: Runtime Verification 2013 (RV'13), LNCS
[Artikel], (2013)

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Highly Precise Taint Analysis for Android Applications.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report], (2013)

Funke, Sebastian :
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
[Masterarbeit], (2013)

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. :
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3) pp. 117-128.
[Artikel], (2013)

Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj :
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS)
[Konferenz- oder Workshop-Beitrag], (2013)

Fontein, Felix ; Schneider, Michael ; Wagner, Urs :
A Polynomial Time Version of LLL With Deep Insertions.
International Workshop on Coding and Cryptography - WCC 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Fischlin, Marc ; Onete, Cristina :
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Falzon, Kevin ; Pace, Gordon J.
Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (eds.) :

Combining Testing and Runtime Verification.
[Online-Edition: http://www.di.uminho.pt/mompes]
In: 8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, September 04, 2012, Essen, Germany.
[Konferenz- oder Workshop-Beitrag], (2012)

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian :
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
[Konferenz- oder Workshop-Beitrag], (2012)

Faber, Natalie :
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt
[Masterarbeit], (2012)

Fuhrmann, Tino :
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt
[Masterarbeit], (2012)

Filtschew, Konstantin :
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt
[Masterarbeit], (2012)

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian :
Curve-based Planar Graph Routing in Multihop Wireless Networks.
8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
[Konferenz- oder Workshop-Beitrag], (2011)

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie :
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11) IEEE
[Konferenz- oder Workshop-Beitrag], (2011)

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie :
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy p. 14.
[Artikel], (2011)

Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin :
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Franz, M. ; Katzenbeisser, Stefan :
Processing Encrypted Floating Point Signals.
Workshop on Multimedia and Security (MMSEC'11) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas :
Oblivious Outsourced Storage with Delegation.
Financial Cryptography and Data Security (FC 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael :
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1) 5--7.
[Artikel], (2011)

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael :
Online Privacy: Towards Informational Self-Determination on the Internet.
Dagstuhl Perspectives Workshop 11061 Dagstuhl Reports
[Konferenz- oder Workshop-Beitrag], (2011)

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael :
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2) 1--15.
[Artikel], (2011)

Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano :
Random Oracles With(out) Programmability.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Feller, Thomas ; Demirezen, Aziz :
Hardware Trojans: Data Leakage Using General Purpose LEDs.

[Report], (2010)

Fischlin, Marc ; Schröder, Dominique :
On the Impossibility of Three-Move Blind Signature Schemes.
In: Lecture Notes in Computer Science , 6110 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Fischlin, Marc ; Lehmann, Anja :
Hash Function Combiners in SSL and TLS.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Fischlin, Marc ; Lehmann, Anja :
Delayed-Key Message Authentication for Streams.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto :
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
Proceeding of the Seventh IASTED International Conference on Signal Processing, Pattern Recognition and Applications (SPPRA 2010), Innsbruck, Austria ACTA Press
[Konferenz- oder Workshop-Beitrag], (2010)

Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
Clavier, C. ; Gaj, K. (eds.) :

A New Side-Channel Attack on RSA Prime Generation.
In: Cryptographic Hardware and Embedded Systems, CHES 2009 Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Freiling, Felix ; Heinson, Dennis :
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9) pp. 547-552.
[Artikel], (2009)

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
A Pattern for Secure Graphical User Interface Systems.
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

Fischlin, Marc:
RSA Cryptographers' Track. Lecture Notes in Computer Science.
Springer
[Buch], (2009)

Fischlin, Marc ; Schröder, Dominique :
Security of Blind Signatures under Aborts.
Public Key Cryptography (PKC 2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia :
Measuring Unlinkability Revisited.
In: ACM Workshop on Privacy in the Electronic Society (WPES 2008) ACM
[Konferenz- oder Workshop-Beitrag], (2008)

Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas :
Designing Context-Aware HCI for Collaborative Emergency Management.
Int'l Workshop on HCI for Emergencies in conjunction with CHI 2008 (electronic proceedings)
[Konferenz- oder Workshop-Beitrag], (2008)

Field, Simon ; Waidner, Michael :
Electronic Commerce.
In: Computer Networks, 32 (6) 667--668.
[Artikel], (2000)

G

Günther, Daniel :
Private Function Evaluation with Universal Circuits.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2018)

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael :
Path MTU Discovery Considered Harmful.
[Online-Edition: http://icdcs2018.ocg.at]
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, 2.-5.7.2018, Vienna, Austria.
[Konferenz- oder Workshop-Beitrag], (2018)

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , pp. 83-98.
[Buchkapitel], (2018)

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2018)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval :
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
[Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...]
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA , Athens, Greece
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) :

Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2017)

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen :
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017 , 10292 Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit], (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colonies for Efficient and Anonymous Group Communication Systems.
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958]
2017 International Conference on Networked Systems (NetSys) IEEE , Göttingen, Germany
[Konferenz- oder Workshop-Beitrag], (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
[Online-Edition: https://ieeexplore.ieee.org/document/7983129]
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) IEEE , Las Vegas, NV, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina :
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing Springer Fachmedien Wiesbaden
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) pp. 8-26.
[Artikel], (2016)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim :
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen :
Memorable And Secure: How Do You Choose Your PIN?
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj :
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
[Konferenz- oder Workshop-Beitrag], (2015)

Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil :
A Survey of Technologies for the Internet of Things.
International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael :
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken .
[Konferenz- oder Workshop-Beitrag], (2015)

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Müller, Jan :
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
14. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Oswald, Florian :
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
14. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2015)

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen :
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1) pp. 16-21.
[Artikel], (2015)

Gerber, Paul ; Volkamer, Melanie :
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2/2015 108 - 113.
[Artikel], (2015)

Ghiglieri, Marco :
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
IEEE CCNC
[Konferenz- oder Workshop-Beitrag], (2015)

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin :
Lattice Basis Reduction Attack against Physically Unclonable Functions.
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Codes, Cryptology and Information Security Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV – aktueller Stand 2014.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Konferenz- oder Workshop-Beitrag], (2014)

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) :

Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS (8895). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco :
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.

[Anderes], (2014)

Ghiglieri, Marco :
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.

[Report], (2014)

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael :
Personal DLP for Facebook.
In: 6 . IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco ; Tews, Erik :
A Privacy Protection System for HbbTV in Smart TVs.
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Günther, Felix ; Manulis, Mark ; Peter, Andreas :
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Gutmann, Andreas ; Matsuura, Kanta :
The use of linguistics in cryptography and its application to improve the HB protocol.

[Anderes], (2013)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Konferenz- oder Workshop-Beitrag], (2013)

Gleser, Michael :
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt
[Masterarbeit], (2013)

Geihs, Matthias :
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt
[Masterarbeit], (2013)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik :
HbbTV - I Know What You Are Watching.
13. Deutschen IT-Sicherheitskongresses SecuMedia Verlags-GmbH
[Konferenz- oder Workshop-Beitrag], (2013)

Grimm, Marco ; Anderl, Reiner :
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Procedia Computer Science (16). Elsevier
[Konferenz- oder Workshop-Beitrag], (2013)

Guo, Sheng :
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.

[Report], (2013)

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David :
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
13. Deutschen IT-Sicherheitskongress SecuMedia Verlags-GmbH
[Konferenz- oder Workshop-Beitrag], (2013)

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias :
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5) pp. 631-645.
[Artikel], (2012)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias :
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
[Konferenz- oder Workshop-Beitrag], (2012)

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael :
Technical Aspects of Online Privacy.

[Report], (2012)

Göök, A. ; Eckardt, C. ; Enders, J. ; Freudenberger, M. ; von Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S. ; Richter, A.
Oberstedt, S (ed.) :

Fragment properties from fission of actinide nuclei induced by 6-10 MeV bremsstrahlung.
In: Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011). In: Physics Procedia , 31 Elsevier Science BV , Amsterdam
[Konferenz- oder Workshop-Beitrag], (2012)

Grieser, M. ; Litvinov, Yu. A. ; Raabe, R. ; Blaum, K. ; Blumenfeld, Y. ; Butler, P. A. ; Wenander, F. ; Woods, P. J. ; Aliotta, M. ; Andreyev, A. ; Artemyev, A. ; Atanasov, D. ; Aumann, T. ; Balabanski, D. ; Barzakh, A. ; Batist, L. ; Bernardes, A. -P. ; Bernhardt, D. ; Billowes, J. ; Bishop, S. ; Borge, M. ; Borzov, I. ; Bosch, F. ; Boston, A. J. ; Brandau, C. ; Catford, W. ; Catherall, R. ; Cederkäll, J. ; Cullen, D. ; Davinson, T. ; Dillmann, I. ; Dimopoulou, C. ; Dracoulis, G. ; Düllmann, Ch. E. ; Egelhof, P. ; Estrade, A. ; Fischer, D. ; Flanagan, K. ; Fraile, L. ; Fraser, M. A. ; Freeman, S. J. ; Geissel, H. ; Gerl, J. ; Greenlees, P. ; Grisenti, R. E. ; Habs, D. ; Hahn, R. ; Hagmann, S. ; Hausmann, M. ; He, J. J. ; Heil, M. ; Huyse, M. ; Jenkins, D. ; Jokinen, A. ; Jonson, B. ; Joss, D. T. ; Kadi, Y. ; Kalantar-Nayestanaki, N. ; Kay, B. P. ; Kiselev, O. ; Kluge, H. -J. ; Kowalska, M. ; Kozhuharov, C. ; Kreim, S. ; Kröll, T. ; Kurcewicz, J. ; Labiche, M. ; Lemmon, R. C. ; Lestinsky, M. ; Lotay, G. ; Ma, X. W. ; Marta, M. ; Meng, J. ; Mücher, D. ; Mukha, I. ; Müller, A. ; Murphy, A. St J. ; Neyens, G. ; Nilsson, T. ; Nociforo, C. ; Nörtershäuser, W. ; Page, R. D. ; Pasini, M. ; Petridis, N. ; Pietralla, N. ; Pfützner, M. ; Podolyák, Z. ; Regan, P. ; Reed, M. W. ; Reifarth, R. ; Reiter, P. ; Repnow, R. ; Riisager, K. ; Rubio, B. ; Sanjari, M. S. ; Savin, D. W. ; Scheidenberger, C. ; Schippers, S. ; Schneider, D. ; Schuch, R. ; Schwalm, D. ; Schweikhard, L. ; Shubina, D. ; Siesling, E. ; Simon, H. ; Simpson, J. ; Smith, J. ; Sonnabend, K. ; Steck, M. ; Stora, T. ; Stöhlker, T. ; Sun, B. ; Surzhykov, A. ; Suzaki, F. ; Tarasov, O. ; Trotsenko, S. ; Tu, X. L. ; Duppen, P. ; Volpe, C. ; Voulot, D. ; Walker, P. M. ; Wildner, E. ; Winckler, N. ; Winters, D. F. A. ; Wolf, A. ; Xu, H. S. ; Yakushev, A. ; Yamaguchi, T. ; Yuan, Y. J. ; Zhang, Y. H. ; Zuber, K. :
Storage ring at HIE-ISOLDE.
[Online-Edition: http://dx.doi.org/10.1140/epjst/e2012-01599-9]
In: The European Physical Journal Special Topics, 207 (1) p. 1. ISSN 1951-6355
[Artikel], (2012)

Göttert, Norman :
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt
[Masterarbeit], (2012)

Glorius, J. ; Knörzer, M. ; Müller, S. ; Pietralla, N. ; Sauerwein, A. ; Sonnabend, K. ; Wälzlein, C. ; Wiescher, M. :
p-process nucleosynthesis: Activation experiments.
[Online-Edition: http://dx.doi.org/10.1016/j.ppnp.2011.01.038]
In: Progress in Particle and Nuclear Physics, 66 (2) p. 379. ISSN 01466410
[Artikel], (2011)

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten :
Key Management in Distributed Online Social Networks.
Proceedings of WoWMoM/DSPAN
[Konferenz- oder Workshop-Beitrag], (2011)

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten :
Cryptographic Treatment of Private User Profiles.
15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS
[Konferenz- oder Workshop-Beitrag], (2011)

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara :
Service Automata for Secure Distributed Systems.

[Anderes], (2010)

Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. :
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
Proceedings of IEEE LCN 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Geibig, Joanna ; Bradler, Dirk :
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10)
[Artikel], (2010)

Gladnishki, K. A. ; Rainovski, G. ; Petkov, P. ; Jolie, J. ; Pietralla, N. ; Blazhev, A. ; Damyanova, A. ; Danchev, M. ; Dewald, A. ; Fransen, C. ; Hackstein, M. ; Karagyozov, D. ; Möller, O. ; Pissulla, T. ; Reese, M. ; Rother, W. ; Topchiyska, R. :
Search for one-phonon mixed-symmetry states in the radioactive nucleus 140Nd.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.82.037302]
In: Physical Review C, 82 (3) 037302. ISSN 0556-2813
[Artikel], (2010)

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique :
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Gharadaghy, Rojan :
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
TU Darmstadt
[Masterarbeit], (2010)

Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj :
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
Proc. International Symposium on Architecting Critical Systems (ISARCS)
[Konferenz- oder Workshop-Beitrag], (2010)

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (eds.) :

A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI , 167 .
[Konferenz- oder Workshop-Beitrag], (2010)

Gharadaghy, Rojan ; Volkamer, Melanie :
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI (167).
[Konferenz- oder Workshop-Beitrag], (2010)

Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf :
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
Proceedings of IFIP Wireless Days 2009
[Konferenz- oder Workshop-Beitrag], (2009)

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
4th ACM Workshop on Scalable Trusted Computing
[Konferenz- oder Workshop-Beitrag], (2009)

Gebhardt, Max ; Illies, Georg ; Schindler, Werner :
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI SecuMedia
[Konferenz- oder Workshop-Beitrag], (2009)

Ghiglieri, Marco ; Fürnkranz, Johannes :
Learning To Recognize Missing E-mail Attachments.

[Report], (2009)

Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj :
Threat Modeling and Dynamic Profiling.
In: Keine Angabe Annals of Emerging Research in Information Assurance, Security and Privacy Services. Elsevier
[Buchkapitel], (2009)

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel :
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI , 1 (133).
[Konferenz- oder Workshop-Beitrag], (2008)

Grimm, Rüdiger ; Volkamer, Melanie
Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (eds.) :

Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
GI Jahrestagung
[Konferenz- oder Workshop-Beitrag], (2008)

Grimm, Rüdiger ; Volkamer, Melanie :
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI , 131 . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2008)

Gebhardt, Max ; Illies, Georg ; Schindler, Werner
Alkassar, A. ; Siekmann, J. (eds.) :

On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
In: Lecture Notes in Informatics (P-128). Köllen
[Konferenz- oder Workshop-Beitrag], (2008)

Gebhardt, Max ; Illies, Georg ; Schindler, Werner :
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.

[Anderes], (2008)

Grimm, Rüdiger ; Volkamer, Melanie
Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (eds.) :

Trust Models for Remote Electronic Voting.
Electronic Government 7th International Conference EGOV 2008
[Konferenz- oder Workshop-Beitrag], (2008)

Grimm, Rüdiger ; Volkamer, Melanie :
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.

[Report], (2007)

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
LNI, GI (ed.) :

Security Requirements for Non-political Internet Voting.
Electronic Voting (EVOTE) 2006
[Konferenz- oder Workshop-Beitrag], (2006)

Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (ed.) :

Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI , 86 .
[Konferenz- oder Workshop-Beitrag], (2006)

H

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira :
A unified lattice model and framework for purity analyses.
[Online-Edition: http://www.ase2018.com/]
In: ASE 2018, 3.-7.9.2018, Corum, Montpellier, France. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[Konferenz- oder Workshop-Beitrag], (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit], (2018)

Heuss, Oliver :
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7337]
Technische Universität , Darmstadt
[Dissertation], (2017)

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Konferenz- oder Workshop-Beitrag], (2017)

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich :
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.

[Report], (2017)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit], (2016)

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes :
Password Requirements Markup Language.
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.

[Report], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan :
Towards Modular and Flexible Access Control on Smart Mobile Devices.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Halvani, Oren ; Winter, Christian ; Pflug, Anika :
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement) S33–S43.
[Artikel], (2016)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[Konferenz- oder Workshop-Beitrag], (2015)

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes :
PALPAS - PAsswordLess PAssword Synchronization.
International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2015)

Halvani, Oren ; Winter, Christian
Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (eds.) :

A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
In: CEUR Workshop Proceedings , Vol-1391 . Sun SITE Central Europe
[Konferenz- oder Workshop-Beitrag], (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier pp. 463-493.
[Artikel], (2015)

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg :
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM) ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj :
Event pattern discovery on IDS traces of Cloud Services.
IEEE International Conference on Big Data and Cloud Computing (BDCloud)
[Konferenz- oder Workshop-Beitrag], (2014)

Halvani, Oren ; Steinebach, Martin :
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management (2014) pp. 33-43.
[Artikel], (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Hiemenz, Benedikt :
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt
[Bachelorarbeit], (2014)

Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (eds.) :

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: LNI (228).
[Konferenz- oder Workshop-Beitrag], (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.

[Report], (2014)

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie :
Öffentlichkeitsgrundsatz und Stimmzettelbelege.

[Report], (2014)

Halvani, Oren ; Steinebach, Martin
Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (eds.) :

VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Working Notes for CLEF 2014 Conference, Sheffield, UK, September 15-18, 2014.
[Konferenz- oder Workshop-Beitrag], (2014)

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie :
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR) pp. 154-158.
[Artikel], (2014)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing Marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks (SCN), 7 (11) pp. 2185-2200.
[Artikel], (2014)

Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (eds.) :

Authorship Verification via k-Nearest Neighbor Estimation.
In: CEUR - Workshop Proceedings (1179). CEUR-WS.org
[Konferenz- oder Workshop-Beitrag], (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Hamann, Tobias :
The BKZ Simulation Algorithm.
Tu Darmstadt
[Masterarbeit], (2013)

Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf :
Natural Language Watermarking for German Texts.
In: IH&MMSec '13 .
[Konferenz- oder Workshop-Beitrag], (2013)

Henecka, Wilko ; Schneider, Thomas :
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13) ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas ; Braun, Johannes :
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias :
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas :
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Africa Crypt 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Hauke, Sascha ; Biedermann, Sebastian ; Heider, Dominik ; Mühlhäuser, Max :
On the Application of Supervised Machine Learning to Trustworthiness Assessment.

[Report], (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of 28th ACM SAC 2013 ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes :
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013. LNCS (8128). Springer Regensburg, Germany , pp. 194-208.
[Buchkapitel], (2013)

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[Konferenz- oder Workshop-Beitrag], (2013)

Hornschuch, Marian :
Multivariate-based identification and signature schemes with additional properties.
TU Darmstadt
[Masterarbeit], (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander :
Decoupling Authentication from the Usage of Services.

[Report], (2012)

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut :
Secure Two-Party Computations in ANSI C.
Conference on Computer and Communications Security (CCS 2012) ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Heinrich, Markus :
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
[Bachelorarbeit], (2012)

Halvani, Oren :
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
TU Darmstadt
[Masterarbeit], (2012)

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) :

Forward Secure Signatures on Smart Cards.
In: LNCS (7707). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2012)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max :
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
Proceedings of the IEEE TrustCom 2012 IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Heuser, Annelie ; Zohner, Michael :
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Konferenz- oder Workshop-Beitrag], (2012)

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph :
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1) pp. 25-36.
[Artikel], (2012)

Hartung, Daniel ; Pflug, Anika ; Busch, Christoph :
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: LNI . Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag], (2012)

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) :

Post-Quantum Signaturverfahren Heute.
22. SIT-Smartcard Workshop 2012 Fraunhofer Verlag Stuttgart
[Konferenz- oder Workshop-Beitrag], (2012)

Henriques, Joselito Rodrigues ; von Lukas, Uwe ; Mesing, Benjamin :
Schutz Geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2 pp. 84-86.
[Artikel], (2012)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max :
Fusion of Opinions under Uncertainty and Conflict -- Trust Assessment for Cloud Marketplaces (Full version).

[Report], (2012)

Halvani, Oren ; Steinebach, Martin
Schartner, Peter ; Taeger, Jürgen (eds.) :

Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Prof. Dr. Patrick Horster Deutschland , pp. 174-185. ISBN 978-3000392214
[Buchkapitel], (2012)

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko :
On the design and implementation of the Open eCard App.
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[Konferenz- oder Workshop-Beitrag], (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas :
Verteilte Dienstnutzung mit dem neuen Personalausweis.
D-A-CH Security 2012, 25. - 26. September
[Konferenz- oder Workshop-Beitrag], (2012)

Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner :
Data Exchange Processes based on Trust and Rights Management.
In: Tools and Methods of Competitive Engineering (TMCE 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten :
Friendship in German Online Social Networks.
SOUPS
[Konferenz- oder Workshop-Beitrag], (2012)

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie :
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Halvani, Oren Avni :
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
TU Darmstadt
[Masterarbeit], (2012)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing.
2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 (TrustCom 2011) IEEE CS
[Konferenz- oder Workshop-Beitrag], (2011)

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph :
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011)
[Artikel], (2011)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander :
Mobile eID application for the German identity card.

[Report], (2011)

Hoffmann, Gerhard :
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt
[Masterarbeit], (2011)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max :
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).

[Report], (2011)

Horsch, Moritz ; Stopczynski, Martin :
The German eCard-Strategy.

[Report], (2011)

Horsch, Moritz :
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
TU Darmstadt
[Masterarbeit], (2011)

Hamacher, Kay ; Katzenbeisser, Stefan :
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011). ACM Press , pp. 115-124.
[Buchkapitel], (2011)

Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc :
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
14th EUROMICRO Conference on Digital System Design (DSD2011)
[Konferenz- oder Workshop-Beitrag], (2011)

Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco :
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
Proceeding of ASME 2010 International Mechanical Engineering Congress & Exposition
[Konferenz- oder Workshop-Beitrag], (2010)

Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro :
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen (2) pp. 56-59.
[Artikel], (2010)

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max :
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2010)

Heinson, Dennis ; Schmidt, Bernd :
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8) pp. 540-547.
[Artikel], (2010)

Halvani, Oren ; Steinebach, Martin :
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 5/2010 pp. 285-291.
[Artikel], (2010)

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (eds.) :

Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS , 6055 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus :
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2) 75–79.
[Artikel], (2010)

Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
Freiling, Felix (ed.) :

Quantifying the Attack Surface of a Web Application.
In: Lecture Notes in Informatics (LNI) , P-170 . Bonner Köllen Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Hartmann, Frank :
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
TU Darmstadt
[Masterarbeit], (2010)

Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph :
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.

[Konferenz- oder Workshop-Beitrag], (2010)

Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander :
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
3rd International Conference on New Technologies, Mobility and Security (NTMS) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2009)

Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas :
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10) pp. 968-975.
[Artikel], (2009)

Horsch, Moritz :
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
TU Darmstadt
[Masterarbeit], (2009)

Hornung, Gerrit ; Schnabel, Christoph :
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2) pp. 115-122.
[Artikel], (2009)

Hornung, Gerrit ; Schnabel, Christoph :
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1) pp. 84-88.
[Artikel], (2009)

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James :
Software protection using an installation product having an entitlement file.

[Norm, Patent, Standard], (2009)

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim :
Software Protection Using an Installaton Product Having an Entitlement File.

[Norm, Patent, Standard], (2009)

Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max :
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1) pp. 90-111.
[Artikel], (2009)

Hartung, Daniel :
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5
[Artikel], (2009)

Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel :
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR pp. 723-728.
[Artikel], (2008)

Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf :
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Proceedings of the 15th IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA
[Konferenz- oder Workshop-Beitrag], (2007)

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie :
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6) pp. 434-440.
[Artikel], (2007)

Hutter, Dieter ; Volkamer, Melanie
Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (eds.) :

Information Flow Control to Secure Dynamic Web Service Composition.
Security in Pervasive Computing
[Konferenz- oder Workshop-Beitrag], (2006)

Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (eds.) :

Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Proceedings of the ECEH'06
[Konferenz- oder Workshop-Beitrag], (2006)

Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf :
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Proceedings of 30th Annual IEEE Conference on Local Computer Networks (LCN2005), Sydney, Australia
[Konferenz- oder Workshop-Beitrag], (2005)

Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. :
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference (EUROMICRO 2004), Rennes, France IEEE Computer Society Press, Los Alamitos
[Konferenz- oder Workshop-Beitrag], (2004)

Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf :
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Proceedings of Second International Conference on Wired/Wireless Internet Communications (WWIC 2004), Frankfurt (Oder), Germany Springer-Verlag Berlin/Heidelberg/New York
[Konferenz- oder Workshop-Beitrag], (2004)

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael :
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1) 35--44.
[Artikel], (2004)

Hollick, Matthias ; Krop, T. ; Schmitt, J. :
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.

[Report], (2003)

Hollick, Matthias ; Steinmetz, Ralf :
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
Enterprise Security IT Verlag fr Informationstechnik GmbH, Höhenkirchen
[Konferenz- oder Workshop-Beitrag], (2002)

Hollick, Matthias ; Schmitt, J. :
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.

[Report], (2002)

Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf :
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Innovative Anwendungen in Kommunikationsnetzen, Proceedings der 15. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Germany Gesellschaft für Informatik, Bonn
[Konferenz- oder Workshop-Beitrag], (2001)

Hollick, Matthias ; Steinmetz, Ralf :
Security Goals for Service Discovery in Ad-hoc Environments.
Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2001), Split, Croatia FESB-Split
[Konferenz- oder Workshop-Beitrag], (2001)

Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf :
A Security Model for Multicast Group Integrity Management.
Poster Session of Third International Workshop on Networked Group Communication, UCL, London, UK, Organised by UCL and COST 264 in cooperation with ACM SIGCOMM
[Anderes], (2001)

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael :
Micro-payments based on iKP.
SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection
[Konferenz- oder Workshop-Beitrag], (1996)

I

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Inel, Miray :
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt
[Masterarbeit], (2014)

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric :
Modular Reasoning with Join Point Interfaces.

[Report], (2011)

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric :
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
[Online-Edition: http://www.bodden.de/pubs/itb11jpi.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[Konferenz- oder Workshop-Beitrag], (2011)

Isaak, J. ; Savran, D. ; Fritzsche, M. ; Galaviz, D. ; Hartmann, T. ; Kamerdzhiev, S. ; Kelley, J. ; Kwan, E. ; Pietralla, N. ; Romig, C. ; Rusev, G. ; Sonnabend, K. ; Tonchev, A. ; Tornow, W. ; Zilges, A. :
Investigation of low-lying electric dipole strength in the semimagic nucleus ^{44}Ca.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.83.034304]
In: Physical Review C, 83 (3) ISSN 0556-2813
[Artikel], (2011)

Ivanova, Vanya :
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt
[Masterarbeit], (2010)

Israr, Adeel ; Shoufan, Abdulhadi ; Huss, Sorin :
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
IEEE Int. Symposium on Quality Electronic Design, ISQED'09.
[Konferenz- oder Workshop-Beitrag], (2009)

J

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit], (2017)

Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim :
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
In: International Conference on Networked Systems (NetSys). IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2015)

Jamison, Emily ; Gurevych, Iryna
Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (eds.) :

Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
[Online-Edition: http://www.arts.chula.ac.th/~ling/paclic28/program/pdf/244.p...]
Proceedings of the 28th Pacific Asia Conference on Language, Information and Computing Department of Linguistics, Chulalongkorn University
[Konferenz- oder Workshop-Beitrag], (2014)

Jamison, Emily ; Gurevych, Iryna
Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (eds.) :

Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
[Online-Edition: http://www.arts.chula.ac.th/~ling/paclic28/program/pdf/479.p...]
Proceedings of the The 28th Pacific Asia Conference on Language, Information and Computing Department of Linguistics, Chulalongkorn University
[Konferenz- oder Workshop-Beitrag], (2014)

Jeutter, Bennet :
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
[Masterarbeit], (2013)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Jolos, R. ; Pietralla, N. ; Shirikova, N. ; Voronov, V. :
Schematic microscopic approach to the description of M1 transitions between mixed-symmetry and fully symmetric collective states in γ-soft nuclei based on RPA-IBM boson mapping.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.84.014315]
In: Physical Review C, 84 (1) ISSN 0556-2813
[Artikel], (2011)

Jungclaus, A. ; Walker, J. ; Leske, J. ; Speidel, K.-H. ; Stuchbery, A. E. ; East, M. ; Boutachkov, P. ; Cederkäll, J. ; Doornenbal, P. ; Egido, J. L. ; Ekström, A. ; Gerl, J. ; Gernhäuser, R. ; Goel, N. ; Górska, M. ; Kojouharov, I. ; Maier-Komor, P. ; Modamio, V. ; Naqvi, F. ; Pietralla, N. ; Pietri, S. ; Prokopowicz, W. ; Schaffner, H. ; Schwengner, R. ; Wollersheim, H.-J. :
Evidence for reduced collectivity around the neutron mid-shell in the stable even-mass Sn isotopes from new lifetime measurements.
[Online-Edition: http://dx.doi.org/10.1016/j.physletb.2010.11.012]
In: Physics Letters B, 695 (1-4) p. 110. ISSN 03702693
[Artikel], (2011)

Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. :
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
[Artikel], (2010)

Jonker, Hugo ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) :

Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID'07 , 4896 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, April, Special Issue "Cop 495--509.
[Artikel], (1998)

Janson, Phil ; Waidner, Michael :
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6) 10--15.
[Artikel], (1996)

K

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Anderes], (2018)

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan :
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2018)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 pp. 88-99.
[Artikel], (2017)

Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd :
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
IEEE Conference on Local Computer Networks (LCN) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit], (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit], (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie :
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
International Conference on Human-Computer Interaction (HCII) Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Artikel], (2017)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie :
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3) pp. 24-29.
[Artikel], (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Kolb, Nina
Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (eds.) :

Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Mensch und Computer 2016 - Tagungsband Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie :
Introducing Proxy Voting to Helios.
11th International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric :
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Jahrestagung der Gesellschaft für Informatik Lecture Notes in Informatics (LNI)
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion-resistant Proxy Voting.
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Volkamer, Melanie :
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[Konferenz- oder Workshop-Beitrag], (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kolb, Nina ; Diefenbach, Sarah ; Niklas, Susanne
Endmann, Anja ; Fischer, Holger ; Krökel, Malte (eds.) :

3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
Mensch und Computer 2015 – Usability Professionals De Gruyter Oldenbourg
[Konferenz- oder Workshop-Beitrag], (2015)

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) :

Extending Helios Towards Private Eligibility Verifiability.
E-Voting and Identity: 5th International Conference - VoteID 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
10th International Conference on Availability, Reliability and Security - ARES 2015 IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.

[Anderes], (2015)

Karuppayah, Shankar ; Roos, Stefanie ; Rossow, Christian ; Fischer, Mathias ; Mühlhäuser, Max :
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
International Conference in Distributed Computing Systems IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Kulcsar, Geza ; Deckwerth, Frederik ; Lochau, Malte ; Varró, Gergely ; Schürr, Andy
Rensink, Arend ; Zambon, Eduardo (eds.) :

Improved Conflict Detection for Graph Transformation with Attributes.
[Online-Edition: http://dx.doi.org/10.4204/EPTCS.181.7]
In: Graphs as Models, GaM 2015. In: Electronic Proceedings in Theoretical Computer Science , 181 .
[Konferenz- oder Workshop-Beitrag], (2015)

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben :
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
6th International Conference on Electronic Voting - EVOTE 2014 IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim :
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic protocol selection in secure two-party computations.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33]
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14).
[Konferenz- oder Workshop-Beitrag], (2014)

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay :
TrustLite: A Security Architecture for Tiny Embedded Devices.
European Conference on Computer Systems (EuroSys) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Klose, Robin ; Loch, Adrian ; Hollick, Matthias :
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
Proceedings of the 2nd Workshop of Software Radio Implementation Forum (SRIF 2013), co-located with ACM Sigcomm 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas :
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8) pp. 512-516.
[Artikel], (2013)

Klose, Robin ; Loch, Adrian ; Hollick, Matthias :
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
Proceedings of the 2013 IEEE International Conference on Sensing, Communication, and Networking (SECON 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Kühne, Alexander ; Loch, Adrian ; Hollick, Matthias ; Klein, Anja :
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
Wireless Communications and Networking Conference (WCNC'13)
[Konferenz- oder Workshop-Beitrag], (2013)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[Konferenz- oder Workshop-Beitrag], (2013)

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie :
A Comparison of American and German Folk Models of Home Computer Security.
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013 Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2013)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Anderes], (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464]
In: Journal of Computer Security (JCS), 21 (2) pp. 283-315.
[Artikel], (2013)

Kauer, M. ; Franz, B. ; Pfeiffer, T. ; Heine, M. ; Christin, Delphine :
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress)
[Konferenz- oder Workshop-Beitrag], (2013)

Katzenbeisser, Stefan ; Schaller, André :
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit pp. 881-885.
[Artikel], (2012)

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes :
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4) pp. 305-308.
[Artikel], (2012)

Knauer, Julian ; Baier, Harald :
Zur Sicherheit von ATA-Festplattenpasswörtern.
DACH Security 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) :

State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE). Springer Verlag Heidelberg , pp. 189-279. ISBN 978-3-642-31942-6
[Buchkapitel], (2012)

Kirchbuchner, Florian :
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt
[Masterarbeit], (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Kononenko, Kirill :
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
International Conference on Mobile Computing and Networking
[Konferenz- oder Workshop-Beitrag], (2012)

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian :
Practical Security in E-Mail Applications.
The 2012 International Conference on Security and Management (SAM’12)
[Konferenz- oder Workshop-Beitrag], (2012)

Kelm, David :
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt
[Masterarbeit], (2012)

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Buch], (2012)

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) :

It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI , 195 . GI
[Konferenz- oder Workshop-Beitrag], (2012)

Kalabis, Lukas ; Selzer, Annika :
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9) 670--675.
[Artikel], (2012)

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph :
The Influence of trustworthiness of website layout on security perception of websites.
Current Issues in IT Security 2012 Duncker & Humblot
[Konferenz- oder Workshop-Beitrag], (2012)

Kocabaş, Ünal ; Schulz, Steffen :
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS (6917). Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. :
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
[Artikel], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Artikel], (2011)

Karuppayah, Shankar ; Samad, Fahad :
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
In: Lecture Notes in Informatics GI-Edition, S-10 (Informatiktage 2011) pp. 279-282.
[Artikel], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. :
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing
[Artikel], (2010)

Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc :
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implementations.
Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Kasper, Michael ; Schindler, Werner ; Stöttinger, Marc :
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implemenations.
Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten :
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
IEEE Globecom
[Konferenz- oder Workshop-Beitrag], (2010)

Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten :
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom to appear.
[Artikel], (2010)

Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz :
Reducing Configurations to Monitor in a Software Product Line.
[Online-Edition: http://www.bodden.de/pubs/kbbk10reducing.pdf]
In: 1st International Conference on Runtime Verification (RV). In: LNCS , 6418 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Kinder, Johannes ; Veith, Helmut
Bloem, Roderick ; Sharygina, Natasha (eds.) :

Precise Static Analysis of Untrusted Driver Binaries.
Proceedings of the 10th International Conference on Formal Methods in Computer-Aided Design (FMCAD 2010) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2010)

Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Li, Chang-Tsun (ed.) :

Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
In: Keine Angabe Handbook of Research. Idea Group Reference , pp. 155-175. ISBN 1605668362
[Buchkapitel], (2010)

Kiefer, Franziskus :
Effiziente Implementierung des PACE- und EACProtokolls für mobile Geräte.
TU Darmstadt
[Masterarbeit], (2010)

Kern, Oliver ; Ranade, Kedar ; Seyfarth, Ulrich :
Complete sets of cyclic mutually unbiased bases in even prime-power dimensions.
In: J. Phys. A, 43 (27) 5305--5321.
[Artikel], (2010)

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[Konferenz- oder Workshop-Beitrag], (2010)

Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander :
Cryptographic Application Scenarios.

[Report], (2010)

Krumov, Lachezar ; Andreeva, Adriana ; Strufe, Thorsten :
Resilient Peer-to-Peer Live-Streaming using Motifs.
11th IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM)
[Konferenz- oder Workshop-Beitrag], (2010)

Khelil, Abdelmajid ; Germanus, Daniel ; Suri, Neeraj :
Protection of SCADA Communication Channels.
In: Keine Angabe Advances in Critical Infrastructure Protection. Springer
[Buchkapitel], (2010)

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. :
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63
[Konferenz- oder Workshop-Beitrag], (2010)

Khelil, Abdelmajid ; Jeckel, Sebastian ; Germanus, Daniel ; Suri, Neeraj :
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
Proc. of The 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT)
[Konferenz- oder Workshop-Beitrag], (2010)

Kemetmüller, Christoph ; Seeger, Mark ; Baier, Harald ; Busch, Christoph :
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
Eighth International Network Conference (INC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Kevenaar, Tom ; Korte, Ulrike ; Merkle, Johannes ; Niesing, Matthias ; Ihmor, Heinrich ; Busch, Christoph ; Zhou, Xuebing :
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.

[Konferenz- oder Workshop-Beitrag], (2010)

Khalilbeigi, Mohammadreza ; Bradler, Dirk ; Schweizer, Immanuel ; Probst, Florian ; Steimle, Jürgen :
Towards Computer Support of Paper Workflows in Emergency Management.
7th International Conference on Information Systems for Crisis Response and Management
[Konferenz- oder Workshop-Beitrag], (2010)

König, André ; Seither, Daniel ; Hollick, Matthias ; Steinmetz, Ralf :
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
Proceedings of IEEE GLOBECOM 2009
[Konferenz- oder Workshop-Beitrag], (2009)

Katzenbeisser, Stefan ; Kursawe, Klaus ; Stumpf, Frederic :
Revocation of TPM Keys.
Second International Conference on Trusted Computing (TRUST 2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Kallel, Slim ; Charfi, Anis ; Mezini, Mira ; Klose, Karl ; Jmaiel, Mohamed :
From Formal Access Control Policies to Runtime Enforcement Aspects.
Proc. of the International Symposium on Engineering Secure Software and Systems (ESSOS) Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2009)

Kinder, Johannes ; Veith, Helmut ; Zuleger, Florian :
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
In: Lecture Notes in Computer Science , 5403 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

König, A. ; Hollick, Matthias ; Steinmetz, R. :
An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract).
Proceedings of the 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop Visions of Future Generation Networks (EuroView2009), Würzburg, Germany
[Konferenz- oder Workshop-Beitrag], (2009)

König, A. ; Hollick, Matthias ; Steinmetz, R. :
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
Procedings of the IEEE International Conference on Communications (IEEE ICC 2009), Dresden, Germany IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag], (2009)

Kern, Oliver :
Randomized Dynamical Decoupling Strategies and Improved One-Way Key Rates for Quantum Cryptography.
TU-Darmstadt
[Dissertation]

König, André ; Gottron, Christian ; Hollick, Matthias ; Steinmetz, Ralf :
Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes.
Procedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2008), Atlanta, USA IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag], (2008)

Killmann, Wolfgang ; Schindler, Werner
Oswald, E. ; Rohatgi, P. (eds.) :

A Design for a Physical RNG with Robust Entropy Estimators.
In: LNCS (5154). Springer
[Konferenz- oder Workshop-Beitrag], (2008)

König, André ; Hollick, Matthias ; Steinmetz, Ralf :
Security for Future Wireless and Decentralized Communication Networks - Harnessing Cooperation, Space, and Time.
Proceedings of the 8th Wuerzburg Workshop on IP: Joint EuroNF, ITC, and ITG Workshop "Visions of Future Generation Networks" (EuroView2008)
[Konferenz- oder Workshop-Beitrag], (2008)

Kinder, Johannes ; Veith, Helmut :
Jakstab: A Static Analysis Platform for Binaries.
In: Proceedings of the 20th International Conference on Computer Aided Verification (CAV 2008) , 5123 Springer
[Konferenz- oder Workshop-Beitrag], (2008)

König, A. ; Hollick, Matthias ; Krop, T. ; Steinmetz, R. :
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
In: Security and Communication Networks (SCN), 2 271--288.
[Artikel], (2008)

Krimmer, Robert ; Volkamer, Melanie :
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.

[Report], (2008)

Krimmer, Robert ; Volkamer, Melanie
Krishna, Jaya ; Agarwal, Naveen Kumar (eds.) :

Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press .
[Konferenz- oder Workshop-Beitrag], (2008)

Krimm, Rüdiger ; Volkamer, Melanie :
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008 Boorberg Verlag
[Konferenz- oder Workshop-Beitrag], (2008)

Krop, T. ; Bredel, M. ; Hollick, Matthias ; Steinmetz, Ralf :
JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks.
Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2007) co-located with ACM MobiCom 2007, Montreal, Canada
[Konferenz- oder Workshop-Beitrag], (2007)

König, André ; Hollick, Matthias ; Ackermann, R. ; Steinmetz, R. :
Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach.
Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security Nova Science Publishers
[Konferenz- oder Workshop-Beitrag], (2007)

Kutscher, Dirk ; Ott, Jorg ; Bartsch, Steffen :
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4) 225--251.
[Artikel], (2007)

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) :

The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID'07 , 4896 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2006)

König, A. ; Hollick, Matthias ; Schmitt, J. ; Steinmetz, R. :
Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract).
Proceedings of 2. Essener Workshop zu Neuen Herausforderungen in der Netzsicherheit (EWNS 2006), Essen, Germany
[Konferenz- oder Workshop-Beitrag], (2006)

Krop, T. ; Widmer, J. ; Hollick, Matthias ; Prehofer, C. ; Steinmetz, Ralf :
Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post).
Proceedings of Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Montreal, Canada
[Konferenz- oder Workshop-Beitrag], (2006)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.

[Report], (2005)

Krop, T. ; Kappes, M. ; Hollick, Matthias :
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
Proceedings of Kommunikation in Verteilten Systemen (KiVS 2005), Workshop Peer-to-Peer-Systeme und -Anwendungen, Kaiserslautern, Germany
[Konferenz- oder Workshop-Beitrag], (2005)

Krop, T. ; Hollick, Matthias ; Krist, F. ; Mogre, Parag S. ; Steinmetz, R. :
Modeling Static and Dynamic Behavior of Routes in Mobile Ad hoc Networks (Extended Abstract and Poster).
Proceedings of ACM MobiCom 2005, Köln, Germany
[Konferenz- oder Workshop-Beitrag], (2005)

Krimmer, Robert ; Volkamer, Melanie
Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (eds.) :

Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag .
[Konferenz- oder Workshop-Beitrag], (2005)

Krimmer, Robert ; Volkamer, Melanie :
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005
[Konferenz- oder Workshop-Beitrag], (2005)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, 27 (1) 3--9.
[Artikel], (2004)

Karjoth, Günter ; Waidner, Michael :
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1) 18--21.
[Artikel], (2004)

Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael :
Amending P3P for Clearer Privacy Promises.
TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03))
[Konferenz- oder Workshop-Beitrag], (2003)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Services for Enterprises.
TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)) Aix-en-Provence
[Konferenz- oder Workshop-Beitrag], (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Services for Enterprises.

[Report], (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
Workshop on Privacy Enhancing Technologies
[Konferenz- oder Workshop-Beitrag], (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Unternehmensweites Datenschutzmanagement.
Datenschutz Sommerakademie 2001 Datenschuts als Wettbewerbsvorteil, Vieweg Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael :
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.

[Report], (1994)

L

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report], (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Konferenz- oder Workshop-Beitrag], (2017)

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh :
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5) pp. 64-75.
[Artikel], (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag], (2016)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Lilien, Leszek ; Othmane, Lotfi Ben ; Angin, Pelin ; Bhargava, Bharat ; Salih, Raed ; DeCarlo, Andrew :
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW)
[Konferenz- oder Workshop-Beitrag], (2015)

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil :
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Konferenz- oder Workshop-Beitrag], (2015)

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel :
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
[Artikel], (2015)

Letzkus, Fabian :
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
TU Darmstadt
[Masterarbeit], (2015)

Loch, Adrian ; Quesada, Pablo ; Hollick, Matthias ; Kühne, Alexander ; Klein, Anja :
Building Cross-Layer Corridors in Wireless Multihop Networks.
11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. :
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Loch, Adrian ; Hong, Wei-Chih ; Hollick, Matthias :
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
39th IEEE Conference on Local Computer Networks (LCN)
[Konferenz- oder Workshop-Beitrag], (2014)

Loch, Adrian ; Schulz, Matthias ; Hollick, Matthias :
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
Proceedings of the 3rd Workshop of Software Radio Implementation Forum (SRIF 2014), co-located with ACM Sigcomm 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, J. ; Kühne, A. ; Klein, A. :
Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks.
15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. :
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Loch, Adrian ; Meier, David ; Hollick, Matthias :
How did you get here? PHY-Layer Path Signatures.
Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Liu, Huajian ; Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin
SPIE, IS&T (ed.) :

Watermarking Textures in Video Games.
Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Traon, Yves Le ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick :
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Online-Edition: http://www.abartel.net/static/p/tr-iccta.pdf]
In: arXiv preprint arXiv:1404.7431
[Report], (2014)

Loch, Adrian ; Klose, Robin ; Hollick, Matthias ; Kuehne, Alexander ; Klein, Anja :
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013, Demo Session)
[Konferenz- oder Workshop-Beitrag], (2013)

Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, Jörg ; Kuehne, Alexander ; Klein, Anja :
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Loch, Adrian ; Frey, Hannes ; Hollick, Matthias :
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing
[Artikel], (2013)

Loch, Adrian ; Hollick, Matthias :
Face the Enemy: Attack Detection for Planar Graph Routing.
Proceedings of the 2013 Conference on Networked Systems (NetSys 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Liu, H. ; Li, Y. ; Steinebach, M. :
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
In: Lecture Notes in Computer Science ((tba)). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Luna, Jesus ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj ; Rak, Massimiliano ; Liccardo, Loredana :
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proc. of the International Conference on Cloud Computing and Services Science (CLOSER)
[Konferenz- oder Workshop-Beitrag], (2013)

Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin :
Privacy Risks in Named Data Networking: What is the Cost of Performance?

[Anderes], (2012)

Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin :
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.

[Report], (2012)

Liu, Huajian ; Steinebach, Martin :
Improved Fourier domain template and patchwork embedding using spatial masking.
In: Proceedings of SPIE (8303).
[Konferenz- oder Workshop-Beitrag], (2012)

Luna, Jesus ; Langenberg, Robert ; Suri, Neeraj :
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees.
Proc. of the ACM Cloud Computing Security Workshop
[Konferenz- oder Workshop-Beitrag], (2012)

Luna, Jesus ; Suri, Neeraj ; Krontiris, Ioannis :
Privacy-by-Design Based on Quantitative Threat Modeling.
Proc. of 7th Intl Conference on Risks and Security of Internet and Systems (CRISIS)
[Konferenz- oder Workshop-Beitrag], (2012)

Luna, Jesus ; Ghani, Hamza ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj :
Quantitative Assessment of Cloud Security Level Agreements: A Case Study.
Proc. of International Conference on Security and Cryptography (SECRYPT)
[Konferenz- oder Workshop-Beitrag], (2012)

Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie :
The Soot framework for Java program analysis: a retrospective.
[Online-Edition: http://www.bodden.de/pubs/lblh11soot.pdf]
In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011).
[Konferenz- oder Workshop-Beitrag], (2011)

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel :
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
15th International Conference on Financial Cryptography and Data Security (FC)
[Konferenz- oder Workshop-Beitrag], (2011)

Likavec, Lena :
Application of Lattice Basis Reduction.
TU Darmstadt
[Masterarbeit], (2011)

Lux, Alexander ; Starostin, Artem :
A Tool for Static Detection of Timing Channels in Java.
2nd International Workshop on Constructive Side-Channel Analysis and Secure Design
[Konferenz- oder Workshop-Beitrag], (2011)

Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes :
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review (7) pp. 14-15.
[Artikel], (2011)

Lindner, Richard ; Peikert, Chris :
Better Key Sizes (and Attacks) for LWE-Based Encryption.
CT-RSA 2011
[Konferenz- oder Workshop-Beitrag], (2011)

Lux, Alexander ; Starostin, Artem :
Side Channel Finder (Version 1.0).

[Anderes], (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Securing the E-Health Cloud.
1st ACM International Health Informatics Symposium (IHI 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel :
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
5th Annual Workshop on Scalable Trusted Computing (STC 2010)
[Konferenz- oder Workshop-Beitrag], (2010)

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem :
Side Channel Finder (Version 1.0).

[Report], (2010)

Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding (IH 2010) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander :
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.

[Report], (2010)

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes :
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Fifth International Conference on Availability, Reliability and Security (ARES 2010) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2010)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel :
Patterns for Secure Boot and Secure Storage in Computer Systems.
4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),
[Konferenz- oder Workshop-Beitrag], (2010)

Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter :
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
ICICS
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
ESORICS
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (eds.) :

Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie :
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009) ACM Press
[Konferenz- oder Workshop-Beitrag], (2009)

Lodrova, Dana ; Busch, Christoph ; Tabassi, Elham ; Krodel, Wolfgang ; Drahansky, Martin :
Semantic Conformance Testing Methodology for Finger Minutiae Data.
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Wiesmaier, Alexander :
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
8th European Conference on Digital Archiving (ECA2010)
[Konferenz- oder Workshop-Beitrag], (2009)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS (5789). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie :
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4
[Artikel], (2009)

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander :
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9 .
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) :

Classifying Privacy and Verifiability Requirements for Electronic Voting.
Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI)
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Wiesmaier, Alexander :
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.

[Report], (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel :
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS , 5471 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel :
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS , 5451 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Liu, Huajian ; Steinebach, Martin ; Schneider, Marcel :
Efficient watermark embedding for web images.
Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander :
From Student Smartcard Applications to the German Electronic Identity Card.
ECEG09 ACI
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Opitz-Talidou, Zoi :
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
IRIS 2009
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Opitz-Talidou, Zoi :
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9
[Artikel], (2009)

Langer, Lucie :
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement. Practical studies in e-Governement
[Buchkapitel], (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (eds.) :

Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich OCG Verlag
[Konferenz- oder Workshop-Beitrag], (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie :
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
[Artikel], (2009)

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael:
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag
[Buch], (2000)

Lacoste, Gérard ; Waidner, Michael :
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press 147--157.
[Artikel], (2000)

Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael :
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2) 71--75.
[Artikel], (1991)

M

Mantz, Dennis :
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt
[Masterarbeit], (2018)

Mehmedovic, Damir :
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt
[Bachelorarbeit], (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2018)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit], (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Konferenz- oder Workshop-Beitrag], (2017)

Moschner, K. ; Blazhev, A. ; Jolie, J. ; Warr, N. ; Boutachkov, P. ; Bednarczyk, P. ; Sieja, K. ; Algora, A. ; Ameil, F. ; Bentley, M. A. ; Brambilla, S. ; Braun, N. ; Camera, F. ; Cederkaell, J. ; Corsi, A. ; Danchev, M. ; DiJulio, D. ; Fahlander, C. ; Gerl, J. ; Giaz, A. ; Golubev, P. ; Gorska, M. ; Grebosz, J. ; Habermann, T. ; Hackstein, M. ; Hoischen, R. ; Kojouharov, I. ; Kurz, N. ; Margincan, N. ; Merchan, E. ; Moeller, T. ; Naqvi, F. ; Singh, B. S. Nara ; Nociforo, C. ; Pietralla, N. ; Pietri, S. ; Podolyak, Zs. ; Prochazka, A. ; Reese, M. ; Reiter, P. ; Rudigier, M. ; Rudolph, D. ; Sava, T. ; Schaffner, H. ; Scruton, L. ; Taprogge, J. ; Thomas, T. ; Weick, H. ; Wendt, A. ; Wieland, O. ; Wollersheim, H. -J. :
Relativistic Coulomb excitation of Kr-88.
In: PHYSICAL REVIEW C, 94 (5) ISSN 2469-9985
[Artikel], (2016)

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie :
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Mohan, Vaishnavi ; Othmane, Lotfi Ben :
SecDevOps: Is It a Marketing Buzzword?
Proc. of the 11th International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2016)

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes :
State Management for Hash-Based Signatures.
3rd International Conference on Research in Security Standardisation (SSR 2016) Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2016)

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie :
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie :
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1st International Workshop on Innovations in Mobile Privacy and Security CEUR Workshop Proceedings
[Konferenz- oder Workshop-Beitrag], (2016)

Mayer, Christoph :
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt
[Masterarbeit], (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Mayer, Peter ; Volkamer, Melanie :
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Maass, Max ; Müller, Uwe ; Schons, Tom ; Wegemer, Daniel ; Schulz, Matthias :
NFCGate: An NFC Relay Application for Android.
[Online-Edition: http://dx.doi.org/10.1145/2766498.2774984]
In: ACM WiSec'15, June 24-26th, 2015, New York. In: WiSec .
[Konferenz- oder Workshop-Beitrag], (2015)

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie :
Zertifizierte Apps.
Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015 SecuMedia
[Konferenz- oder Workshop-Beitrag], (2015)

Mannes, Elisa ; Maziero, Carlos A. ; Lassance, Luiz Carlos ; Borges, Fábio :
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks.
ISCC 2015 - The Twentieth IEEE Symposium on Computers and Communications IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Müller, Jan :
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
TU Darmstadt
[Masterarbeit], (2014)

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (eds.) :

Authentication Schemes - Comparison and Effective Password Spaces.
Information Systems Security Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2014)

Mannes, Elisa ; Maziero, Carlos ; Lassance, Luiz Carlos ; Borges, Fábio :
Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação.
XIV Brazilian Symposium on Information Security and Computer Systems (SBSeg)
[Konferenz- oder Workshop-Beitrag], (2014)

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes :
Mutant Differential Fault Analysis of Trivium MDFA.
the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report], (2013)

Moecke, Cristian Thiago ; Volkamer, Melanie :
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21 pp. 41-52.
[Artikel], (2013)

Mittelbach, Arno :
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Artikel], (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Moecke, Cristian Thiago ; Volkamer, Melanie :
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security pp. 75-85.
[Artikel], (2012)

Möller, T. ; Pietralla, N. ; Rainovski, G. ; Ahn, T. ; Bauer, C. ; Carpenter, M. ; Coquard, L. ; Janssens, R. ; Leske, J. ; Lister, C. ; McCutchan, E. ; Möller, O. ; Seweryniak, D. ; Zhu, S. :
Absolute β-to-ground band transition strengths in ^{154}Sm.
[Online-Edition: http://dx.doi.org/10.1103/PhysRevC.86.031305]
In: Physical Review C, 86 (3) ISSN 0556-2813
[Artikel], (2012)

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis :
Improving the Performance of the SYND Stream Cipher.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Meziani, Mohammed ; El Bansarkhani, Rachid :
An Efficient and Secure Coding-based Authenticated Encryption.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Mittelbach, Arno :
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Martucci, Leonardo ; Zuccato, Albin ; Smeets, Ben ;