TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy"

Ebene hoch
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | U | V | W | Y | Z
Anzahl der Einträge auf dieser Ebene: 228.

A

Amler, Hendrik :
Evaluation of payment channel networks for micropayments.
TU Darmstadt
[Masterarbeit] , (2018)

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit] , (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[ Konferenzveröffentlichung] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) S. 143-163.
[Artikel] , (2017)

Almon, Lars ; Riecker, Michael ; Hollick, Matthias :
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
[Online-Edition: https://ieeexplore.ieee.org/document/8109386]
In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 9-12 Oct. 2017, Singapore. IEEE
[ Konferenzveröffentlichung] , (2017)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2016)

Ali, Azmzt ; Othmane, Lotfi Ben :
Towards effective security assurance for incremental software development - the case of zen cart application,.
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[ Konferenzveröffentlichung] , (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[ Konferenzveröffentlichung] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[ Konferenzveröffentlichung] , (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes] , (2016)

B

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André :
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?.
[ Konferenzveröffentlichung] , (2019)

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[ Konferenzveröffentlichung] , (2018)

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[ Konferenzveröffentlichung] , (2018)

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar :
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
[Online-Edition: https://www.raid2018.org/]
In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece. In: Lecture Notes in Computer Science , 11050 . Springer International Publishing
[ Konferenzveröffentlichung] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[ Konferenzveröffentlichung] , (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[ Konferenzveröffentlichung] , (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[ Konferenzveröffentlichung] , (2018)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit] , (2017)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[ Konferenzveröffentlichung] , (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[ Konferenzveröffentlichung] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[ Konferenzveröffentlichung] , (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[ Konferenzveröffentlichung] , (2017)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit] , (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[ Konferenzveröffentlichung] , (2016)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[ Konferenzveröffentlichung] , (2014)

C

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes] , (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[ Konferenzveröffentlichung] , (2018)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[ Konferenzveröffentlichung] , (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes] , (2017)

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias :
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: Privacy, Security and Trust Conference IEEE
[ Konferenzveröffentlichung] , (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[ Konferenzveröffentlichung] , (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[ Konferenzveröffentlichung] , (2016)

D

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza :
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, 14.-16.08.2019, Santa Clara, CA, USA.
[ Konferenzveröffentlichung] , (2019)

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina :
Multiparty Virtual State Channels.
[Online-Edition: https://eurocrypt.iacr.org/2019/]
In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Eurocrypt 2019 IACR , Darmstadt
[ Konferenzveröffentlichung] , (2019)

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel :
Perun: Virtual Payment Hubs over Cryptocurrencies.
[Online-Edition: https://www.ieee-security.org/TC/SP2018/]
In: 39th IEEE Symposium on Security and Privacy, MAY 21-23, 2018, THE HYATT REGENCY, SAN FRANCISCO, CA. IEEE Computer Society
[ Konferenzveröffentlichung] , (2019)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
[Online-Edition: http://fps2018.encs.concordia.ca/]
In: The 11th International Symposium on Foundations & Practice of Security (FPS), 13, 14 and 15 November 2018, Montreal, Canada. In: LNCS . Springer
[ Konferenzveröffentlichung] , (2018) ((Noch) nicht publiziert)

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian :
FairSwap: How to fairly exchange digital goods.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[ Konferenzveröffentlichung] , (2018)

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina :
General State Channel Networks.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[ Konferenzveröffentlichung] , (2018)

du Crest de Villeneuve, Come :
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt
[Masterarbeit] , (2018)

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil :
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies IEEE
[ Konferenzveröffentlichung] , (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs) S. 159-178.
[Artikel] , (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[ Konferenzveröffentlichung] , (2018)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[ Konferenzveröffentlichung] , (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[ Konferenzveröffentlichung] , (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[ Konferenzveröffentlichung] , (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[ Konferenzveröffentlichung] , (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[ Konferenzveröffentlichung] , (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 S. 42-53. ISSN 0140-3664
[Artikel] , (2016)

E

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira :
Lattice Based Modularization of Static Analyses.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509]
In: SOAP 2018, Amsterdam, Netherlands. Companion Proceedings for the ISSTA/ECOOP 2018 Workshops ACM
[ Konferenzveröffentlichung] , (2018)

F

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias :
Perils of Zero-Interaction Security in the Internet of Things.
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2019) ACM
[ Konferenzveröffentlichung] , (2019)

Felsen, Susanne :
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt
[Masterarbeit] , (2019)

Franke, Fabian :
Learning the Beams.
TU Darmstadt
[Masterarbeit] , (2018)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP S. 1.
[Artikel] , (2017)

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES) ACM
[ Konferenzveröffentlichung] , (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[ Konferenzveröffentlichung] , (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017 , München
[ Konferenzveröffentlichung] , (2017)

G

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
[Artikel] , (2018)

Günther, Daniel :
Private Function Evaluation with Universal Circuits.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2018)

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael :
Path MTU Discovery Considered Harmful.
[Online-Edition: http://icdcs2018.ocg.at]
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, 2.-5.7.2018, Vienna, Austria.
[ Konferenzveröffentlichung] , (2018)

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , S. 83-98.
[Buchkapitel] , (2018)

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[ Konferenzveröffentlichung] , (2018)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[ Konferenzveröffentlichung] , (2017)

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval :
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
[Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...]
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA , Athens, Greece
[ Konferenzveröffentlichung] , (2017)

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) :

Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[ Konferenzveröffentlichung] , (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit] , (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colonies for Efficient and Anonymous Group Communication Systems.
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958]
2017 International Conference on Networked Systems (NetSys) IEEE , Göttingen, Germany
[ Konferenzveröffentlichung] , (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
[Online-Edition: https://ieeexplore.ieee.org/document/7983129]
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) IEEE , Las Vegas, NV, USA
[ Konferenzveröffentlichung] , (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[ Konferenzveröffentlichung] , (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[ Konferenzveröffentlichung] , (2017)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[ Konferenzveröffentlichung] , (2016)

H

Hartwig, Katrin ; Reuter, Christian :
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany. Siegen, Germany
[ Konferenzveröffentlichung] , (2019)

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira :
A unified lattice model and framework for purity analyses.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226]
In: ASE 2018, 3.-7.9.2018, Corum, Montpellier, France. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering ACM
[ Konferenzveröffentlichung] , (2018)

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[ Konferenzveröffentlichung] , (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit] , (2018)

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[ Konferenzveröffentlichung] , (2017)

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich :
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.

[Report] , (2017)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit] , (2016)

I

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) :

Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding. Routledge, London London
[Buchkapitel] , (2018)

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit] , (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[ Konferenzveröffentlichung] , (2016)

J

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng :
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
[Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/]
4. IEEE European Symposium on Security and Privacy (EuroS&P'19)
[ Konferenzveröffentlichung] , (2019)

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit] , (2017)

K

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Artikel] , (2019)

Krämer, Juliane ; Loiero, Mirjam :
Fault Attacks on UOV and Rainbow.
[Online-Edition: https://www.cosade.org/index.html]
COSADE 2019 Springer
[ Konferenzveröffentlichung] , (2019)

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (ed.) :

Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany
[Buchkapitel] , (2019)

Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias :
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany. Siegen, Germany
[ Konferenzveröffentlichung] , (2019)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[ Konferenzveröffentlichung] , (2018)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Anderes] , (2018)

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan :
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias :
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...]
In: Mensch und Computer 2018: Tagungsband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar
Dachselt, Raimund ; Weber, Gerhard (eds.) :

Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria :
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1) S. 1-19.
[Artikel] , (2018)

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo :
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK. Portsmouth, UK
[ Konferenzveröffentlichung] , (2018)

Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita :
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...]
In: Journal of Contingencies and Crisis Management (JCCM) S. 1-16.
[Artikel] , (2018)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[ Konferenzveröffentlichung] , (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 S. 88-99.
[Artikel] , (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit] , (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit] , (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[ Konferenzveröffentlichung] , (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) S. 177-197.
[Artikel] , (2017)

Kaufhold, Marc-André ; Reuter, Christian :
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...]
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1) S. 78-88.
[Artikel] , (2017)

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Eibl, Maximilian ; Gaedke, Martin (eds.) :

Social Media Analytics: Eine Marktstudie im Krisenmanagement.
[Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...]
In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn. Bonn
[ Konferenzveröffentlichung] , (2017)

Kaufhold, Marc-André ; Reuter, Christian
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) :

The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
[Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...]
In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, May 21-24, 2017, Albi, France. Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM) Albi, France
[ Konferenzveröffentlichung] , (2017)

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236]
Mensch und Computer 2017 - Workshopband Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[ Konferenzveröffentlichung] , (2016)

L

Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian :
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Wien, AUT
[ Konferenzveröffentlichung] , (2019)

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP) S. 45-67.
[Artikel] , (2018)

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report] , (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[ Konferenzveröffentlichung] , (2017)

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar :
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016_Ludwigetal_Situa...]
In: International Journal on Human-Computer Studies (IJHCS), 102 (C) S. 103-121.
[Artikel] , (2017)

Leopold, Inken ; Reuter, Christian
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...]
In: Mensch & Computer: Tagungsband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh :
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5) S. 64-75.
[Artikel] , (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[ Konferenzveröffentlichung] , (2016)

M

Mantz, Dennis :
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt
[Masterarbeit] , (2018)

Mehmedovic, Damir :
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt
[Bachelorarbeit] , (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[ Konferenzveröffentlichung] , (2018)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit] , (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit] , (2017)

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar :
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z]
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6) S. 959-1003.
[Artikel] , (2017)

Mohan, Vaishnavi ; Othmane, Lotfi Ben :
SecDevOps: Is It a Marketing Buzzword?
Proc. of the 11th International Conference on Availability, Reliability and Security (ARES)
[ Konferenzveröffentlichung] , (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel] , (2016)

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[ Konferenzveröffentlichung] , (2016)

N

Neubauer, Sven :
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt
[Bachelorarbeit] , (2018)

Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus
Wiemeyer, Josef (ed.) :

IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt. Darmstadt Darmstadt
[Buchkapitel] , (2018)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[ Konferenzveröffentlichung] , (2017)

P

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay :
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019 Springer
[ Konferenzveröffentlichung] , (2019)

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg :
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
[Online-Edition: https://sigmobile.org/mobicom/2018/]
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, 29.10.-2.11.2018, New Delhi, India. MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking ACM
[ Konferenzveröffentlichung] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018 Springer
[ Konferenzveröffentlichung] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Artikel] , (2018)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[ Konferenzveröffentlichung] , (2017)

Pascoal, Tulio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
In: Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC).
[ Konferenzveröffentlichung] , (2017)

Pottebaum, Jens ; Reuter, Christian :
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
[Online-Edition: http://www.peasec.de/paper/2017/2017_PottebaumReuter_Editori...]
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4) iv-vii. ISSN 1937-9420
[Artikel] , (2017)

Pinatti de Carvalho, Aparecido Fabiano ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker :
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
[Online-Edition: https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-...]
In: Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK. Sheffield, UK
[ Konferenzveröffentlichung] , (2017)

Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian
Eibl, Maximilian ; Gaedke, Martin (eds.) :

IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...]
In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn. Bonn
[ Konferenzveröffentlichung] , (2017)

R

Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany
[Buchkapitel] , (2019)

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel :
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
[Online-Edition: https://www.gil-net.de/tagungen.php]
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, 18.-19.02.2019, Wien, AUT.
[ Konferenzveröffentlichung] , (2019)

Reuter, Christian:
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
Springer Vieweg, Wiesbaden, Germany
[Buch] , (2019)

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (ed.) :

From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany
[Buchkapitel] , (2019)

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad:
Special Issue on Social Media in Conflicts and Crises.

[Buch] , (2019)

Riebe, Thea ; Reuter, Christian
Reuter, Christian (ed.) :

Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany
[Buchkapitel] , (2019)

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (ed.) :

Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany
[Buchkapitel] , (2019)

Reuter, Christian
Reuter, Christian (ed.) :

Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany
[Buchkapitel] , (2019)

Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah :
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany. Siegen, Germany
[ Konferenzveröffentlichung] , (2019)

Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker
Reuter, Christian (ed.) :

The Future of Information Technology for Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany
[Buchkapitel] , (2019)

Riebe, Thea ; Reuter, Christian :
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden
[Artikel] , (2019)

Reith, Robert Nikolai :
Silently Learning your Support Vector Machines Models.
TU Darmstadt
[Bachelorarbeit] , (2018)

Rowe, Steven :
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt
[Bachelorarbeit] , (2018)

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira :
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236503]
In: SOAP 2018, Amsterdam, Netherlands. Companion Proceedings for the ISSTA/ECOOP 2018 Workshops ACM
[ Konferenzveröffentlichung] , (2018)

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas :
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18) IEEE
[ Konferenzveröffentlichung] , (2018)

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[ Konferenzveröffentlichung] , (2018)

Reuter, Christian ; Leopold, Inken :
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1) in press.
[Artikel] , (2018)

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
Dachselt, Raimund ; Weber, Gerhard (eds.) :

Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian
Dachselt, Raimund ; Weber, Gerhard (eds.) :

From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
Dachselt, Raimund ; Weber, Gerhard (eds.) :

5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian :
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
[Online-Edition: https://wissenschaft-und-frieden.de/seite.php?artikelID=2312]
In: Wissenschaft & Frieden S. 60-61.
[Artikel] , (2018)

Reuter, Christian ; Pottebaum, Jens :
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterPottebaum_Editori...]
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1) v-viii.
[Artikel] , (2018)

Reuter, Christian ; Pottebaum, Jens:
Special Issue on IT Support for Crisis and Continuity Management.

[Buch] , (2018)

Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian :
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
[Online-Edition: http://idl.iscram.org/files/christianreuter/2018/1570_Christ...]
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA. Rochester, New York, USA
[ Konferenzveröffentlichung] , (2018)

Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick :
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), accepted
[Artikel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie :
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhofe...]
In: BBK Bevölkerungsschutz, 2 S. 22-24.
[Artikel] , (2018)

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas :
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpi...]
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 1 S. 64-66.
[Artikel] , (2018)

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda :
Editorial of the Special Issue on Social Media in Crisis Management.
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranP...]
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4) S. 277-279.
[Artikel] , (2018)

Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André :
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_So...]
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4) S. 280-294.
[Artikel] , (2018)

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Reuter, Christian (ed.) :

Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , S. 621-630. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian
Reuter, Christian (ed.) :

Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , S. 3-14. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Mentler, Tilo :
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/a...]
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1) S. 2-3. ISSN 0966-0879
[Artikel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

Soziale Medien in Notfällen, Krisen und Katastrophen.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden Wiesbaden , S. 379-402. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

Informatik für Frieden und Sicherheit.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , S. 573-595. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André :
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenY...]
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1) S. 41-57. ISSN 0966-0879
[Artikel] , (2018)

Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar
Reuter, Christian (ed.) :

Resilienz durch Kooperationstechnologien.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , S. 443-465. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , S. 17-40. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[ Konferenzveröffentlichung] , (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1) S. 62-78.
[Artikel] , (2017)

Reinhold, Thomas :
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
[Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...]
In: Sicherheit und Frieden
[Artikel] , (2017)

Reinhold, Thomas ; Schulze, Matthias :
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...]

[Anderes] , (2017)

Riebe, Thea ; Geisse, Jens :
Warum die Cyber-Sicherheitskultur ein Update braucht.
[Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...]
sicherheitspolitik-blog.de , Frankfurt a.M.
[Anderes] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah
Klafft, Michael (ed.) :

Informing the Population: Mobile Warning Apps.
[Online-Edition: http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-45272...]
In: Risk and Crisis Communication in Disaster Prevention and Management. epubli, Wilhelmshaven Wilhelmshaven , S. 31-41. ISBN 9783745054484
[Buchkapitel] , (2017)

Reuter, Christian ; Pätsch, Katja ; Runft, Elena
Leimeister, J. M. ; Brenner, W. (eds.) :

Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
[Online-Edition: https://aisel.aisnet.org/wi2017/track06/paper/6/]
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland. St. Gallen, Switzerland
[ Konferenzveröffentlichung] , (2017)

Reuter, Christian ; Mentler, Tilo ; Geisler, Stefan ; Herczeg, Michael ; Ludwig, Thomas ; Pipek, Volkmar ; Nestler, Simon
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS0...]
Mensch und Computer 2017 - Workshopband Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas
Paterno, Fabio ; Wulf, Volker (eds.) :

End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLudwig_EU...]
In: New Perspectives in End-User Development. Springer , S. 307-332. ISBN 978-3-319-60290-5
[Buchkapitel] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker
Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (eds.) :

Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchet...]
In: Sicherheit (DIAGONAL Jahrgang 38). Vandenhoeck & Ruprecht, Göttingen Göttingen , S. 207-224. ISBN 978-3-8471-0739-2
[Buchkapitel] , (2017)

Reuter, Christian ; Wiegärtner, Daniel ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI...]
In: Mensch & Computer: Tagungsband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Reuter, Christian ; Pätsch, Katja ; Runft, Elena :
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITfo...]
In: i-com: Journal of Interactive Media, 16 (2) S. 181-195.
[Artikel] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie :
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhofe...]
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 1 (Issue CSCW) S. 1-19.
[Artikel] , (2017)

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian
Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (eds.) :

Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_...]
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation. Springer, Berlin, Germany Berlin, Germany , S. 75-88. ISBN 978-3-319-44711-7
[Buchkapitel] , (2017)

Reuter, Christian ; Spielhofer, Thomas :
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2016/2016_reuterspiel...]
In: Journal Technological Forecasting and Social Change (TFSC), 121 S. 168-180.
[Artikel] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah :
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKn...]
In: European Conference on Information Systems (ECIS), Guimar\~es, Portugal. Guimar\~es, Portugal
[ Konferenzveröffentlichung] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Steinfort, René
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) :

Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
[Online-Edition: http://idl.iscram.org/files/christianreuter/2017/1492_Christ...]
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France. Albi, France
[ Konferenzveröffentlichung] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Klös, Jonas
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3214]
In: Mensch & Computer: Workshopband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

S

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias :
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3267716]
In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), October 29–November 2, 2018, New Delhi, India. ACM
[ Konferenzveröffentlichung] , (2018)

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias :
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3241566]
In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), October 29–November 2, 2018, New Delhi, India. ACM
[ Konferenzveröffentlichung] , (2018)

Schneider, Thomas ; Tkachenko, Oleksandr :
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[ Konferenzveröffentlichung] , (2018)

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias :
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 18, 2018 - Jun 20, 2018, Stockholm, Sweden. Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[ Konferenzveröffentlichung] , (2018)

Scholl, Simon ; Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André :
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...]
In: Mensch und Computer 2018: Tagungsband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[ Konferenzveröffentlichung] , (2018)

Schick, Oliver :
Web application for privacy-preserving scheduling.
TU Darmstadt
[Bachelorarbeit] , (2017)

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias :
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017) ACM
[ Konferenzveröffentlichung] , (2017)

Schroth, Nils :
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt
[Bachelorarbeit] , (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[ Konferenzveröffentlichung] , (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
23rd ACM Conference on Computer and Communications Security (CCS) 2016 CCS 2016
[ Konferenzveröffentlichung] , (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
ACM WiSec 2016
[ Konferenzveröffentlichung] , (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
53rd Design Automation Conference (DAC)
[ Konferenzveröffentlichung] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[ Konferenzveröffentlichung] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
[Artikel] , (2016)

T

Tkachenko, Oleksandr :
Privacy-Preserving Genomics on a Large Scale.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2018)

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[ Konferenzveröffentlichung] , (2018)

Treiber, Amos :
Access Count Leakage in Oblivious RAMs.
TU Darmstadt
[Masterarbeit] , (2018)

Tariq, Taha :
Web application for privacy-preserving assignments.
TU Darmstadt
[Masterarbeit] , (2018)

Tkachenko, Oleksandr :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt
[Masterarbeit] , (2017)

Traverso, Giulia ; Cordero, Carlos Garcia ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
[Online-Edition: https://www.ucalgary.ca/pst2017/]
15th Annual Conference on Privacy, Security and Trust (PST)
[ Konferenzveröffentlichung] , (2017)

Tundis, Andrea ; Cordero, Carlos Garcia ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max :
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
ICCPS 2017: 19th International Conference on Cyber-Physical Systems WASET
[ Konferenzveröffentlichung] , (2017)

U

Ullrich, Fabian :
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt
[Masterarbeit] , (2018)

V

Varky, Jacek :
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt
[Masterarbeit] , (2018)

van der Wijden, Marius :
Payment and State Channels in practice.
TU Darmstadt
[Masterarbeit] , (2018)

Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max :
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Network Operations and Management Symposium (NOMS) IEEE
[ Konferenzveröffentlichung] , (2018)

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[ Konferenzveröffentlichung] , (2017)

von Drachenfels, Magdalena ; Riebe, Thea :
Normative Ordnungen des Digitalen - Konferenzbericht.
sicherheitspolitik-blog.de , Frankfurt a.M.
[Anderes] , (2017)

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Cordero, Carlos Garcia ; Mühlhäuser, Max :
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
IEEE Conference on Communications and Network Security IEEE
[ Konferenzveröffentlichung] , (2016)

W

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit] , (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17) ACM
[ Konferenzveröffentlichung] , (2017)

Wiegärtner, Daniel ; Reuter, Christian ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3243]
In: Mensch & Computer: Workshopband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[ Konferenzveröffentlichung] , (2017)

Y

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit] , (2017)

Z

Zimmermann, Verena ; Gerber, Nina
Tryfonas, Theo (ed.) :

“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[ Konferenzveröffentlichung] , (2017)

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit :
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41 S. 308-313.
[Artikel] , (2017)

Diese Liste wurde am Sun Mar 24 02:29:12 2019 CET generiert.