TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | U | V | W | Y | Z | Á
Number of items at this level: 287.

A

Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/larissaaldehoff/2019/1798_Lariss...],
[Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Kamp, Laurenz and Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
In: 2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, In: Lecture Notes in Computer Science, 10707, [Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Frieß, Tamara and Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session, Vancouver, Canada, [Other]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Almon, Lars and Riecker, Michael and Hollick, Matthias (2017):
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
IEEE, In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9-12 Oct. 2017, DOI: 10.1109/LCN.2017.110,
[Online-Edition: https://ieeexplore.ieee.org/document/8109386],
[Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Ali, Azmzt and Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Computational Security of Quantum Encryption - QCRYPT 2016, Springer, Wahington, D.C., USA, In: Lecture Notes in Computer Science - ICITS, [Other]

B

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019, k.A., Springer, [Conference or Workshop Item]

Batina, Lejla and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Conference or Workshop Item]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria:, 18.-19.2.2019, [Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Conference or Workshop Item]

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference or Workshop Item]

Böck, Leon and Vasilomanolakis, Emmanouil and Mühlhäuser, Max and Karuppayah, Shankar (2018):
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
In: Research in Attacks, Intrusions, and Defenses, Springer International Publishing, In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, In: Lecture Notes in Computer Science, 11050, DOI: 10.1007/978-3-030-00470-5_24,
[Online-Edition: https://www.raid2018.org/],
[Conference or Workshop Item]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference or Workshop Item]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Bielsa, Guillermo and Palacios, Joan and Loch, Adrian and Steinmetzer, Daniel and Cesari, Paolo and Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
TU Darmstadt, [Master Thesis]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium, In: USENIX Security '17, [Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

C

Classen, Jiska and Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
In: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), Miami, FL, USA, May 15, 2019 - May 17, 2019, DOI: https: //doi.org/10.1145/3317549.3319727,
[Conference or Workshop Item]

Classen, Jiska and Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon, [Other]

Classen, Jiska and Wegemer, Daniel and Patras, Paul and Spink, Tom and Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Conference or Workshop Item]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
London, UK, [Online-Edition: https://www.blackhat.com/eu-17/],
[Other]

Cordero, Carlos Garcia and Hauke, Sascha and Mühlhäuser, Max and Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Frassetto, Tommaso and Homescu, Andrei and Koppen, Georg and Larsen, Per and Liebchen, Christopher and Perry, Mike and Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference or Workshop Item]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

D

Degabriele, Jean Paul and Janson, Christian and Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December, 8-12, [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Conference or Workshop Item]

Das, Poulami and Faust, Sebastian and Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
In: ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostáková, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Hesse, Julia and Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019, Darmstadt, IACR, In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Online-Edition: https://eurocrypt.iacr.org/2019/],
[Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
IEEE Computer Society, In: 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Online-Edition: https://www.ieee-security.org/TC/SP2018/],
[Conference or Workshop Item]

Dziembowski, Stefan and Faust, Sebastian and Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, In: The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, In: LNCS, [Online-Edition: http://fps2018.encs.concordia.ca/],
[Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Dziembowski, Stefan and Faust, Sebastian and Hostakova, Kristina (2018):
General State Channel Networks.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master Thesis]

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 159-178, DOI: 10.1515/popets-2018-0037,
[Article]

Deaconescu, Razvan and Carabas, Costin and Manda, Iulia and Enck, William and Chiroiu, Mihai and Li, Ninghui and Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: 13th ASIA Conference on Information, Computer and Communications Security, In: AsiaCCS, [Conference or Workshop Item]

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Online-Edition: https://encrypto.de/papers/DHSS17.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Conference or Workshop Item]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Conference or Workshop Item]

Dewald, Florian and Mantel, Heiko and Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Grube, Tim and Schiffner, Stefan and Kikiras, Panayotis and Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), Elsevier, pp. 42-53, 76, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

E

Eichberg, Michael and Kübler, Florian and Helm, Dominik and Reif, Michael and Salvaneschi, Guido and Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509],
[Conference or Workshop Item]

F

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference or Workshop Item]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, p. 1, PP, DOI: 10.1109/COMST.2017.2748278,
[Article]

Fuhry, Benny and Bahmani, Raad and Brasser, Ferdinand and Hahn, Florian and Kerschbaum, Florian and Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference or Workshop Item]

Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, [Conference or Workshop Item]

G

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference or Workshop Item]

Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian
Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
Hamburg, Germany, ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8. bis 11. September 2019, [Conference or Workshop Item]

Gil Dantas, Yuri and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference or Workshop Item]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Mezini, Mira
Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, Gesellschaft für Informatik, pp. 117-118, [Book Section]

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, pp. 83-98, [Book Section]

Gil Dantas, Yuri and Gay, Richard and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Online-Edition: https://encrypto.de/papers/GKS17.pdf],
[Conference or Workshop Item]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference or Workshop Item]

Gerber, Nina and Gerber, Paul and Hernando, Maria
Tryfonas, Theo (ed.) (2017):
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_44,
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference or Workshop Item]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Gagliardoni, Tommaso and Hülsing, Andreas and Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: Advances in Cryptology – CRYPTO 2016, Springer, In: LNCS, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

H

Hartwig, Katrin and Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Hartwig, Katrin and Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTwe...],
[Conference or Workshop Item]

Helm, Dominik and Kübler, Florian and Eichberg, Michael and Reif, Michael and Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ACM, In: ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226],
[Conference or Workshop Item]

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference or Workshop Item]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Hermann, Ben and Li, Ximeng and Mantel, Heiko and Mezini, Mira and Tasch, Markus and Wendel, Florian and Weber, Friedrich (2017):
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
[Report]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

I

Ide, Tobias and Sumer, Vakur and Aldehoff, Larissa
Ojendal, Joakim and Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt, [Master Thesis]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference or Workshop Item]

J

Järvinen, Kimmo and Leppäkoski, Helena and Lohan, Elena Simona and Richter, Philipp and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), [Online-Edition: https://encrypto.de/papers/JLLRSTY19.pdf],
[Conference or Workshop Item]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Online-Edition: https://encrypto.de/papers/JKSTY18.pdf],
[Conference or Workshop Item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt, [Master Thesis]

K

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, 2, [Online-Edition: https://encrypto.de/papers/KNLAS19.pdf],
[Article]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19), SciTePress, [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
In: 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/],
[Conference or Workshop Item]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8998],
[Ph.D. Thesis]

Kohnhäuser, Florian and Püllen, Dominik and Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
In: IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Online-Edition: https://www.ieee-security.org/TC/SPW2019/SafeThings/],
[Conference or Workshop Item]

Krämer, Juliane and Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
In: COSADE 2019, Springer, Darmstadt, [Online-Edition: https://www.cosade.org/index.html],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian
Reuter, Christian (ed.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38, [Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian (2019):
Resilience in Security and Crises through Adaptions and Transitions.
Kassel, Germany, Gesellschaft für Informatik e. V., In: Informatik 2019, Lecture Notes in Informatics (LNI), Kassel, Germany, 23.-26. September, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian
Reuter, Christian (ed.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, pp. 1-11, [Online-Edition: https://arxiv.org/pdf/1907.07725.pdf],
[Article]

Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReutereta...],
[Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session, [Online-Edition: https://encrypto.de/papers/KSS18.pdf],
[Other]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), pp. 1-19, 10, (1), DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
Portsmouth, UK, In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, [Conference or Workshop Item]

Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), pp. 1-16, DOI: 10.1111/1468-5973.12249,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...],
[Article]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, pp. 88-99, 71, DOI: 10.1016/j.cose.2017.06.007,
[Article]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt, [Master Thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt, [Master Thesis]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 177-197, 2017, (4), DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],
[Article]

Kaufhold, Marc-André and Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", pp. 78-88, 7, (1), [Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...],
[Article]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon
Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian
Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), Albi, France, In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...],
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0386,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236],
[Conference or Workshop Item]

Kiss, Ágnes and Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Online-Edition: https://encrypto.de/papers/KS16.pdf],
[Conference or Workshop Item]

L

Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/amandalanger1/2019/1757_AmandaLa...],
[Conference or Workshop Item]

Linsner, Sebastian and Varma, Rashmi and Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna. Austria, 18.-19. Februar 2019, [Online-Edition: http://gil-net.de/Publikationen/139_119.pdf],
[Conference or Workshop Item]

Lemos, Marcilio O. O. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, Elsevier, pp. 45-67, 94, ISSN 2352-2216,
[Article]

Li, Ximeng and Mantel, Heiko and Schickel, Johannes and Tasch, Markus and Weber, Alexandra and Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Li, Ximeng and Mantel, Heiko and Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), pp. 103-121, 102, (C), DOI: 10.1016/j.ijhcs.2016.09.008,
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016_Ludwigetal_Situa...],
[Article]

Leopold, Inken and Reuter, Christian
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0350,
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...],
[Conference or Workshop Item]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, pp. 64-75, 3, (5), [Article]

Lettner, Julian and Kollenda, Benjamin and Homescu, Andrei and Larsen, Per and Schuster, Felix and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Conference or Workshop Item]

M

Mantz, Dennis and Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, Jun 17, 2019 - Jun 21, 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]

Mantel, Heiko and Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
In: The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Master Thesis]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelor Thesis]

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt, [Master Thesis]

Meister, Richard (2017):
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt, [Master Thesis]

Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), pp. 959-1003, 26, (4-6), DOI: 10.1007/s10606-017-9291-z,
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z],
[Article]

Mohan, Vaishnavi and Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), [Conference or Workshop Item]

McLaughlin, Stephen and Konstantinou, Charalambos and Wang, Xueyang and Davi, Lucas and Sadeghi, Ahmad-Reza and Maniatakos, Michail and Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP, (99), DOI: 10.1109/JPROC.2015.2512235,
[Article]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference or Workshop Item]

N

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference or Workshop Item]

Nautsch, Andreas and Jiménez, Abelino and Treiber, Amos and Kolberg, Jascha and Jasserand, Catherine and Kindt, Els and Delgado, Héctor and Todisco, Massimiliano and Hmani, Mohamed Amine and Mtibaa, Aymen and Abdelraheem, Mohammed Ahmed and Abad, Alberto and Teixeira, Francisco and Matrouf, Driss and Gomez-Barrero, Marta and Petrovska-Delacrétaz, Dijana and Chollet, Gérard and Evans, Nicholas and Schneider, Thomas and Bonastre, Jean-François and Raj, Bhiksha and Trancoso, Isabel and Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Online-Edition: https://encrypto.de/papers/NJTKHMAATMGPCESBRTB19.pdf],
[Article]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor Thesis]

Nordmann, Alfred and Reuter, Christian and Lederer, Markus (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, hrsg. von Josef Wiemeyer, Darmstadt, pp. 71-89, [Online-Edition: http://www.peasec.de/paper/2019/2019_LedererNordmannReuter_I...],
[Book Section]

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Online-Edition: https://encrypto.de/papers/NST17.pdf],
[Conference or Workshop Item]

P

Pinkas, Benny and Schneider, Thomas and Tkachenko, Oleksandr and Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019, Springer, [Online-Edition: https://encrypto.de/papers/PSTY19.pdf],
[Conference or Workshop Item]

Palacios, Joan and Steinmetzer, Daniel and Loch, Adrian and Hollick, Matthias and Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, ACM, In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Online-Edition: https://sigmobile.org/mobicom/2018/],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Online-Edition: https://encrypto.de/papers/PSWW18.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), pp. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Online-Edition: https://encrypto.de/papers/PSZ18.pdf],
[Article]

Portela, Bernardo and Barbosa, Manuel and Scerri, Guillaume and Warinschi, Bogdan and Bahmani, Raad and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Pascoal, Túlio A. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, Springer, [Conference or Workshop Item]

Pottebaum, Jens and Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), IGI Global, pp. iv-vii, 9, (4), ISSN 1937-9420,
[Online-Edition: http://www.peasec.de/paper/2017/2017_PottebaumReuter_Editori...],
[Article]

Pinatti de Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
Sheffield, UK, In: Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK, [Online-Edition: https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-...],
[Conference or Workshop Item]

Pottebaum, Jens and Erfurth, Christian and Reuter, Christian
Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...],
[Conference or Workshop Item]

R

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference or Workshop Item]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference or Workshop Item]

Reif, Michael and Kübler, Florian and Eichberg, Michael and Helm, Dominik and Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
In: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3293882&picked=prox],
[Conference or Workshop Item]

Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André
Reuter, Christian (ed.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Online-Edition: https://www.gil-net.de/tagungen.php],
[Conference or Workshop Item]

Reuter, Christian (2019):
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
Wiesbaden, Germany, Springer Vieweg, [Book]

Reinhold, Thomas and Reuter, Christian
Reuter, Christian (ed.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad (2019):
Special Issue on Social Media in Conflicts and Crises.
accepted, [Book]

Riebe, Thea and Reuter, Christian
Reuter, Christian (ed.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reinhold, Thomas and Reuter, Christian
Reuter, Christian (ed.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Conference or Workshop Item]

Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad (2019):
Social Media in Conflicts and Crises.
In: Behaviour & Information Technology (BIT), 38, DOI: 10.1080/0144929X.2019.1629025.,
[Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Riebe, Thea and Reuter, Christian
Reuter, Christian (ed.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Ludwig, Thomas and Pottebaum, Jens and Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska
Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.0.2019, ISSN ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Book]

Reuter, Christian
Ückert, Sandra (ed.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Book Section]

Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reuter, Christian
Reuter, Christian (ed.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Reuter, Christian
Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (eds.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, pp. accepted, [Book Section]

Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas
Werkner, Ines-Jacqueline (ed.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, Springer VS, pp. akzeptiert, [Book Section]

Riebe, Thea and Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, pp. 46-48, (1), [Online-Edition: http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF...],
[Article]

Reuter, Christian and Altmann, Jürgen and Aal, Konstantin and Aldehoff, Larissa and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker
Reuter, Christian (ed.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, DOI: 10.1007/978-3-658-25652-4_19,
[Online-Edition: https://www.springer.com/de/book/9783658256517],
[Book Section]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelor Thesis]

Reif, Michael and Eichberg, Michael and Kübler, Florian and Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236503],
[Conference or Workshop Item]

Richter, Philipp and Yang, Zheng and Tkachenko, Oleksandr and Leppäkoski, Helena and Järvinen, Kimmo and Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Online-Edition: https://encrypto.de/papers/RYTLJSL18.pdf],
[Conference or Workshop Item]

Riazi, M. Sadegh and Weinert, Christian and Tkachenko, Oleksandr and Songhori, Ebrahim M. and Schneider, Thomas and Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196522,
[Online-Edition: https://encrypto.de/papers/RWTSSK18.pdf],
[Conference or Workshop Item]

Reif, Michael and Eichberg, Michael and Mezini, Mira
Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
Call Graph Construction for Java Libraries.
Bonn, Gesellschaft für Informatik, In: Software Engineering und Software Management 2018, Bonn, [Conference or Workshop Item]

Reuter, Christian and Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, pp. in press, 2, (1), [Article]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...],
[Conference or Workshop Item]

Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag...],
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Geisler, Stefan and Ludwig, Thomas and Pipek, Volkmar and Pottebaum, Jens
Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...],
[Conference or Workshop Item]

Riebe, Thea and Nordmann, Alfred and Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, pp. 60-61, [Online-Edition: https://wissenschaft-und-frieden.de/seite.php?artikelID=2312],
[Article]

Reuter, Christian and Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), pp. v-viii, 10, (1), [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterPottebaum_Editori...],
[Article]

Reuter, Christian and Pottebaum, Jens (2018):
Special Issue on IT Support for Crisis and Continuity Management.
10, [Book]

Reuter, Christian and Backfried, Gerhard and Kaufhold, Marc-André and Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Online-Edition: http://idl.iscram.org/files/christianreuter/2018/1570_Christ...],
[Conference or Workshop Item]

Reuter, Christian and Ludwig, Thomas and Mischur, Patrick (2018):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), accepted, [Article]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, pp. 22-24, 2, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, pp. 64-66, 1, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpi...],
[Article]

Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), pp. 277-279, 34, (4), DOI: 10.1080/10447318.2018.1427833,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranP...],
[Article]

Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), pp. 280-294, 34, (4), DOI: 10.1080/10447318.2018.1427832,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_So...],
[Article]

Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker
Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 621-630, DOI: 10.1007/978-3-658-19523-6_30,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian
Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 3-14, DOI: 10.1007/978-3-658-19523-6_1,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Mentler, Tilo (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), Wiley, pp. 2-3, 26, (1), ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/a...],
[Article]

Reuter, Christian and Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Springer Vieweg, pp. 379-402, DOI: 10.1007/978-3-658-19523-6_19,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 573-595, DOI: 10.1007/978-3-658-19523-6_28,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André (2018):
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), Wiley, pp. 41-57, 26, (1), ISSN 0966-0879,
DOI: 10.1111/1468-5973.12196,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenY...],
[Article]

Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar
Reuter, Christian (ed.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 443-465, DOI: 10.1007/978-3-658-19523-6_22,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André
Reuter, Christian (ed.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 17-40, DOI: 10.1007/978-3-658-19523-6_2,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Online-Edition: https://encrypto.de/papers/RSSSK17.pdf],
[Article]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...],
[Article]

Reinhold, Thomas and Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...],
[Other]

Riebe, Thea and Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de, Frankfurt a.M., [Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...],
[Other]

Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah
Klafft, Michael (ed.) (2017):
Informing the Population: Mobile Warning Apps.
In: Risk and Crisis Communication in Disaster Prevention and Management, Wilhelmshaven, epubli, pp. 31-41, [Online-Edition: http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-45272...],
[Book Section]

Reuter, Christian and Pätsch, Katja and Runft, Elena
Leimeister, J. M. and Brenner, W. (eds.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
St. Gallen, Switzerland, In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, [Online-Edition: https://aisel.aisnet.org/wi2017/track06/paper/6/],
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0380,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS0...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas
Paterno, Fabio and Wulf, Volker (eds.) (2017):
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development, Springer, pp. 307-332, DOI: 10.1007/978-3-319-60291-2_12,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLudwig_EU...],
[Book Section]

Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker
Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela (eds.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), Göttingen, Vandenhoeck & Ruprecht, pp. 207-224, DOI: 10.14220/digo.2017.38.1.207,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchet...],
[Book Section]

Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0352,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI...],
[Conference or Workshop Item]

Reuter, Christian and Pätsch, Katja and Runft, Elena (2017):
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, pp. 181-195, 16, (2), DOI: 10.1515/icom-2017-0013,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITfo...],
[Article]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2017):
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, pp. 1-19, 1, (Issue CSCW), DOI: 10.1145/3134725,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian
Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen (eds.) (2017):
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, Berlin, Germany, Springer, pp. 75-88, DOI: 10.1007/978-3-319-44711-7_7,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_...],
[Book Section]

Reuter, Christian and Spielhofer, Thomas (2017):
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Journal Technological Forecasting and Social Change (TFSC), pp. 168-180, 121, DOI: 10.1016/j.techfore.2016.07.038,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2016/2016_reuterspiel...],
[Article]

Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah (2017):
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
Guimar\~es, Portugal, In: European Conference on Information Systems (ECIS), Guimar\~es, Portugal, [Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKn...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Steinfort, René
Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
Albi, France, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France, [Online-Edition: http://idl.iscram.org/files/christianreuter/2017/1492_Christ...],
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws01-0384,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3214],
[Conference or Workshop Item]

S

Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka (2019):
Social Media Use in Emergencies of Citizens in the United Kingdom.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/thomasspielhofer2/2019/1748_Thom...],
[Conference or Workshop Item]

Schneider, Thomas and Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, In: 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Online-Edition: https://encrypto.de/papers/ST19ASIACCS.pdf],
[Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2019):
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol.
In: GetMobile: Mobile Computing and Communications, ACM, pp. 30-33, 23, (1), ISSN 23750529,
DOI: 10.1145/3351422.3351432,
[Article]

Stute, Milan and Narain, Sashank and Mariotto, Alex and Heinrich, Alexander and Kreitschmann, David and Noubir, Guevara and Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Santa Clara, CA, USA, In: 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, USA, August 14–16, 2019, [Online-Edition: https://www.usenix.org/conference/usenixsecurity19/presentat...],
[Conference or Workshop Item]

Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Carvalho, Pinatti De (2019):
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, pp. 63564-63577, 7, (1), DOI: 10.1109/ACCESS.2019.2916903,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=871...],
[Article]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian
Reuter, Christian (ed.) (2019):
Privacy vs. Security: Privacy Enhancing Technologies in Social Media in Security relevant Situations.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Schneider, Thomas and Treiber, Amos (2019):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, [Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3267716,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3267716],
[Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3241566,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3241566],
[Conference or Workshop Item]

Schneider, Thomas and Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268956,
[Online-Edition: https://encrypto.de/papers/TS18.pdf],
[Conference or Workshop Item]

Schaad, Andreas and Grohmann, Bjoern and Winzenried, Oliver and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, k.A., SciTePress, In: Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference or Workshop Item]

Steinmetzer, Daniel and Yuan, Yimin and Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Conference or Workshop Item]

Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...],
[Conference or Workshop Item]

Schick, Oliver (2017):
Web application for privacy-preserving scheduling.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Steinmetzer, Daniel and Loch, Adrian and García-García, Amanda and Widmer, Jörg and Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Conference or Workshop Item]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Ibrahim, Ahmad and Conti, Mauro and Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters), San Francisco, [Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

T

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Tkachenko, Oleksandr and Weinert, Christian and Schneider, Thomas and Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196541,
[Online-Edition: https://encrypto.de/papers/TWSH18.pdf],
[Conference or Workshop Item]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master Thesis]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Traverso, Giulia and Cordero, Carlos Garcia and Nojoumian, Mehrdad and Azarderakhsh, Reza and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
In: 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, CA, 28.-30.8. 2017, [Online-Edition: https://www.ucalgary.ca/pst2017/],
[Conference or Workshop Item]

Tundis, Andrea and Cordero, Carlos Garcia and Egert, Rolf and Garro, Alfredo and Mühlhäuser, Max (2017):
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
In: ICCPS 2017: 19th International Conference on Cyber-Physical Systems, WASET, [Conference or Workshop Item]

U

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

V

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Master Thesis]

van der Wijden, Marius (2018):
Payment and State Channels in practice.
TU Darmstadt, [Master Thesis]

Vasilomanolakis, Emmanouil and Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max (2018):
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), IEEE, Taipei, Taiwan., DOI: 10.1109/NOMS.2018.8406119,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Wolf, Jan Helge and Böck, Leon and Mühlhäuser, Max and Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe, London, UK, [Conference or Workshop Item]

von Drachenfels, Magdalena and Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de, Frankfurt a.M., [Other]

Vasilomanolakis, Emmanouil and Stahn, Michael and Cordero, Carlos Garcia and Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Conference or Workshop Item]

W

Wickert, Anna-Katharina and Reif, Michael and Eichberg, Michael and Dodhy, Anam and Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Conference or Workshop Item]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt, [Master Thesis]

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia
Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws17-0416,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3243],
[Conference or Workshop Item]

Y

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt, [Master Thesis]

Yalame, Mohammad Hossein and Farzam, Mohammad Hossein and Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17), Springer, [Conference or Workshop Item]

Z

Zimmermann, Verena and Gerber, Nina
Tryfonas, Theo (ed.) (2017):
“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_18,
[Conference or Workshop Item]

Zimmermann, Verena and Volkamer, Melanie and Vogt, Joachim and Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, pp. 308-313, 41, [Article]

Á

Álvarez, Flor and Almon, Lars and Radtki, Hauke and Hollick, Matthias (2019):
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
In: 9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019), Seattle, WA, 17-20, Oktober, 2019, [Conference or Workshop Item]

This list was generated on Sun Oct 13 01:27:45 2019 CEST.