TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z | Á
Number of items at this level (without sub-levels): 354.

A

Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021):
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
Bari, Italy, ACM, 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21), virtual conference, Mon 11 - Fri 15 October 2021, DOI: 10.1145/3475716.3475783,
[Conference or Workshop Item]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020):
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1), Association for Computing Machinery, ISSN 2471-2566,
DOI: 10.1145/3406112,
[Article]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020):
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
pp. 332-341, ACM, 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), virtual Conference, 30.03.-03.04., ISBN 978-1-4503-6866-7,
DOI: 10.1145/3341105.3374020,
[Conference or Workshop Item]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Conference or Workshop Item]

Alexopoulos, Nikolaos ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max
Cavallaro, Lorenzo ; Kinder, Johannes ; Wang, XiaoFeng ; Katz, Jonathan (eds.) (2019):
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
pp. 2677-2679, ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, DOI: 10.1145/3319535.3363285,
[Conference or Workshop Item]

Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Andreas, Nautsch (2019):
Speaker Recognition in Unconstrained Environments.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Master Thesis]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
pp. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Conference or Workshop Item]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session,
Berkeley, CA, USENIX Association, USENIX Security Symposium, Vancouver, Canada, August 16-18, 2017, [Conference or Workshop Item]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), pp. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Article]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES),
[Conference or Workshop Item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, pp. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Book Section]

B

Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021):
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), virtual Conference, 07.-11.06.2021, [Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference or Workshop Item]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André
Meyer-Aurich, A. (ed.) (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: Gesellschaft für Informatik: GI-Edition / Proceedings, 287, In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, pp. 25-30,
Bonn, Gesellschaft für Informatik, 39. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19.2.2019, ISBN 978-3-88579-681-7,
[Conference or Workshop Item]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), pp. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar (2018):
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
In: Lecture Notes in Computer Science, 11050, In: Research in Attacks, Intrusions, and Defenses, pp. 511-531,
Springer International Publishing, International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, DOI: 10.1007/978-3-030-00470-5_24,
[Conference or Workshop Item]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
pp. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelor Thesis]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014):
Scalable Offline Monitoring.
pp. 31-47, Heidelberg, Germany, Springer, Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

C

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Classen, Jiska ; Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19), Miami, FL, USA, May 15.-17., 2019, DOI: 10.1145/3317549.3319727,
[Conference or Workshop Item]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Other]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Conference or Workshop Item]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pp. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]

Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3), pp. 41-47. IISI, ISSN 1861-4280,
[Article]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

D

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Conference or Workshop Item]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference or Workshop Item]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
pp. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Conference or Workshop Item]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), pp. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
pp. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Drachenfels, Magdalena von ; Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de,
[Other]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76, pp. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

E

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
pp. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Conference or Workshop Item]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Conference or Workshop Item]

F

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Conference or Workshop Item]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Master Thesis]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]

Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]

G

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]

Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
In: MuC'19: Proceedings of Mensch und Computer 2019,
MuC'19 - Mensch und Computer, Hamburg, Germany, 8. bis 11. September 2019, ISBN 978-1-4503-7198-8,
DOI: 4https://doi.org/10.1145/3340764.3340782,
[Conference or Workshop Item]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, pp. 117-118, Gesellschaft für Informatik, [Book Section]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, pp. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Conference or Workshop Item]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, UK, 04.-07.12., [Conference or Workshop Item]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) (2017):
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 640-655,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_44,
[Conference or Workshop Item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
pp. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
pp. 18-34, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 317 - 324,
IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, pp. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

H

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, pp. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Conference or Workshop Item]

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
pp. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Conference or Workshop Item]

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Conference or Workshop Item]

Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020):
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
In: WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 306-316,
ACM, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006,
DOI: 10.1145/3395351.3399423,
[Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
pp. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Conference or Workshop Item]

Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
In: Entwicklungen, Chancen und Herausforderungen der Digiatlisierung - WI 2020: Zentrale TracksEntwicklungen, Chancen und Herausforderungen der Digitalisierung: Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik, WI 2020, pp. 1545-1560,
GITO, 15th International Conference on Wirtschaftsinformatik (WI2020), Potsdam, Germany, 08.-11.03.2020, ISBN 9783955453350,
DOI: 10.30844/wi_2020_o2-haunschild,
[Conference or Workshop Item]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]

Hartwig, Katrin ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Hartwig, Katrin ; Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Conference or Workshop Item]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich (2017):
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
[Report]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelor Thesis]

I

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
Darmstadt, Technische Universität, [Master Thesis]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

J

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Article]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19),
[Conference or Workshop Item]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), pp. 3-22,
Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Conference or Workshop Item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelor Thesis]

K

Kulyk, Oksana ; Gerber, Nina ; Hilt, Annika ; Volkamer, Melanie (2020):
Has the GDPR hype affected users’ reaction to cookie disclaimers?
In: Journal of Cybersecurity, 6 (1), Oxford Academic, ISSN 2057-2085,
DOI: 10.1093/cybsec/tyaa022,
[Article]

Kaufhold, Marc-André ; Haunschild, Jasmin ; Reuter, Christian (2020):
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
In: Proceedings of the 28th European Conference on Information Systems (ECIS),
AIS, 28th European Conference on Information Systems, Marrakech, Morocco, 15.-17.06.2020, ISBN 978-1-7336325-1-5,
[Conference or Workshop Item]

Kaufhold, Marc-André ; Bayer, Markus ; Reuter, Christian (2020):
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, 57 (1), Elsevier ScienceDirect, ISSN 0306-4573,
DOI: 10.1016/j.ipm.2019.102132,
[Article]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Conference or Workshop Item]

Krämer, Juliane ; Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security,
ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.-29.08.2019, ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Conference or Workshop Item]

Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf
David, Klaus (ed.) (2019):
Resilience in Security and Crises through Adaptions and Transitions.
In: GI-Edition. Proceedings, 294, In: Informatik 2019: 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft (Workshop-Beiträge), pp. 571-584,
Bonn, Gesellschaft für Informatik e. V., 49. Jahrestagung der Gesellschaft für Informatik, Kassel, Germany, 23.-26. September 2019, ISBN 978-3-88579-688-6,
DOI: 10.18420/inf2019_ws60,
[Conference or Workshop Item]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Conference or Workshop Item]

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2, De Gruyter Open, [Article]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19),
SciTePress, [Conference or Workshop Item]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Conference or Workshop Item]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Conference or Workshop Item]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019):
Mitigating information overload in social media during conflicts and crises: design and evaluation of a cross-platform alerting system.
In: Behaviour & Information Technology (BIT), 38 (3), pp. 319-342. Taylor & Francis, ISSN 0144-929X, e-ISSN 1362-3001,
DOI: 10.1080/0144929X.2019.1620334,
[Article]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 361-381, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4_17,
[Book Section]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, pp. 1-11. [Article]

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
In: Mensch und Computer 2019 - Workshopband,
Bonn, Gesellschaft für Informatik e.V, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
DOI: 10.18420/muc2019-ws-133-04,
[Conference or Workshop Item]

Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), pp. 66-70,
ACM, DOI: 10.1145/3267323.3268963,
[Conference or Workshop Item]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
27. USENIX Security Symposium: USENIX Security'18 : Poster Session, Baltimore, MD, USA, August 15–17, 2018, [Conference or Workshop Item]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 329-342,
Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
pp. 309-312, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; Radziewski, Elmar von
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
In: Mensch und Computer 2018: Workshopband, pp. 579-586,
Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018, Dresden, Germany, [Conference or Workshop Item]

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), pp. 1-19. ISSN 1937-9390, e-ISSN 1937-9420,
DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
In: Proceedings of the European Conference on Information Systems (ECIS) 2018,
Portsmouth, UK, Association for Information Systems AIS, European Conference on Information Systems (ECIS 2018) 26th, Portsmouth, UK, [Conference or Workshop Item]

Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), 27 (3), pp. 198-213. Wiley-Blackwell - SSH, ISSN 0966-0879, e-ISSN 1468-5973,
DOI: 10.1111/1468-5973.12249,
[Article]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, 71, pp. 88-99. DOI: 10.1016/j.cose.2017.06.007,
[Article]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569,
IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), pp. 177-197. De Gruyter Open, DOI: 10.1515/popets-2017-0044,
[Article]

Kaufhold, Marc-André ; Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1), pp. 78-88. [Article]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Eibl, Maximilian ; Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
pp. 1325-1338, Bonn, INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), pp. 603-612,
Albi, France, ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Conference or Workshop Item]

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, pp. 51-58,
Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2017, DOI: 10.18420/muc2017-ws01-0386,
[Conference or Workshop Item]

Kiss, Ágnes ; Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, pp. 699-728,
Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Conference or Workshop Item]

L

Lauinger, Johannes ; Baumgärtner, Lars ; Wickert, Anna-Katharina ; Mezini, Mira (2020):
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 410-417,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Langer, Amanda ; Kaufhold, Marc-André ; Runft, Elena ; Reuter, Christian ; Grinko, Margarita ; Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
pp. 119-124, Wien, 39. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19. Februar 2019, [Conference or Workshop Item]

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94, pp. 45-67. Elsevier, ISSN 2352-2216,
[Article]

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
pp. 45-66, Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), 102, pp. 103-121. Elsevier, ISSN 1071-5819, e-ISSN 1095-9300,
DOI: 10.1016/j.ijhcs.2016.09.008,
[Article]

Leopold, Inken ; Reuter, Christian
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
In: Mensch und Computer 2017 Tagungsband, pp. 361-364,
Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer 2017, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0350,
[Conference or Workshop Item]

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5), pp. 64-75. [Article]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Conference or Workshop Item]

M

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference or Workshop Item]

Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Master Thesis]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelor Thesis]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Master Thesis]

Meister, Richard (2017):
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
Darmstadt, Technische Universität, [Master Thesis]

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6), pp. 959-1003. Springer Science+Business Media B.V. (formerly Kluwer Academic Publishers), ISSN 0925-9724, e-ISSN 1573-7551,
DOI: 10.1007/s10606-017-9291-z,
[Article]

Mohan, Vaishnavi ; Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES),
[Conference or Workshop Item]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Article]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),
Darmstadt, Germany, [Conference or Workshop Item]

N

Nieminen, Raine ; Järvinen, Kimmo (2020):
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing, IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2020.2990871,
[Article]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Conference or Workshop Item]

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Article]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor Thesis]

Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus
Wiemeyer, Josef (ed.) (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, pp. 71-89, Darmstadt, [Book Section]

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23075,
[Conference or Workshop Item]

O

Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020):
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
ACM, Annual Computer Security Applications Conference (ACSAC 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

P

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Putz, Florentin ; Álvarez, Flor ; Classen, Jiska (2020):
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication.
pp. 31-41, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3399420,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019,
Springer, [Conference or Workshop Item]

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, pp. 125-157,
Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), pp. 7:1-7:35. DOI: 10.1145/3154794,
[Article]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, pp. 17-31,
Springer, [Conference or Workshop Item]

Pottebaum, Jens ; Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4), pp. iv-vii. IGI Global, ISSN 1937-9420,
[Article]

Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian
Eibl, Maximilian ; Gaedke, Martin (eds.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), pp. 1281-1282,
Bonn, Gesellschaft für Informatik e.V, INFORMATIK 2017, Bonn, [Conference or Workshop Item]

R

Reuter, Christian ; Kaufhold, Marc-André ; Spahr, Fabian ; Spielhofer, Thomas ; Hahne, Anna Sophie (2020):
Emergency service staff and social media – A comparative empirical study of the attitude by Emergency Services staff in Europe in 2014 and 2017.
In: International Journal of Disaster Risk Reduction (IJDRR), 46, Elsevier ScienceDirect, ISSN 2212-4209,
DOI: 10.1016/j.ijdrr.2020.101516,
[Article]

Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020):
TACAI: An Intermediate Representation Based on Abstract Interpretation.
pp. 2-7, SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, London, UK, June 2020, ISBN 9781450379977,
DOI: 10.1145/3394451.3397204,
[Conference or Workshop Item]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2020):
Social media in conflicts and crises.
In: Behaviour & Information Technology (BIT), 39 (3), pp. 241-251. Taylor & Francis, ISSN 0144-929X, e-ISSN 1362-3001,
DOI: 10.1080/0144929X.2019.1629025,
[Article]

Reuter, Christian
Ückert, Sandra (ed.) (2020):
Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen, pp. 309-318, Baden-Baden, Nomos, ISBN 978-3-8487-6250-7,
[Book Section]

Reuter, Christian ; Haunschild, Jasmin ; Hollick, Matthias ; Mühlhäuser, Max ; Vogt, Joachim ; Kreutzer, Michael (2020):
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities.
Gesellschaft für Informatik e.V., Mensch und Computer 2020 - Digitaler Wandel im Fluss der Zeit, virtual Conference, 06.-09.09., [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Comes, Tina ; Knodt, Michèle ; Mühlhäuser, Max (2020):
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020), virtual Conference, 05.-09.10., [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2020):
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen.
In: BBK Bevölkerungsschutz, 2, pp. 14-17. Bundesamt für Bevölkerungs-schutz und Katastrophenhilfe, ISSN 0940-7154,
[Article]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Conference or Workshop Item]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Conference or Workshop Item]

Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
pp. 251-261, 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Conference or Workshop Item]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises.
39, (3), Taylor & Francis, ISSN 0144-929X,
DOI: 10.1080/0144929X.2019.1629025,
[Journal]

Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick (2019):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 28, pp. 209-246. Springer Science+Business Media B.V. (formerly Kluwer Academic Publishers), ISSN 0925-9724, e-ISSN 1573-7551,
DOI: 10.1007/s10606-018-9339-8,
[Article]

Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André
Reuter, Christian (ed.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 11-37, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4_2,
[Book Section]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, pp. 177-182,
Bonn, Gesellschaft für Informatik e.V, 39. GIL-Jahrestagung : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, ISBN 978-3-88579-681-7,
[Conference or Workshop Item]

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (ed.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 139-164, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4_7,
[Book Section]

Riebe, Thea ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 165-183, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4_7,
[Book Section]

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 257-275, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4_12,
[Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 3-9, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4_1,
[Book Section]

Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Conference or Workshop Item]

Riebe, Thea ; Kaufhold, Marc-André ; Kumar, Tarun ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Riebe, Thea ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Riebe, Thea ; Langer, Amanda ; Kaufhold, Marc-André ; Kretschmer, Nina Katharina ; Reuter, Christian (2019):
Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz.
In: Mensch und Computer 2019 - Workshopband,
Bonn, Gesellschaft für Informatik e.V, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
DOI: 10.18420/muc2019-ws-133-05,
[Conference or Workshop Item]

Reuter, Christian ; Riebe, Thea ; Aldehoff, Larissa ; Kaufhold, Marc-André ; Reinhold, Thomas
Werkner, Ines-Jacqueline (ed.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, pp. 15-38, Wiesbaden, Springer VS, ISBN 978-3-658-27712-3,
DOI: 10.1007/978-3-658-27713-0_2,
[Book Section]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Ludwig, Thomas ; Pottebaum, Jens ; Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
In: Mensch und Computer 2019 - Workshopband, pp. 278-280,
Bonn, ACM, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
DOI: 10.18420/muc2019-ws-133,
[Conference or Workshop Item]

Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019):
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen.
In: Science Policy Paper, 5, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, ISSN 2626-9597, [Book]

Reuter, Christian
Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (eds.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Science Policy Paper, In: Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen, pp. 15-19, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book Section]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Book]

Reuter, Christian ; Häusser, Katja ; Bien, Mona ; Herbert, Franziska
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (eds.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
In: MuC'19: Proceedings of Mensch und Computer 2019, pp. 287-297,
ACM, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
DOI: 10.1145/3340764.3340770,
[Conference or Workshop Item]

Riebe, Thea ; Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, (1), pp. 46-48. [Article]

Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker
Reuter, Christian (ed.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, pp. 405-413, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25652-4,
DOI: 10.1007/978-3-658-25652-4_19,
[Book Section]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Bachelor Thesis]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelor Thesis]

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 107-112,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Conference or Workshop Item]

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), pp. 1-6,
IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Conference or Workshop Item]

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), pp. 707-721,
ACM, DOI: 10.1145/3196494.3196522,
[Conference or Workshop Item]

Reif, Michael ; Eichberg, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (eds.) (2018):
Call Graph Construction for Java Libraries.
pp. 119-120, Bonn, Gesellschaft für Informatik, Software Engineering und Software Management 2018, Bonn, [Conference or Workshop Item]

Reuter, Christian ; Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1), pp. in press. [Article]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
In: Mensch und Computer 2018: Workshopband MuC 2018, pp. 623-632,
Gesellschaft für Informatik e.V., Mensch und Computer 2018, Dresden, Germany, [Conference or Workshop Item]

Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
pp. 595-603, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2018: Workshopband MuC 2018, pp. 565-569,
Gesellschaft für Informatik e.V., Mensch und Computer 2018, Dresden, Germany, ISBN Workshopband MuC 2018,
DOI: 10.18420/muc2018-ws12-0328,
[Conference or Workshop Item]

Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, pp. 60-61. [Article]

Reuter, Christian ; Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), pp. v-viii. [Article]

Reuter, Christian ; Pottebaum, Jens (2018):
International Journal of Information Systems for Crisis Response and Management : Special Issue on IT Support for Crisis and Continuity Management.
10, (1), IGI Global, ISSN 1937-9390, e-ISSN 1937-9420,
[Journal]

Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, 2, pp. 22-24. [Article]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 1, pp. 64-66. [Article]

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), pp. 277-279. Taylor & Francis, ISSN 1044-7318, e-ISSN 1532-7590,
DOI: 10.1080/10447318.2018.1427833,
[Article]

Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), pp. 280-294. Taylor & Francis, ISSN 1044-7318, e-ISSN 1532-7590,
DOI: 10.1080/10447318.2018.1427832,
[Article]

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 621-630, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_30,
[Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 3-14, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_1,
[Book Section]

Reuter, Christian ; Mentler, Tilo (2018):
Human-computer interaction and social media in safety-critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), pp. 2-3. Wiley, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Article]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 379-402, Wiesbaden, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_19,
[Book Section]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 573-595, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_28,
[Book Section]

Reuter, Christian ; Kaufhold, Marc-André (2018):
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), pp. 41-57. Wiley, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12196,
[Article]

Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar
Reuter, Christian (ed.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 443-465, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_22,
[Book Section]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 17-40, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_2,
[Book Section]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), pp. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005,
[Article]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Article]

Reinhold, Thomas ; Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Other]

Riebe, Thea ; Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de,
[Other]

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah
Klafft, Michael (ed.) (2017):
Informing the Population: Mobile Warning Apps.
In: Risk and Crisis Communication in Disaster Prevention and Management, pp. 31-41,
Berlin, epubli, Workshop on Risk and Crisis Communication for Disaster Prevention and Management, Wilhelmshaven, 27th April 2017, ISBN 9783745054484,
[Conference or Workshop Item]

Reuter, Christian ; Pätsch, Katja ; Runft, Elena
Leimeister, J. M. ; Brenner, W. (eds.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
pp. 649-663, St. Gallen, Switzerland, Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, [Conference or Workshop Item]

Reuter, Christian ; Mentler, Tilo ; Geisler, Stefan ; Herczeg, Michael ; Ludwig, Thomas ; Pipek, Volkmar ; Nestler, Simon
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, pp. 5-8,
Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2017, DOI: 10.18420/muc2017-ws01-0380,
[Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas
Paterno, Fabio ; Wulf, Volker (eds.) (2017):
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development, pp. 307-332, Cham, Springer, ISBN 978-3-319-60290-5,
DOI: 10.1007/978-3-319-60291-2_12,
[Book Section]

Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker
Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (eds.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), pp. 207-224, Göttingen, Vandenhoeck & Ruprecht, ISBN 978-3-8471-0739-2,
DOI: 10.14220/digo.2017.38.1.207,
[Book Section]

Reuter, Christian ; Wiegärtner, Daniel ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
In: Mensch & Computer 2017: Tagungsband, pp. 295-298,
Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer 2017, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0352,
[Conference or Workshop Item]

Reuter, Christian ; Pätsch, Katja ; Runft, Elena (2017):
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, 16 (2), pp. 181-195. de Gruyter Oldenbourg, ISSN 1618-162X, e-ISSN 2196-6826,
DOI: 10.1515/icom-2017-0013,
[Article]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2017):
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
pp. 1-19, New York, USA, ACM, New York, USA, e-ISSN 2573-0142,
DOI: 10.1145/3134725,
[Conference or Workshop Item]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian
Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (eds.) (2017):
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, pp. 75-88, Berlin, Germany, Springer, ISBN 978-3-319-44711-7,
DOI: 10.1007/978-3-319-44711-7_7,
[Book Section]

Reuter, Christian ; Spielhofer, Thomas (2017):
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Technological Forecasting and Social Change (TFSC), 121, pp. 168-180. ISSN 0040-1625, e-ISSN 1873-5509,
DOI: 10.1016/j.techfore.2016.07.038,
[Article]

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah (2017):
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
pp. 2187-2201, Guimar\~es, Portugal, European Conference on Information Systems (ECIS), Guimar\~es, Portugal, [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Steinfort, René
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) (2017):
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
pp. 583-591, Albi, France, Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France, [Conference or Workshop Item]

Reuter, Christian ; Kaufhold, Marc-André ; Klös, Jonas
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
In: Mensch & Computer: Workshopband, pp. 33-41,
Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer 2017, Regensburg, Germany, DOI: 10.18420/muc2017-ws01-0384,
[Conference or Workshop Item]

Riecker, Michael ; Almon, Lars ; Hollick, Matthias (2017):
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
IEEE, 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9-12 Oct. 2017, DOI: 10.1109/LCN.2017.110,
[Conference or Workshop Item]

S

Stöver, Alina ; Gerber, Nina ; Kaushik, Sushma ; Mühlhäuser, Max ; Marky, Karola (2021):
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps.
In: CHI EA'21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems,
ACM, CHI '21: CHI Conference on Human Factors in Computing Systems, virtual Conference, 08.-13.05.2021, ISBN 978-1-4503-8095-9,
DOI: 10.1145/3411763.3451791,
[Conference or Workshop Item]

Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Conference or Workshop Item]

Schürmann, Tim ; Gerber, Nina ; Gerber, Paul (2020):
Benefits of formalized computational modeling for understanding user behavior in online privacy research.
In: Journal of Intellectual Capital, 21 (3), pp. 431-458. Emerald Publishing Limited, ISSN 1469-1930,
DOI: 10.1108/JIC-05-2019-0126,
[Article]

Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Article]

Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020):
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Spielhofer, Thomas ; Hahne, Anna Sophie ; Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2019):
Social Media Use in Emergencies of Citizens in the United Kingdom.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Stute, Milan ; Narain, Sashank ; Mariotto, Alex ; Heinrich, Alexander ; Kreitschmann, David ; Noubir, Guevara ; Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. (Publisher's Version)
In: Proceedings of the 28th USENIX Security Symposium, pp. 37-54,
Berkeley, CA, USENIX Association, 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, USA, 14.-16.8.2019, ISBN 978-1-939133-06-9,
DOI: 10.25534/tuprints-00013264,
[Conference or Workshop Item]

Schneider, Thomas ; Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Conference or Workshop Item]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2019):
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol.
In: GetMobile: Mobile Computing and Communications, 23 (1), pp. 30-33. ACM, ISSN 23750529,
DOI: 10.1145/3351422.3351432,
[Article]

Stute, Milan ; Narain, Sashank ; Mariotto, Alex ; Heinrich, Alexander ; Kreitschmann, David ; Noubir, Guevara ; Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Santa Clara, CA, USA, 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian
Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko ; Reuter, Christian (eds.) (2019):
Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations.
pp. 70-73, SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9., DOI: 10.25534/tuprints-00009164,
[Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
In: Mensch und Computer 2019 - Workshopband,
Gesellschaft für Informatik e.V, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
DOI: 10.18420/muc2019-ws-302-06,
[Conference or Workshop Item]

Saeed, Saqib ; Pipek, Volkmar ; Rohde, Markus ; Reuter, Christian ; Carvalho, Pinatti De (2019):
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, 7 (1), pp. 63564-63577. DOI: 10.1109/ACCESS.2019.2916903,
[Article]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
ACM, The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3267716,
[Conference or Workshop Item]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
ACM, The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3241566,
[Conference or Workshop Item]

Schneider, Thomas ; Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), pp. 71-75,
ACM, DOI: 10.1145/3267323.3268956,
[Conference or Workshop Item]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, pp. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference or Workshop Item]

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
pp. 12-22, 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Conference or Workshop Item]

Scholl, Simon ; Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
pp. 443-446, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Conference or Workshop Item]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. (Postprint)
In: MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 820-822,
New York, NY, Association for Computing Machinery, 24th Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2018), New Delhi India, 29.10.-2.11.2018, ISBN 978-1-4503-5903-0,
DOI: 10.25534/tuprints-00013316,
[Conference or Workshop Item]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. (Postprint)
In: MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 529-543,
New York, NY, Association for Computing Machinery, 24th Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2018), New Delhi India, 29.10.-2.11.2018, ISBN 978-1-4503-5903-0,
DOI: 10.25534/tuprints-00013315,
[Conference or Workshop Item]

Schick, Oliver (2017):
Web application for privacy-preserving scheduling.
Darmstadt, Technische Universität, [Bachelor Thesis]

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), p. 6,
ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Conference or Workshop Item]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Bachelor Thesis]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016,
CCS 2016, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016,
[Conference or Workshop Item]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters),
San Francisco, [Conference or Workshop Item]

T

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Conference or Workshop Item]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Tillmanns, Jörn ; Classen, Jiska ; Rohrbach, Felix ; Hollick, Matthias (2020):
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020), virtual Conference, 11.08., [Conference or Workshop Item]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Conference or Workshop Item]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), pp. 221-235,
ACM, DOI: 10.1145/3196494.3196541,
[Conference or Workshop Item]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master Thesis]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Master Thesis]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Master Thesis]

Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 28.-30.8. 2017, DOI: 10.1109/pst.2017.00040,
[Conference or Workshop Item]

Tundis, Andrea ; Garcia Cordero, Carlos ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max (2017):
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
pp. 796-807, 19th International Conference on Cyber-Physical Systems (ICCPS), Zurich, Switzerland, 13th-14th January, 2017, DOI: 10.5281/zenodo.1130542,
[Conference or Workshop Item]

U

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

V

Villeneuve, Come du Crest de (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master Thesis]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Master Thesis]

Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max (2018):
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 1-2,
IEEE, Taipei, Taiwan., DOI: 10.1109/NOMS.2018.8406119,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe,
London, UK, [Conference or Workshop Item]

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Garcia Cordero, Carlos ; Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, pp. 279 - 286,
IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Conference or Workshop Item]

W

Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Conference or Workshop Item]

Wijden, Marius van der (2018):
Payment and State Channels in practice.
TU Darmstadt, [Master Thesis]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Master Thesis]

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), pp. 436-448,
ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Wiegärtner, Daniel ; Reuter, Christian ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
pp. 609-614, Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer 2017: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws17-0416,
[Conference or Workshop Item]

Y

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Master Thesis]

Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17),
Springer, [Conference or Workshop Item]

Z

Zimmermann, Verena ; Gerber, Nina
Tryfonas, Theo (ed.) (2017):
“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 265-283,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_18,
[Conference or Workshop Item]

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41, pp. 308-313. [Article]

Á

Álvarez, Flor ; Almon, Lars ; Radtki, Hauke ; Hollick, Matthias (2019):
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019), Seattle, WA, 17-20, Oktober, 2019, [Conference or Workshop Item]

Álvarez, Flor ; Almon, Lars ; Hahn, Ann-Sophie ; Hollick, Matthias (2019):
Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept.
Security Standardisation Research Conference 2019 (ACM CCS Workshop), London, UK, 11.November 2019, [Conference or Workshop Item]

This list was generated on Sun Oct 24 01:27:01 2021 CEST.