TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z
Anzahl der Einträge auf dieser Ebene: 194.

A

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit] , (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[Konferenz- oder Workshop-Beitrag] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Artikel] , (2017)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Ali, Azmzt ; Othmane, Lotfi Ben :
Towards effective security assurance for incremental software development - the case of zen cart application,.
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag] , (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag] , (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes] , (2016)

B

Brand, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[Konferenz- oder Workshop-Beitrag] , (2018)

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar :
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
[Online-Edition: https://www.raid2018.org/]
In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece. In: Lecture Notes in Computer Science , 11050 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Konferenz- oder Workshop-Beitrag] , (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag] , (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[Konferenz- oder Workshop-Beitrag] , (2018)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit] , (2017)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag] , (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit] , (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag] , (2016)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[Konferenz- oder Workshop-Beitrag] , (2014)

C

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes] , (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes] , (2017)

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias :
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag] , (2016)

D

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel :
Perun: Virtual Payment Hubs over Cryptocurrencies.
[Online-Edition: https://www.ieee-security.org/TC/SP2018/]
In: 39th IEEE Symposium on Security and Privacy, MAY 21-23, 2018, THE HYATT REGENCY, SAN FRANCISCO, CA. IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2019)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
[Online-Edition: http://fps2018.encs.concordia.ca/]
In: The 11th International Symposium on Foundations & Practice of Security (FPS), 13, 14 and 15 November 2018, Montreal, Canada. In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2018) ((Noch) nicht publiziert)

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian :
FairSwap: How to fairly exchange digital goods.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina :
General State Channel Networks.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS), 15-19 October 2018, Toronto, Canada. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil :
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies IEEE
[Konferenz- oder Workshop-Beitrag] , (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs) pp. 159-178.
[Artikel] , (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag] , (2018)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Konferenz- oder Workshop-Beitrag] , (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 pp. 42-53. ISSN 0140-3664
[Artikel] , (2016)

F

Franke, Fabian :
Learning the Beams.
TU Darmstadt
[Masterarbeit] , (2018)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP p. 1.
[Artikel] , (2017)

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES) ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag] , (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017 , München
[Konferenz- oder Workshop-Beitrag] , (2017)

G

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko :
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
[Artikel] , (2018)

Günther, Daniel :
Private Function Evaluation with Universal Circuits.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag] , (2018)

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael :
Path MTU Discovery Considered Harmful.
[Online-Edition: http://icdcs2018.ocg.at]
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, 2.-5.7.2018, Vienna, Austria.
[Konferenz- oder Workshop-Beitrag] , (2018)

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , pp. 83-98.
[Buchkapitel] , (2018)

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag] , (2018)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval :
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
[Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...]
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA , Athens, Greece
[Konferenz- oder Workshop-Beitrag] , (2017)

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) :

Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[Konferenz- oder Workshop-Beitrag] , (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit] , (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colonies for Efficient and Anonymous Group Communication Systems.
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958]
2017 International Conference on Networked Systems (NetSys) IEEE , Göttingen, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
[Online-Edition: https://ieeexplore.ieee.org/document/7983129]
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) IEEE , Las Vegas, NV, USA
[Konferenz- oder Workshop-Beitrag] , (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[Konferenz- oder Workshop-Beitrag] , (2017)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

H

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira :
A unified lattice model and framework for purity analyses.
[Online-Edition: http://www.ase2018.com/]
In: ASE 2018, 3.-7.9.2018, Corum, Montpellier, France. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[Konferenz- oder Workshop-Beitrag] , (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit] , (2018)

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Konferenz- oder Workshop-Beitrag] , (2017)

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich :
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.

[Report] , (2017)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit] , (2016)

I

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) :

Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding. Routledge, London London
[Buchkapitel] , (2018)

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit] , (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

J

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit] , (2017)

K

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Artikel] , (2019)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag] , (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Anderes] , (2018)

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan :
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag] , (2018)

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias :
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...]
In: Mensch und Computer 2018: Tagungsband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[Konferenz- oder Workshop-Beitrag] , (2018)

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar
Dachselt, Raimund ; Weber, Gerhard (eds.) :

Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[Konferenz- oder Workshop-Beitrag] , (2018)

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria :
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1) pp. 1-19.
[Artikel] , (2018)

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo :
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK. Portsmouth, UK
[Konferenz- oder Workshop-Beitrag] , (2018)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[Konferenz- oder Workshop-Beitrag] , (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 pp. 88-99.
[Artikel] , (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit] , (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit] , (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[Konferenz- oder Workshop-Beitrag] , (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Artikel] , (2017)

Kaufhold, Marc-André ; Reuter, Christian :
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
[Online-Edition: http://www.wineme.uni-siegen.de/paper/2017/2017{\_}KaufholdR...]
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1) pp. 78-88.
[Artikel] , (2017)

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Eibl, Maximilian ; Gaedke, Martin (eds.) :

Social Media Analytics: Eine Marktstudie im Krisenmanagement.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}KaufholdReuterLudwig...]
In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn. Bonn
[Konferenz- oder Workshop-Beitrag] , (2017)

Kaufhold, Marc-André ; Reuter, Christian
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) :

The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
[Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494{\_}...]
In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, May 21-24, 2017, Albi, France. Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM) Albi, France
[Konferenz- oder Workshop-Beitrag] , (2017)

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
[Online-Edition: http://dl.mensch-und-computer.de/bitstream/handle/123456789/...]
Mensch und Computer 2017 - Workshopband Gesellschaft für Informatik e.V. , Regensburg, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

L

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report] , (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar :
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016{\_}Ludwigetal{\_...]
In: International Journal on Human-Computer Studies (IJHCS), 102 (C) pp. 103-121.
[Artikel] , (2017)

Leopold, Inken ; Reuter, Christian
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}LeopoldReuter{\_}Bea...]
In: Mensch & Computer: Tagungsband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh :
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5) pp. 64-75.
[Artikel] , (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag] , (2016)

M

Mantz, Dennis :
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt
[Masterarbeit] , (2018)

Mehmedovic, Damir :
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt
[Bachelorarbeit] , (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag] , (2018)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit] , (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit] , (2017)

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar :
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z]
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6) pp. 959-1003.
[Artikel] , (2017)

Mohan, Vaishnavi ; Othmane, Lotfi Ben :
SecDevOps: Is It a Marketing Buzzword?
Proc. of the 11th International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag] , (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel] , (2016)

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Konferenz- oder Workshop-Beitrag] , (2016)

N

Neubauer, Sven :
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt
[Bachelorarbeit] , (2018)

Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus
Wiemeyer, Josef (ed.) :

IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt. Darmstadt Darmstadt
[Buchkapitel] , (2018)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Konferenz- oder Workshop-Beitrag] , (2017)

O

O.O.Lemos, Marcilio ; Gil Dantas, Yuri ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP) pp. 45-67.
[Artikel] , (2018)

P

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg :
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
[Online-Edition: https://sigmobile.org/mobicom/2018/]
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, 29.10.-2.11.2018, New Delhi, India. MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018 Springer
[Konferenz- oder Workshop-Beitrag] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Artikel] , (2018)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag] , (2017)

Pascoal, Tulio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
In: Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag] , (2017)

Pottebaum, Jens ; Reuter, Christian :
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}PottebaumReuter{\_}E...]
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4) iv-vii. ISSN 1937-9420
[Artikel] , (2017)

Pinatti de Carvalho, Aparecido Fabiano ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker :
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
[Online-Edition: http://www.iisi.de/fileadmin/IISI/upload/IRSI/2017Vol14Iss3/...]
In: Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK. Sheffield, UK
[Konferenz- oder Workshop-Beitrag] , (2017)

Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian
Eibl, Maximilian ; Gaedke, Martin (eds.) :

IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...]
In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn. Bonn
[Konferenz- oder Workshop-Beitrag] , (2017)

R

Rowe, Steven :
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt
[Bachelorarbeit] , (2018)

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas :
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18) IEEE
[Konferenz- oder Workshop-Beitrag] , (2018)

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Reuter, Christian ; Leopold, Inken :
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1) in press.
[Artikel] , (2018)

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
Dachselt, Raimund ; Weber, Gerhard (eds.) :

Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[Konferenz- oder Workshop-Beitrag] , (2018)

Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian
Dachselt, Raimund ; Weber, Gerhard (eds.) :

From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[Konferenz- oder Workshop-Beitrag] , (2018)

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
Dachselt, Raimund ; Weber, Gerhard (eds.) :

5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...]
In: Mensch und Computer 2018: Workshopband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[Konferenz- oder Workshop-Beitrag] , (2018)

Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian :
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}RiebeNordmannReuter{...]
In: Wissenschaft & Frieden pp. 60-61.
[Artikel] , (2018)

Reuter, Christian ; Pottebaum, Jens :
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}ReuterPottebaum{\_}E...]
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1) v-viii.
[Artikel] , (2018)

Reuter, Christian ; Pottebaum, Jens:
Special Issue on IT Support for Crisis and Continuity Management.

[Buch] , (2018)

Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian :
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
[Online-Edition: http://idl.iscram.org/files/christianreuter/2018/1570{\_}Chr...]
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA. Rochester, New York, USA
[Konferenz- oder Workshop-Beitrag] , (2018)

Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick :
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), accepted
[Artikel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie :
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}ReuterKaufholdSpielh...]
In: BBK Bevölkerungsschutz, 2 pp. 22-24.
[Artikel] , (2018)

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas :
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}ReuterLudwigKaufhold...]
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 1 pp. 64-66.
[Artikel] , (2018)

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda :
Editorial of the Special Issue on Social Media in Crisis Management.
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}ReuterHughesHiltzImr...]
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4) pp. 277-279.
[Artikel] , (2018)

Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André :
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}ReuterHughesKaufhold...]
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4) pp. 280-294.
[Artikel] , (2018)

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Reuter, Christian (ed.) :

Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6{...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , pp. 621-630. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian
Reuter, Christian (ed.) :

Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6{...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , pp. 3-14. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Mentler, Tilo :
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/a...]
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1) pp. 2-3. ISSN 0966-0879
[Artikel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

Soziale Medien in Notfällen, Krisen und Katastrophen.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6{...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden Wiesbaden , pp. 379-402. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

Informatik für Frieden und Sicherheit.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6{...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , pp. 573-595. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André :
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
[Online-Edition: http://www.peasec.de/paper/2018/2018{\_}ReuterKaufhold{\_}Fi...]
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1) pp. 41-57. ISSN 0966-0879
[Artikel] , (2018)

Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar
Reuter, Christian (ed.) :

Resilienz durch Kooperationstechnologien.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6{...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , pp. 443-465. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (ed.) :

Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6{...]
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany , pp. 17-40. ISBN 978-3-658-19523-6
[Buchkapitel] , (2018)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1) pp. 62-78.
[Artikel] , (2017)

Reinhold, Thomas :
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
[Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...]
In: Sicherheit und Frieden
[Artikel] , (2017)

Reinhold, Thomas ; Schulze, Matthias :
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...]

[Anderes] , (2017)

Riebe, Thea ; Geisse, Jens :
Warum die Cyber-Sicherheitskultur ein Update braucht.
[Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...]
sicherheitspolitik-blog.de , Frankfurt a.M.
[Anderes] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah
Klafft, Michael (ed.) :

Informing the Population: Mobile Warning Apps.
[Online-Edition: http://publica.fraunhofer.de/eprints/urn{\_}nbn{\_}de{\_}001...]
In: Risk and Crisis Communication in Disaster Prevention and Management. epubli, Wilhelmshaven Wilhelmshaven , pp. 31-41. ISBN 9783745054484
[Buchkapitel] , (2017)

Reuter, Christian ; Pätsch, Katja ; Runft, Elena
Leimeister, J.M. ; Brenner, W. (eds.) :

Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
[Online-Edition: http://www.wineme.uni-siegen.de/paper/2017/2017{\_}ReuterPae...]
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland. St. Gallen, Switzerland
[Konferenz- oder Workshop-Beitrag] , (2017)

Reuter, Christian ; Mentler, Tilo ; Geisler, Stefan ; Herczeg, Michael ; Ludwig, Thomas ; Pipek, Volkmar ; Nestler, Simon
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017{\_}...]
Mensch und Computer 2017 - Workshopband Gesellschaft für Informatik e.V. , Regensburg, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas
Paterno, Fabio ; Wulf, Volker (eds.) :

End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}ReuterKaufholdLudwig...]
In: New Perspectives in End-User Development. Springer , pp. 307-332. ISBN 978-3-319-60290-5
[Buchkapitel] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker
Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (eds.) :

Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}ReuterKaufholdSchorc...]
In: Sicherheit (DIAGONAL Jahrgang 38). Vandenhoeck & Ruprecht, Göttingen Göttingen , pp. 207-224. ISBN 978-3-8471-0739-2
[Buchkapitel] , (2017)

Reuter, Christian ; Wiegärtner, Daniel ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017{\_}...]
In: Mensch & Computer: Tagungsband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

Reuter, Christian ; Pätsch, Katja ; Runft, Elena :
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}ReuterPaetschRunft{\...]
In: i-com: Journal of Interactive Media, 16 (2) pp. 181-195.
[Artikel] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie :
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}ReuterKaufholdSpielh...]
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 1 (Issue CSCW) pp. 1-19.
[Artikel] , (2017)

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian
Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (eds.) :

Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
[Online-Edition: http://www.wineme.uni-siegen.de/paper/2017/2017{\_}Reutereta...]
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation. Springer, Berlin, Germany Berlin, Germany , pp. 75-88. ISBN 978-3-319-44711-7
[Buchkapitel] , (2017)

Reuter, Christian ; Spielhofer, Thomas :
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
[Online-Edition: http://www.wineme.uni-siegen.de/paper/2016/2016{\_}reuterspi...]
In: Journal Technological Forecasting and Social Change (TFSC), 121 pp. 168-180.
[Artikel] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah :
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
[Online-Edition: http://www.peasec.de/paper/2017/2017{\_}ReuterKaufholdLeopol...]
In: European Conference on Information Systems (ECIS), Guimar\~es, Portugal. Guimar\~es, Portugal
[Konferenz- oder Workshop-Beitrag] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Steinfort, René
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (eds.) :

Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
[Online-Edition: http://idl.iscram.org/files/christianreuter/2017/1492{\_}Chr...]
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France. Albi, France
[Konferenz- oder Workshop-Beitrag] , (2017)

Reuter, Christian ; Kaufhold, Marc-André ; Klös, Jonas
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
[Online-Edition: http://dl.mensch-und-computer.de/bitstream/handle/123456789/...]
In: Mensch & Computer: Workshopband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

S

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias :
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 18, 2018 - Jun 20, 2018, Stockholm, Sweden. Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Konferenz- oder Workshop-Beitrag] , (2018)

Scholl, Simon ; Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André :
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...]
In: Mensch und Computer 2018: Tagungsband, Dresden, Germany. Gesellschaft für Informatik e.V. , Dresden, Germany
[Konferenz- oder Workshop-Beitrag] , (2018)

Schick, Oliver :
Web application for privacy-preserving scheduling.
TU Darmstadt
[Bachelorarbeit] , (2017)

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias :
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017) ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Schroth, Nils :
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt
[Bachelorarbeit] , (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Konferenz- oder Workshop-Beitrag] , (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
23rd ACM Conference on Computer and Communications Security (CCS) 2016 CCS 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
ACM WiSec 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Konferenz- oder Workshop-Beitrag] , (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
[Artikel] , (2016)

T

Tkachenko, Oleksandr ; Schneider, Thomas :
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Tkachenko, Oleksandr :
Privacy-Preserving Genomics on a Large Scale.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag] , (2018)

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Treiber, Amos :
Access Count Leakage in Oblivious RAMs.
TU Darmstadt
[Masterarbeit] , (2018)

Tariq, Taha :
Web application for privacy-preserving assignments.
TU Darmstadt
[Masterarbeit] , (2018)

Tkachenko, Oleksandr :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt
[Masterarbeit] , (2017)

Traverso, Giulia ; Cordero, Carlos Garcia ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
[Online-Edition: https://www.ucalgary.ca/pst2017/]
15th Annual Conference on Privacy, Security and Trust (PST)
[Konferenz- oder Workshop-Beitrag] , (2017)

Tundis, Andrea ; Cordero, Carlos Garcia ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max :
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
ICCPS 2017: 19th International Conference on Cyber-Physical Systems WASET
[Konferenz- oder Workshop-Beitrag] , (2017)

U

Ullrich, Fabian :
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt
[Masterarbeit] , (2018)

V

Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max :
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Network Operations and Management Symposium (NOMS) IEEE
[Konferenz- oder Workshop-Beitrag] , (2018)

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[Konferenz- oder Workshop-Beitrag] , (2017)

von Drachenfels, Magdalena ; Riebe, Thea :
Normative Ordnungen des Digitalen - Konferenzbericht.
sicherheitspolitik-blog.de , Frankfurt a.M.
[Anderes] , (2017)

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Cordero, Carlos Garcia ; Mühlhäuser, Max :
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
IEEE Conference on Communications and Network Security IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

W

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit] , (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17) ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Wiegärtner, Daniel ; Reuter, Christian ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (eds.) :

Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
[Online-Edition: http://dl.mensch-und-computer.de/bitstream/handle/123456789/...]
In: Mensch & Computer: Workshopband, Regensburg, Germany. Gesellschaft für Informatik e.V. , Regensburg, Germany
[Konferenz- oder Workshop-Beitrag] , (2017)

Y

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit] , (2017)

Z

Zimmermann, Verena ; Gerber, Nina
Tryfonas, Theo (ed.) :

“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[Konferenz- oder Workshop-Beitrag] , (2017)

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit :
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41 pp. 308-313.
[Artikel] , (2017)

Diese Liste wurde am Thu Nov 15 02:01:05 2018 CET generiert.