TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level: 1656.

A

Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937],
[Ph.D. Thesis]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Ali, Azmzt and Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: OOPSLA Onward!, Piitsburgh, 25.10.2015, In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference or Workshop Item]

Al-Hadhrami, Nasser and Aziz, Benjamin and Sardesai, Shantanu and Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015), [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Arzt, Steven and Rasthofer, Siegfried and Hahn, Robert and Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
TU Darmstadt, [Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt, [Master Thesis]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Arias-Cabarcos, Patricia and Trapero, Ruben and Almenárez, Florina and Díaz-Sánchez, Daniel and Marín, Andrés (2015):
Blended Identity: Pervasive IdM for Continuous Authentication.
[Conference or Workshop Item]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias
Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, pp. 1189-1206, 102, (8), [Article]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Ali, Karim and Rapoport, Marianna and Lhoták, Ondřej and Dolby, Julian and Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: Proceedings of the 28th European Conference on Object-Oriented Programming, In: ECOOP '14, [Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Fritz, Christian and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, [Conference or Workshop Item]

Arzt, Steven and Huber, Stephan and Rasthofer, Siegfried and Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad, [Conference or Workshop Item]

Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Public-Key Cryptography PKC 2014, In: Lecture Notes in Computer Science, 8383, [Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Albrecht, Martin and Fitzpatrick, Robert and Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, DOI: 10.1145/2508859.2516738,
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), Springer, pp. 364-381, [Article]

Arzt, Steven and Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf],
[Report]

Alaoui, Sidi Mohamed El Yousfi and El Bansarkhani, Rachid and Cayrel, Pierre-Louis and Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), Springer, ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, pp. 209-232, 67, (2), [Article]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Arzt, Steven and Falzon, Kevin and Follner, Andreas and Rasthofer, Siegfried and Bodden, Eric and Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
Gesellschaft für Informatik, In: 6. Arbeitstagung Programmiersprachen (ATPS 2013), In: GI Lecture Notes in Informatics, [Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf],
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: Proceedings of the 27th European Conference on Object-Oriented Programming, In: ECOOP '13, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16],
[Conference or Workshop Item]

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Information Security, In: 15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, In: Lecture Notes in Computer Science, 7483, ISSN 0302-9743,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11],
[Conference or Workshop Item]

Ansaloni, Danilo and Binder, Walter and Bockisch, Christoph and Bodden, Eric and Hatun, Kardelen and Marek, Lukas and Qi, Zhengwei and Sarimbekov, Aibek and Sewe, Andreas and Tuma, Petr and Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
In: International Conference on Software Composition (SC 2012), [Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf],
[Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), pp. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Ali, Karim and Lhoták, Ondřej (2012):
Application-Only Call Graph Construction.
In: Proceedings of the 26th European Conference on Object-Oriented Programming, In: ECOOP '12, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30],
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, [Conference or Workshop Item]

Alomari, Esraa and Manickam, Selvakumar and Gupta, B. and Karuppayah, Shankar and Alfaris, Rafeef (2012):
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, pp. 24-32, 49, (7), [Article]

Ackermann, Tobias and Miede, André and Buxmann, Peter and Steinmetz, Ralf (2011):
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
In: Proceedings of the 19th European Conference on Information Systems (ECIS), Helsinki, Finland, [Conference or Workshop Item]

Armknecht, Frederik and Maes, Roel and Sadeghi, Ahmad-Reza and Standaert, François-Xavier and Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), IEEE Computer Society, [Conference or Workshop Item]

Armknecht, Frederik and Strufe, Thorsten (2011):
An Efficient Distributed Privacy-preserving Recommendation System.
In: Proceedings of the 10th IEEE/IFIP Med-Hoc-Net, [Conference or Workshop Item]

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis and Meziani, Mohammed
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: ISA, Springer, In: Communications in Computer and Information Science, 200, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Scafuro, Alessandra and Visconti, Ivan and Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: Transactions on Computational Science IX, Springer, In: LNCS, 6480, [Conference or Workshop Item]

Ackermann, Tobias and Buxmann, Peter (2010):
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
In: Proceedings of the 16th Americas Conference on Information Systems (AMCIS) 2010, [Conference or Workshop Item]

Anikeev, Maxim and Madlener, Felix and Schlosser, Andreas and Huss, Sorin and Walther, Christoph (2010):
A Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
In: Workshop on Program Semantics, Specification and Verification: Theory and Applications at the 5th International Computer Science Symposium in Russia, [Conference or Workshop Item]

Alsouri, Sami and Dagdelen, Özgür and Katzenbeisser, Stefan
Acquisti, A. and Sadeghi, Ahmad-Reza (eds.) (2010):
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), [Conference or Workshop Item]

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: International Conference on Applied Cryptography and Network Security (ACNS), Springer, In: LNCS, 6123, [Conference or Workshop Item]

Armknecht, Frederik and Chen, Liqun and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: Workshop on RFID Security (RFIDSec), Springer, In: LNCS, 6370, [Conference or Workshop Item]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max and Ries, Sebastian and Schnelle-Walka, Dirk (2010):
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, pp. 1 - 7, Special Issue of IOPTS, [Article]

Anderl, Reiner and Henriques, Joselito Rodrigues (2010):
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, pp. 16-22, (2), [Article]

Ayari, Brahim and Khelil, Abdelmajid and Saffar, Kamel and Suri, Neeraj (2010):
Data-based Agreement for Inter-Vehicle Coordination.
In: Proc. of the 11th International Conference on Mobile Data Management (MDM), [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2010):
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
In: Proceedings of the 11th International Conference on Mobile Data Management (MDM), [Conference or Workshop Item]

Acker, Robin and Brandt, Steffen and Buchmann, Nicolas and Fugmann, Thorsten and Massoth, Michael (2010):
Ubiquitous Home Control based on SIP and Presence Service.
In: Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS'10), [Conference or Workshop Item]

Acker, Robin and Massoth, Michael (2010):
Secure Ubiquitous House and Facility Control Solution.
In: Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW'10), 2010, [Conference or Workshop Item]

Abt, Sebastian and Busch, Christoph and Nickel, Claudia (2010):
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
[Conference or Workshop Item]

Anderl, Reiner and Henriques, Joselito (2009):
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
In: Proceedings of the 20th International Congress of Mechanical Engineering (COBEM 2009), In: International Congress of Mechanical Engineering, Gramado, Brazil, [Conference or Workshop Item]

Ali, Karim and Aib, Issam and Boutaba, Raouf (2009):
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium, In: GIIS '09, [Conference or Workshop Item]

Ali, Karim and Boutaba, Raouf (2009):
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium, In: GIIS '09, [Conference or Workshop Item]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Ries, Sebastian and Schnelle-Walka, Dirk and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max (2009):
Shaping the Future Internet.
In: Proceedings of the 3rd International CompanionAble Workshop IoPTS, [Conference or Workshop Item]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häussge, Gina (2008):
Smart Products: Integration Challenges.
In: Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08), [Conference or Workshop Item]

Armknecht, Frederik and Furukawa, Jun and Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), [Conference or Workshop Item]

Aciicmez, Onur and Schindler, Werner
Malkin, T. (ed.) (2008):
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
In: Topics in Cryptology, CT-RSA, Springer, Berlin, In: LNCS, [Conference or Workshop Item]

Aly, Sherif G. and Nadi, Sarah and Hamdan, Karim (2008):
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, pp. 329-336, 8, (6), [Article]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, [Conference or Workshop Item]

Alkassar, Ammar and Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Adler, Steven and Brown, Nigel and Gilbert, Art and Palmer, Charles and Schnyder, Michael and Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Alkassar, Ammar and Krimmer, Robert and Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, pp. 480-482, 8, [Article]

Atluri, Vijayalakshmi and Backes, Michael and Basin, David and Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE, ACM, [Conference or Workshop Item]

Adler, Steven and Bangerter, Endre and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Karjoth, Günter and Kesdogan, Dogan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Presler-Marshall, Martin and Schnyder, Michael and Herreweghen, Els Van and Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Adler, Steven and Bangerter, Endre and Bohrer, Kathy and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Kesdogan, Dogan and Leonard, Matthew and Liu, Xuan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Powers, Calvin and Schnyder, Michael and Schonberg, Edith and Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

B

Borges, Fábio and Lara, Pedro and Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, pp. 406--416, 292, DOI: 10.1016/j.amc.2016.07.036,
[Article]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, pp. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, pp. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
TU Darmstadt, [Master Thesis]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference, ACM, In: DAC '16, [Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), [Online-Edition: http://dx.doi.org/10.1145/2804322.2804325],
[Article]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag, TU Darmstadt, In: Tagungsband zum Deutschen IT-Sicherheitskonkress, 14, [Master Thesis]

Bucicoiu, Mihai and Davi, Lucas and Deaconescu, Razvan and Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Busold, Christoph and Heuser, Stephan and Rios, Jon and Sadeghi, Ahmad-Reza and Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Butin, Denis and Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference or Workshop Item]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha
Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Breitinger, Frank and Winter, Christian and Yannikos, York and Fink, Tobias and Seefried, Michael
Peterson, Gilbert and Shenoi, Sujeet (eds.) (2014):
Using Approximate Matching to Reduce the Volume of Digital Data.
In: Advances in Digital Forensics X, 10th IFIP WG 11.9 International Conference on Digital Forensics, Vienna, Austria, January 8–10, 2014, Springer, Vienna, Austria, In: IFIP Advances in Information and Communication Technology, 433, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference or Workshop Item]

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, pp. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Rettig, Michael and Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Robust Hashing for 3D Models.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, Februar 2014, [Conference or Workshop Item]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, pp. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Bagci, Ibrahim Ethem and Roedig, Utz and Schulz, Matthias and Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]

Breitinger, Frank and Liu, Huajian and Winter, Christian and Baier, Harald and Rybalchenko, Alexey and Steinebach, Martin
Gladyshev, Pavel and Marrington, Andrew and Baggili, Ibrahim (eds.) (2014):
Towards a Process Model for Hash Functions in Digital Forensics.
In: Digital Forensics & Cyber Crime (ICDF2C 2013), 5th ICST International Conference, September 26–27, 2013, Moscow, Russia, Springer, Moscow, Russia, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 132, ISBN 978-3-319-14288-3 (print) and 978-3-319-14289-0 (e-book),
DOI: 10.1007/978-3-319-14289-0_12,
[Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2014):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., pp. 267-297, 12, (4), [Article]

Biedermann, Sebastian and Karvelas, Nikolaos and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, pp. 114-125, 8327, [Article]

Biedermann, Sebastian and Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, Springer Gabler Verlag, pp. 98-102, 38, (2), [Article]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Bodden, Eric and Rasthofer, Siegfried and Richter, Philipp and Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, pp. 720 - 725, 11/2013, DOI: 10.1007/s11623-013-0300-1,
[Article]

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2013):
Reducing human factors in software security architectures.
In: Future Security Conference 2013, [Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf],
[Conference or Workshop Item]

Breitinger, Frank and Stivaktakis, Georgios and Roussev, Vassil (2013):
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Buchmann, Nicolas and Peeters, Roel and Baier, Harald and Pashalidis, Andreas (2013):
Security considerations on extending PACE to a biometric-based connection establishment.
In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the, In: 1, [Conference or Workshop Item]

Braun, Johannes and Kiefer, Franziskus and Hülsing, Andreas
Katsikas, Sokratis and Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, In: LNCS, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Bartsch, Steffen and Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Breitinger, Frank and Stivaktakis, Georgios and Baier, Harald (2013):
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13, [Article]

Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar
Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing, Springer, pp. 157 - 158, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt, [Master Thesis]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw, [Article]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Beckerle, Matthias and Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, [Conference or Workshop Item]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf],
[Conference or Workshop Item]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Breitinger, Frank and Astebøl, Knut Petter and Baier, Harald and Busch, Christoph (2013):
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF), [Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, In: Lecture Notes in Computer Science, 7779, [Conference or Workshop Item]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
In: Computer Communications, pp. 468-480, 36, (4), [Article]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Liu, Huajian and Takahashi, Fabio Touceira and Schmitz, Andre and Zmudzinski, Sascha and Steinebach, Martin and Wieneke, Jonas (2013):
Video Game Watermarking.
In: Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013, [Conference or Workshop Item]

Breitinger, Frank and Petrov, Kaloyan (2013):
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), [Article]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Busch, C. and Brömme, A. and Pflug, A. and Zhou, X. and Dose, M. and Brauckmann, M. and Weber, F. and Opel, A. and Neugebauer, P. and Leowsky, K. (2013):
Multi-Biometrische Gesichtserkennung.
In: the 13. Deutscher IT-Sicherheitskongress, Bonn, Germany, [Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Advances in Cryptology - ASIACRYPT 2013, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Braun, Johannes and Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Buchegger, Sonja and Crowcroft, Jon and Krishnamurthy, Balachander and Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, pp. 22 -- 44, 3, (2), DOI: 10.4230/DagRep.3.2.22,
[Article]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, pp. 84-96, 3, (1), [Article]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Bodden, Eric and Tolêdo, Társis and Ribeiro, Márcio and Brabrand, Claus and Borba, Paulo and Mezini, Mira (2012):
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf],
[Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bodden, Eric and Falzon, Kevin and Pun, Ka I. and Stolz, Volker (2012):
Delta-oriented Monitor Specification.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf],
[Conference or Workshop Item]

Bodden, Eric and Follner, Andreas and Rasthofer, Siegfried (2012):
Challenges in defining a programming language for provably correct dynamic analyses.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Breitinger, Frank and Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4, [Article]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander
Ryan, Mark and Smyth, Ben and Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012, Birmingham, UK, [Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Breitinger, Frank and Baier, Harald and Beckingham, Jesse (2012):
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo), [Article]

Breitinger, Frank and Baier, Harald (2012):
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA), [Article]

Baier, Harald and Brand, Achim (2012):
On the Investigation of Application Specific Data within Digital Forensics.
In: Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), ISBN 978-1-84102-316-8,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes
Levi, Albert and Badra, Mohamad and Cesana, Matteo and Ghassemian, Mona and Jabeur, Nafaa and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2012):
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL), pp. 89-101, [Article]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Bockisch, Christoph and Sewe, Andreas and Yin, Haihan and Mezini, Mira and Aksit, Mehmet (2012):
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, pp. 1-28, 11, (1), ISSN 1660-1769,
[Online-Edition: http://dx.doi.org/10.5381/jot.2012.11.1.a7],
[Article]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bessani, Alysson and Abbadi, Imad M. and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marcelo and Schirmer, Norbert (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing, [Book]

Bulygin, Stanislav and Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Bodden, Eric (2012):
Identifying meaningless parameterized linear-temporal-logic formulas.
[Report]

Bodden, Eric (2012):
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
[Report]

Bodden, Eric and Lam, Patrick and Hendren, Laurie (2012):
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS), [Article]

Bockisch, Christoph and Sewe, Andreas (2012):
The ALIA4J Approach to Efficient Language Implementation.
In: Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, In: Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA, [Online-Edition: http://dx.doi.org/10.1145/2384716.2384726],
[Conference or Workshop Item]

Bodden, Eric (2012):
MOPBox: A Library Approach to Runtime Verification.
Springer, In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30, In: Lecture notes in computer science , 7186, [Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf],
[Conference or Workshop Item]

Baier, Harald and Dichtelmüller, Christian (2012):
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
In: DACH Security 2012, [Conference or Workshop Item]

Bender, Jens and Dagdelen, Özgür and Fischlin, Marc and Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Financial Cryptography, Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Busch, C. and Brauckmann, M. and Veldhuis, R. and Deravi, F. and Kevenaar, T. and Nouak, A. and Seibert, H. and Weber, F. and Suchier, J.-M. (2012):
Towards a more Secure Border Control with 3D Face Recognition.
In: the 5th Norsk Informasjons Sikkerhets Konferanse (NISK), ISBN 978-82-321-0012-5,
[Conference or Workshop Item]

Bartsch, Steffen and Sohr, Karsten and Bunke, Michaela and Hofrichter, Oliver and Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen, [Ph.D. Thesis]

Berchtold, Waldemar and Schäfer, Marcel and Zmudzinski, Sascha and Steinebach, Martin (2012):
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
[Standards, patents]

Berchtold, Waldemar and Schäfer, Marcel (2012):
Rebound on Symmetric Tardos Codes.
In: Proceeding of The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012), [Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2012):
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
(TUD-CS-2012-0106), [Report]

Bodden, Eric and Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Conference or Workshop Item]

Bartsch, Steffen and Sasse, Angela
Ossowski, Sascha and Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, ACM, Trento, Italy, In: SAC '12, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013), London, UK, [Conference or Workshop Item]

Bulygin, Stanislav and Buchmann, Johannes
Lin, Dongdai and Tsudik, Gene and Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), Springer, Sanya, China, In: Lecture Notes in Computer Science, 7092, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Boneh, Dan and Dagdelen, Özgür and Fischlin, Marc and Lehmann, Anja and Schaffner, Christian and Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security, [Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, Springer Berlin / Heidelberg, In: Lecture Notes in Computer Science - LNCS, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Breitinger, Frank and Baier, Harald (2011):
Performance Issues about Context-Triggered Piecewise Hashing.
In: 3rd International ICST Conference on Digital Forensics & Cyber Crime, Dublin, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Schulz, Steffen
Sadeghi, Ahmad-Reza and Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC), ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Bodden, Eric (2011):
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf],
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Klieme, Eric and Strick, Linda and Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS '11: Proceedings of the 5th International Conference on Network and System Security, IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference or Workshop Item]

Baier, Harald and Brand, Achim and Dichtelmüller, Christian and Roos, Björn (2011):
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
In: DACH Security 2011, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander and Hühnlein, Detlef
Schartner, Peter and Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference or Workshop Item]

Bodden, Eric (2011):
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
ACM, In: WODA '11: International Workshop on Dynamic Analysis, [Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf],
[Conference or Workshop Item]

Bradler, Dirk and Krumov, Lachezar and Kangasharju, Jussi and Mühlhäuser, Max
Aguilera, M. and Yu, H. and Vaidya, N. and Srinivasan, V. and Choudhury, R. (eds.) (2011):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
6522, ISBN 978-3-642-17679-1_7,
DOI: 10.1007,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus
Nitaj, Abderrahmane and Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Progress in Cryptology - AFRICACRYPT 2011, Springer Berlin / Heidelberg, Dakar, Senegal, In: Lecture Notes in Computer Science (LNCS), ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]

Bodden, Eric (2011):
Defining Access Control Policies as Tracematches.
(TUD-CS-2011-0149), [Report]

Beckerle, Matthias and Martucci, Leonardo and Mühlhäuser, Max and Ries, Sebastian
Beklen, A. and Ejarque, J. and Gentzsch, W. and Kanstren, T. and Koschel, A. and Lee, Y. W. and Li, L. and Zemlicka, M. (eds.) (2011):
Interactive Access Rule Learning for Access Control: Concepts and Design.
In: International Journal On Advances in Intelligent Systems, 4, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Bodden, Eric (2011):
Closure Joinpoints: Block joinpoints without surprises.
ACM, In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development, [Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf],
[Conference or Workshop Item]

Busch, Christoph and Korte, Ulrike and Abt, Sebastian and Böhm, Christian and Färber, Ines and Fries, Sergej and Merkle, Johannes and Nickel, Claudia and Nouak, Alexander and Opel, Alexander and Oswald, Annahita and Seidl, Thomas and Wackersreuther, Bianca and Wackersreuther, Peter and Zhou, Xuebing (2011):
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD), [Article]

Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011, Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference or Workshop Item]

Berchtold, Waldemar and Zmudzinski, Sascha and Schäfer, Marcel and Steinebach, Martin (2011):
Collusion-secure patchwork embedding for transaction watermarking.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference or Workshop Item]

Bodden, Eric and Sewe, Andreas and Sinschek, Jan and Oueslati, Hela and Mezini, Mira (2011):
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
In: Proceedings of the 33rd International Conference on Software Engineering, New York, NY, USA, In: International Conference on Software Engineering, Waikiki, Honolulu, HI, USA, 21-28 May 2011, [Online-Edition: http://doi.acm.org/10.1145/1985793.1985827],
[Conference or Workshop Item]

Bockisch, Christoph and Sewe, Andreas and Mezini, Mira and Akşit, Mehmet
Bishop, Judith and Vallecillo, Antonio (eds.) (2011):
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
In: Objects, Models, Components, Patterns, Berlin / Heidelberg, Springer, pp. 131-146, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-21952-8_11],
[Book Section]

Bockisch, Christoph and Sewe, Andreas and Zandberg, Martin (2011):
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
In: Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11 & VMIL'11, New York, NY, USA, ACM, In: 5th workshop on Virtual Machines and Intermediate Languages, Portland, OR, USA, 24 Oct 2011, In: SPLASH '11 Workshops, [Online-Edition: http://doi.acm.org/10.1145/2095050.2095101],
[Conference or Workshop Item]

Baier, Harald and Breitinger, Frank (2011):
Security Aspects of Piecewise Hashing in Computer Forensics.
In: 6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011), [Conference or Workshop Item]

Biedermann, Alexander and Stoettinger, Marc and Chen, Lijing and Huss, Sorin (2011):
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
In: The 7th International Symposium on Applied Reconfigurable Computing, Belfast, UK, [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Schröder, Heike and Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), Springer, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), Springer, [Conference or Workshop Item]

Bodden, Eric and Hendren, Laurie (2011):
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer), [Article]

Berjani, Betim and Strufe, Thorsten (2011):
A Recommendation System for Spots in Location-Based Online Social Networks.
In: Proceedings of the Eurosys Workshop on Social Network Systems, [Conference or Workshop Item]

Baum-Waidner, Birgit and Kenyon, Christopher and Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
[Standards, patents]

Beckerle, Matthias and Martucci, Leonardo and Mühlhäuser, Max and Ries, Sebastian (2011):
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems, IARIA, pp. 234-244, [Book Section]

Bulygin, Stanislav and Petzoldt, Albrecht and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems, [Conference or Workshop Item]

Bruch, Marcel and Bodden, Eric and Monperrus, Martin and Mezini, Mira (2010):
IDE 2.0: Collective Intelligence in Software Development.
ACM, In: FSE/SDP Workshop on the Future of Software Engineering, DOI: 10.1145/1882362.1882374?,
[Online-Edition: http://www.bodden.de/pubs/bbmm10ide.pdf],
[Conference or Workshop Item]

Beckerle, Matthias and Martucci, Leonardo and Ries, Sebastian (2010):
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
In: In Proceedings of the Second International Conference on Adaptive and Self-adaptive Systems and Applications (ADAPTIVE 2010), Lisbon, Portugal, In: ComputationWorld 2010, ISBN 978-1-61208-109-0,
[Conference or Workshop Item]

Bugiel, Sven and Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Bradler, Dirk and Krumov, Lachezar and Kangasharju, Jussi and Weihe, Karsten and Mühlhäuser, Max (2010):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
[Report]

Baecher, Paul and Fischlin, Marc and Gordon, Lior and Langenberg, Robert and Lützow, Michael and Schröder, Dominique (2010):
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Sicherheit 2010, Gesellschaft fuer Informatik (GI), In: Lecture Notes in Informatics, [Conference or Workshop Item]

Bartsch, Steffen (2010):
A calculus for the qualitative risk assessment of policy override authorization.
In: SIN: Proceedings of the 3rd international conference on Security of information and networks, ACM, Taganrog, Rostov-on-Don, Russian Federation, ISBN 978-1-4503-0234-0,
DOI: 10.1145/1854099.1854115,
[Conference or Workshop Item]

Berta, Mario and Christandl, Matthias and Colbeck, Roger and Renes, Joseph and Renner, Renato (2010):
The uncertainty principle in the presence of quantum memory.
In: Nature Physics, [Article]

Busch, Heike and Sotakova, M. and Katzenbeisser, Stefan and Sion, R. (2010):
The PUF Promise.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), Springer, [Conference or Workshop Item]

Bedner, Mark (2010):
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR), pp. 339-345, [Article]

Buchmann, Johannes and Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, pp. 21-23, (17), [Article]

Brzuska, Christina and Fischlin, Marc and Lehmann, Anja and Schröder, Dominique (2010):
Unlinkability of Sanitizable Signatures.
In: Public-Key Cryptography (PKC), Springer-Verlag, In: Lecture Notes in Computer Science, 6056, [Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Ding, Jintai and Mohamed, Mohamed Saied Emam
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: AFRICACRYPT, Springer, Stellenbosch, South Africa, In: LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Brucker, Achim and Petritsch, Helmut and Weber, Stefan (2010):
Attribute-based Encryption with Break-Glass.
In: Workshop In Information Security Theory And Practice (WISTP'10), Springer, In: Lecture Notes in Computer Science, 6033, ISBN 978-3-642-12367-2,
[Conference or Workshop Item]

Bulygin, Stanislav and Brickenstein, Michael (2010):
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", pp. 185-200, 2, (3), DOI: 10.1007/s11786-009-0020-y,
[Article]

Bulygin, Stanislav and Pellikaan, Ruud
Woungang, Isaac and Misra, Sudip and Misra, Subhas Chandra (eds.) (2010):
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory, World Scientific, pp. 585-622, [Book Section]

Bodden, Eric and Sewe, Andreas and Sinschek, Jan and Mezini, Mira (2010):
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
(TUD-CS-2010-0066), [Report]

Bartsch, Steffen (2010):
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
In: SecSE: Fourth International Workshop on Secure Software Engineering, IEEE Computer Society, Krakow, Poland, DOI: 10.1109/ARES.2010.19,
[Conference or Workshop Item]

Baier, Harald and Busch, Christoph
Hochschule Darmstadt (3094) (Corporate Creator) (2010):
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung, [Book Section]

Backs, Christian (2010):
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
TU Darmstadt, [Master Thesis]

Bijker, Remko and Bockisch, Christoph and Sewe, Andreas (2010):
Optimizing the evaluation of patterns in pointcuts.
In: Proceedings of the 4th workshop on Virtual Machines and Intermediate Languages, New York, NY, USA, ACM, In: Workshop on Virtual Machines and Intermediate Languages, Reno, Nevada, USA, 17 Oct 2010, [Online-Edition: http://doi.acm.org/10.1145/1941054.1941056],
[Conference or Workshop Item]

Barreto, Paulo and Cayrel, Pierre-Louis and Misoczki, Rafael and Niebuhr, Robert (2010):
Quasi-dyadic CFS signatures.
In: Inscrypt 2010, Springer, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]

Benlian, Alexander and Hess, Thomas and Buxmann, Peter (2010):
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, pp. 23--32, 2, (2), [Article]

Bedner, Mark and Ackermann, Tobias (2010):
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), pp. 323-328, 34, (5), DOI: 10.1007/s11623-010-0096-1,
[Article]

Braun, Michael and Meyer, Ulrike and Wetzel, Susanne (2010):
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
In: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, [Conference or Workshop Item]

Breitinger, Frank and Nickel, Claudia (2010):
User Survey on Phone Security and Usage.
In: BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, [Conference or Workshop Item]

Busch, Christoph and Abt, Sebastian and Nickel, Claudia and Korte, Ulrike and Zhou, Xuebing (2010):
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
[Conference or Workshop Item]

Busch, Christoph and Hartung, Daniel (2010):
Biometrische Nachrichten-Authentisierung.
[Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Horsch, Moritz and Hühnlein, Detlef and Kiefer, Franziskus and Strenzke, Falko and Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, Darmstadt, [Conference or Workshop Item]

Busch, Heike and Katzenbeisser, Stefan and Baecher, Paul (2009):
PUF-Based Authentication Protocols, Revisited.
In: International Workshop on Information Security Applications (WISA'09), [Conference or Workshop Item]

Boldyreva, Alexandra and Cash, David and Fischlin, Marc and Warinschi, Bogdan (2009):
Foundations of Non-Malleable Hash and One-Way Functions.
In: Asiacrypt 2009, Springer, In: Lecture Notes in Computer Science, 5912, [Conference or Workshop Item]

Bras-Amoros, Maria and Bulygin, Stanislav (2009):
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, pp. 561-574, 79, (3), DOI: 10.1007/s00233-009-9175-8,
[Article]

Bulygin, Stanislav and Pellikaan, Ruud (2009):
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, pp. 1626-1643, Special Issue "Gröbner Ba, (Issue 12), DOI: 10.1016/j.jsc.2007.12.003,
[Article]

Braun, Johannes (2009):
Nutzung des elektronischen Personalausweises im eCommerce.
TU Darmstadt, [Master Thesis]

Bissmeyer, Norbert and Stuebing, Hagen and Matthess, Manuel and Stotz, Jan Peter and Schütte, Julian and Gerlach, Matthias and Friederici, Florian (2009):
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
[Conference or Workshop Item]

Bedner, Mark (2009):
Rechtmäßigkeit der "Deep Packet Inspection".
[Other]

Brömme, Arslan and Busch, Christoph and Hühnlein, Detlef
Brömme, Arslan and Busch, Christoph and Hühnlein, Detlef (eds.) (2009):
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
In: BIOSIG 2009, ISBN ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2009):
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
In: Tagungsband Informatik 2009, LNI, [Conference or Workshop Item]

Brinkmeier, Michael and Schäfer, Günter and Strufe, Thorsten (2009):
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, pp. 831-844, 20, (6), [Article]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2009):
PSP : private and secure payment with RFID WPES 2009.
In: WPES 2009, Workshop on Privacy in the Electronic Society, [Conference or Workshop Item]

Busch, Christoph (2009):
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications, ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Busch, Christoph (2009):
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung, pp. 132-141, [Article]

Busch, Christoph (2009):
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]

Busch, Christoph and Reimer, Helmut (2009):
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5), [Article]

Brzuska, Christina and Fischlin, Marc and Lehmann, Anja and Schröder, Dominique (2009):
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Biometrics and Electronic Signatures - Research and Applications (BIOSIG) 2009, Gesellschaft fuer Informatik (GI), In: Lecture Notes in Informatics, [Conference or Workshop Item]

Buchmann, Johannes and Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, pp. 543-548, 9, [Article]

Baier, Harald and Karatsiolis, Vangelis (2009):
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI, Springer, [Conference or Workshop Item]

Baier, Harald and Straub, Tobias (2009):
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009, LNI, [Conference or Workshop Item]

Bulygin, Stanislav (2009):
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-0948-0,
[Book]

Bender, Jens and Fischlin, Marc and Kügler, Dennis (2009):
Security Analysis of the PACE Key-Agreement Protocol.
In: Information Security Conference (ISC) 2009, Springer, In: Lecture Notes in Computer Science, 5735, [Conference or Workshop Item]

Buchmann, Johannes and Karatsiolis, Vangelis (2009):
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, pp. 378-384, 2, (5), DOI: 10.4236/ijcns.2009.25042,
[Article]

Bulygin, Stanislav (2009):
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern, [Ph.D. Thesis]

Biere, Thomas and Schindler, Werner
Horster, P. and Schartner, P. (eds.) (2009):
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
In: D-A-CH Security 2009, syssec, Klagenfurt, [Conference or Workshop Item]

Bradler, Dirk and Mühlhäuser, Max and Kangasharju, Jussi (2009):
Demonstration of first response communication sandbox.
In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, [Conference or Workshop Item]

Bartsch, Steffen and Sohr, Karsten and Bormann, Carsten (2009):
Supporting Agile Development of Authorization Rules for SME Applications.
In: TrustCol: 3rd International Workshop on Trusted Collaboration, Springer, Orlando, FL, USA, DOI: 10.1007/978-3-642-03354-4_35,
[Conference or Workshop Item]

Bodden, Eric and Chen, Feng and Rosu, Grigore (2009):
Dependent advice: A general approach to optimizing history-based aspects.
In: ACM, 2009, pp. pages 3–14, AOSD ’09: Proceedings of , [Article]

Bulygin, Stanislav and Pellikaan, Ruud
Sala, M. and Mora, T. and Perret, L. and Sakata, S. and Traverso, C. (eds.) (2009):
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography, Springer, pp. 361-365, [Book Section]

Bilge, Leyla and Strufe, Thorsten and Balzarotti, Davide and Kirda, Engin (2009):
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
In: 18th Intl. World Wide Web Conference (WWW'09), [Conference or Workshop Item]

Brinkmeier, Michael and Fischer, Mathias and Grau, Sascha and Schäfer, Günter and Strufe, Thorsten (2009):
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33, (1), [Article]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus and Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Bedner, Mark (2009):
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), p. 372, Juni 2009, [Article]

Bokor, Peter and Serafini, Marco and Suri, Neeraj and Veith, Helmut (2009):
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
In: Proc. of International Conference on Formal Engineering Methods (ICFEM), [Conference or Workshop Item]

Breebaart, Jeroen and Yang, Bian and Buhan, Ileana and Busch, Christoph (2009):
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]

Brzuska, Christina and Fischlin, Marc and Freudenreich, Tobias and Lehmann, Anja and Page, Marcus and Schelbert, Jakob and Schröder, Dominique and Volk, Florian (2009):
Security of Sanitizable Signatures Revisited.
In: Public Key Cryptography (PKC 2009), [Conference or Workshop Item]

Brinkmeier, Michael and Schäfer, Günter and Strufe, Thorsten (2009):
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99, [Article]

Bradler, Dirk and Panitzek, Kamill and Schweizer, Immanuel and Mühlhäuser, Max (2008):
First Response Communication Sandbox.
In: 11th Communications and Networking Simulation Symposium, pp. 115-122, [Article]

Bradler, Dirk and Kangasharju, Jussi and Mühlhäuser, Max (2008):
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
(3), [Report]

Bergmann, Gabor and Ökrös, András and Ráth, Istvan and Varro, Daniel and Varró, Gergely (2008):
Incremental Pattern Matching in the VIATRA Model Transformation System.
In: Proc. of the 3rd International Workshop on Graph and Model Transformation, [Conference or Workshop Item]

Brickenstein, Michael and Bulygin, Stanislav
Faugere, J.-C. and Wang, D. (eds.) (2008):
Attacking AES via Solving Systems in the Key Variables Only.
In: First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30, [Conference or Workshop Item]

Bartsch, Steffen and Bormann, Carsten
Horster, Patrick (ed.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008, syssec Verlag, [Conference or Workshop Item]

Bodden, Eric and Hendren, Laurie and Lam, Patrick and Lhoták, Ondrej and Naeem, Nomair (2008):
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008, [Article]

Bodden, Eric and Havelund, Klaus (2008):
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008), pp. pages 155–165, [Article]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: PQCrypto 2008, Springer, In: LNCS, [Conference or Workshop Item]

Bulygin, Stanislav and Pellikaan, Ruud (2007):
Decoding error-correcting codes with Groebner bases.
In: Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, pp. 1685--1720, 205, (12), [Article]

Backes, Michael and Basin, David and Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, p. 561, 15, (6), [Article]

Bulygin, Stanislav (2006):
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, pp. 4664-4669, 52, (10), DOI: 10.1109/TIT.2006.881831,
[Article]

Bulygin, Stanislav (2006):
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern, [Master Thesis]

Backes, Michael and Karjoth, Günter and Pitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
[Standards, patents]

Benenson, Zinaida and Freiling, Felix and Pfitzmann, Birgit and Rohner, Christian and Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006), [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Bangerter, Endre Felix and Camenisch, Jan and Schunter, Matthias and Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
[Standards, patents]

Backes, Michael and Karioth, Guenter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
[Standards, patents]

Bussani, Anthony and Griffin, John Linwood and Jansen, Bernhard and Julisch, Klaus and Karjoth, Günter and Maruyama, Hiroshi and Nakamura, Megumi and Perez, Ronald and Schunter, Matthias and Tanner, Axel and Doorn, Leendert Van and Herreweghen, Els Van and Waidner, Michael and Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD), Springer-Verlag, Berlin, [Conference or Workshop Item]

Bangerter, Endre and Schunter, Matthias and Waidner, Michael and Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, pp. 135--154, 4, (3), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), pp. 242--252, 4, (4), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC), [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), pp. 589--617, 12, (3-4), [Article]

Betz, Linda and Dayka, John and Farrell, Walter and Guski, Richard and Karjoth, Günter and Nelson, Mark and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), Springer-Verlag, Berlin, [Conference or Workshop Item]

Bulygin, Stanislav (2003):
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, pp. 24-28, (2), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Baum-Waidner, Birgit and Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), Springer-Verlag, Berlin, [Conference or Workshop Item]

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Herreweghen, Els Van and Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, pp. 611--627, 18, (4), [Article]

Buhler, Peter and Eirich, Thomas and Steiner, Michael and Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00), CA, Internet Society, [Conference or Workshop Item]

Baum-Waidner, Birgit and Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, [Conference or Workshop Item]

Boly, Jean-Paul and Bosselaers, Antoon and Cramer, Ronald and Michelsen, Rolf and Mjolsnes, Stig and Muller, Frank and Pedersen, Torben and Pfitzmann, Birgit and de Rooij, Peter and Schoenmakers, Berry and Schunter, Matthias and Vallée, Luc and Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, Springer-Verlag, Berlin, [Conference or Workshop Item]

Bleumer, Gerrit and Pfitzmann, Birgit and Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, Springer-Verlag, Berlin, [Conference or Workshop Item]

Baum-Waidner, Birgit and Pfitzmann, Birgit and Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, Springer-Verlag, Heidelberg, [Conference or Workshop Item]

C

Cordero, Carlos Garcia and Hauke, Sascha and Mühlhäuser, Max and Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Frassetto, Tommaso and Homescu, Andrei and Koppen, Georg and Larsen, Per and Liebchen, Christopher and Perry, Mike and Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference or Workshop Item]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Coudert, Fanny and Butin, Denis and Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), pp. 749-762, 31, (6), [Article]

Conti, Mauro and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Negro, Marco and Qunaibit, Mohaned and Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Crane, Stephen and Volckaert, Stijn and Schuster, Felix and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Sutter, Bjorn De and Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Milanov, Nikolay and Koch, Christian and Hausheer, David and Mühlhäuser, Max (2015):
ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference or Workshop Item]

Cabarcas, Daniel and Demirel, Denise and Göpfert, Florian and Lancrenon, Jean and Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, In: IFIP Advances in Information and Communication Technology, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015, Internet Society, San Diego, [Conference or Workshop Item]

Classen, Jiska and Braun, Johannes and Volk, Florian and Hollick, Matthias and Buchmann, Johannes and Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Conference or Workshop Item]

Cordero, Carlos Garcia and Vasilomanolakis, Emmanouil and Fischer, Mathias and Mühlhäuser, Max (2015):
Community-based Collaborative Intrusion Detection.
In: International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm), Springer International Publishing, 164, ISBN 978-3-319-28865-9,
DOI: 10.1007/978-3-319-28865-9_44,
[Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt, [Master Thesis]

Canova, Gamze and Volkamer, Melanie and Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
Scottsdale, Arizona, [Other]

Conrad, Bernd and Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, UK, [Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland
Mauw, Sjouke and Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, Springer International Publishing, Wroclaw, Poland, In: Lecture Notes in Computer Science, 8743, [Conference or Workshop Item]

Conrad, Bernd and Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014), Paris, France, [Conference or Workshop Item]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt, [Master Thesis]

Christin, Delphine and Pons-Sorolla, Daniel Rodriguez and Hollick, Matthias and Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]

Christin, Delphine and Engelmann, Franziska and Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107, [Article]

Catuogno, Luigi and Löhr, Hans and Winandy, Marcel and Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications, 38, [Conference or Workshop Item]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias (2013):
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), pp. 695-707, 9, (5), [Article]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias and Martucci, Leonardo and Kanhere, Salil (2013):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, pp. 353-371, 9, (3), [Article]

Christin, Delphine and Sánchez López, P. and Reinhardt, Andreas and Hollick, Matthias and Kauer, Michaela (2013):
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), pp. 105–116, 17, (3), [Article]

Christin, Delphine and Büchner, C. and Leibecke, N. (2013):
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
In: Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop), [Conference or Workshop Item]

Cabarcas, Daniel and Göpfert, Florian and Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
[Other]

Christin, Delphine and Hollick, Matthias
Gutwirth, Serge and Leenes, Ronald and Hert, Paul De and Poullet, Yves (eds.) (2013):
European Data Protection: Coming of Age.
Springer Netherlands, pp. 203–222, [Book Section]

Christin, Delphine and Reinhardt, Andreas and Hollick, Matthias (2013):
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
In: Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Clauß, Sebastian and Schiffner, Stefan and Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Hollick, Matthias and Trumpold, K. (2012):
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
In: Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), [Conference or Workshop Item]

Christin, Delphine and Büttner, C. and Repp, Nicolas (2012):
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
In: Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Véron, Pascal and Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
In: WAIFI 2012, pp. 45 - 63, LNCS, (7369), [Article]

Christin, Delphine and Sánchez López, P. and Reinhardt, Andreas and Hollick, Matthias and Kauer, Michaela
Askoxylakis, Ioannis and Pöhls, Henrich and Posegga, Joachim (eds.) (2012):
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP), Springer, pp. 71-86, [Book Section]

Christin, Delphine and Bentolila, A. and Hollick, Matthias (2012):
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
In: Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), [Conference or Workshop Item]

Czajkowski, Katja and Schneider, Markus and Wolf, Ruben and Yannikos, York (2012):
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
(SIT-TR-2012-002), [Report]

Christin, Delphine and Roßkopf, C. and Hollick, Matthias and Martucci, Leonardo and Kanhere, Salil (2012):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom), [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), Springer, [Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil and Hollick, Matthias (2011):
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, pp. 1928-1946, 84, (11), DOI: 10.1016/j.jss.2011.06.073,
[Article]

Christin, Delphine and Guillemet, J. and Reinhardt, Andreas and Hollick, Matthias and Kanhere, Salil (2011):
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
In: Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Hoffmann, Gerhard and Meziani, Mohammed and Niebuhr, Robert
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Recent Progress in Code-Based Cryptography.
In: The 5th International Conference on Information Security and Assurance - ISA-2011, Springer, Brno University, Czech Republic, In: LNCS, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Günther, Felix and Hoffmann, Gerhard and Rothe, Holger (2011):
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011, [Article]

Christin, Delphine and Freudenreich, Tobias and Hollick, Matthias (2011):
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
In: Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), [Conference or Workshop Item]

Canova, Gamze (2011):
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
TU Darmstadt, [Master Thesis]

Cuong, N. and Katzenbeisser, Stefan (2011):
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
In: International Workshop on Digital Forensics and Watermarking (IWDW 2011), Springer, [Conference or Workshop Item]

Cuong, N. and Katzenbeisser, Stefan (2011):
Security of Copy-Move Forgery Detection Techniques.
In: International Conference on Acoustics, Speech and Signal Processing (ICASSP'11), IEEE Press, [Conference or Workshop Item]

Christin, Delphine and Hollick, Matthias (2011):
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
In: Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11), [Conference or Workshop Item]

Camenisch, Jan and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2011):
Reducing access to sensitive information.
[Standards, patents]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance, Brno University, Czech Republic, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: The 5th International Conference on Information Security and Assurance - ISA 2011, Brno University, Czech Republic, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Lindner, Richard and Rückert, Markus and Silva, Rosemberg (2010):
Improved Zero-knowledge Identification with Lattices.
In: The Fourth International Conference on Provable Security (ProvSec 2010), Springer, In: LNCS, [Conference or Workshop Item]

Checkoway, Stephen and Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Shacham, Hovav and Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, Chicago, Illinois, USA, In: CCS '10, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Chen, Liqun and Dietrich, Kurt and Löhr, Hans and Sadeghi, Ahmad-Reza and Wachsmann, Christian and Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: Information Security Conference (ISC), Springer, In: LNCS, 6531, [Conference or Workshop Item]

Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil and Hollick, Matthias (2010):
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
In: Proceedings of 9th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Würzburg, Germany, [Conference or Workshop Item]

Christin, Delphine and Hollick, Matthias and Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
In: Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010), [Conference or Workshop Item]

Cayrel, Pierre-Louis and Véron, Pascal and Alaoui, Sidi Mohamed El Yousfi (2010):
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
In: Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010), SAC2010, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Lindner, Richard and Rückert, Markus and Silva, Rosemberg (2010):
A Lattice-Based Threshold Ring Signature Scheme.
In: The first international conference on cryptology and Information security, LatinCrypt 2010, Springer, In: LNCS, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Meziani, Mohammed (2010):
Post-Quantum Cryptography: Code-based Signatures.
In: 4th International Conference on Information Security and Assurance ISA 2010, Lecture Notes in Computer, [Conference or Workshop Item]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Stüble, Christian and Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), pp. 289-298, 5, [Article]

Christin, Delphine and Mogre, Parag S. and Hollick, Matthias (2010):
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, pp. 96-125, 2, DOI: 10.3390/fi2020096,
[Article]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi (2010):
Dual Construction of Stern-based Signature Schemes.
In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", 63 March 2010, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Strenzke, Falko (2010):
Side channels attacks in code-based cryptography.
In: First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2010):
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
In: Proceedings of the 6th International IFIP AICT 320 Summer School, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Manulis, Mark and Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Catuogno, Luigi and Dmitrienko, Alexandra and Eriksson, Konrad and Kuhlmann, Dirk and Ramunno, Gianluca and Sadeghi, Ahmad-Reza and Schulz, Steffen and Schunter, Matthias and Winandy, Marcel and Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST), Springer, [Conference or Workshop Item]

Charnes, Christopher
Atallah, Mikhail and Blanton, Marina (eds.) (2009):
Algorithms and Theory of Computation Handbook.
[Book Section]

Catuogno, Luigi and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
In: 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Leveraging social links for trust and privacy in networks.
In: INetSec 2009 Open Research Problems in Network Security, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Privacy preserving social networking through decentralization.
In: WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, [Conference or Workshop Item]

Charfi, Anis and Dinkelaker, Tom and Mezini, Mira (2009):
A Plugin-Architecture for Self-Adaptive WS Compositions.
In: Proceedings of the IEEE 7th International Conference on Web Services (ICWS 2009), IEEE, Los Angeles, CA, USA, ISBN 978-0-7695-3709-2,
DOI: 10.1109/ICWS.2009.125,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, pp. 94 -- 101, 47, (12), [Article]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Leveraging Social Links for Trust and Privacy in Networks.
In: INetSec, Open Research Problems in Network Security, [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Privacy Preserving Social Networking Through Decentralization.
In: 6th International Conference on Wireless On-demand Network Systems and Services (WONS), [Conference or Workshop Item]

Cutillo, Leucio-Antonio and Molva, Refik and Strufe, Thorsten (2009):
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
In: 3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications, [Conference or Workshop Item]

Camenisch, Jan and Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
[Standards, patents]

Camenisch, Jan and Herreweghen, Els Van and Waidner, Michael (2003):
Anonymous Access to a Service.
[Standards, patents]

Camenisch, Jan and Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]

Carter, Bob and Pfitzmann, Birgit and Schunter, Matthias and Stanford, Chris and Waidner, Michael and Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

D

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Deckwerth, Frederik (2017):
Static Verification Techniques for Attributed Graph Transformations.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6150],
[Ph.D. Thesis]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt, [Master Thesis]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Grube, Tim and Schiffner, Stefan and Kikiras, Panayotis and Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), Elsevier, pp. 42-53, 76, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

Davi, Lucas and Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Dagdelen, Özgür and Gajek, Sebastian and Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, In: LNCS, [Conference or Workshop Item]

Do, Lisa Nguyen Quang and Ali, Karim and Bodden, Eric and Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Demirel, Denise and Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE, In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt, [Master Thesis]

Davi, Lucas and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Snow, Kevin and Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), Internet Society, [Conference or Workshop Item]

Dmitrienko, Alexandra and Heuser, Stephan and Nguyen, Thien Duc and da Silva Ramos, Marcos and Rein, Andre and Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
In: 6. ACM Cloud Computing Security Workshop (CCSW'14), ACM, DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Böck, Leon and Kikiras, Panayotis and Mühlhäuser, Max (2014):
Twitterize: Anonymous Micro-Blogging.
In: Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), IEEE Computer Society, In: International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA), DOI: 10.1109/AICCSA.2014.7073285,
[Conference or Workshop Item]

Ding, Jintai and Petzoldt, Albrecht and Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: PQCrypto 2014, Springer, Waterloo, Canada, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, Springer, Istanbul, Turkey, In: LNCS, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Dagdelen, Özgür and El Bansarkhani, Rachid and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas and Sanchez, Ana Helena and Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014, Florianópolis, Brazil, [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference or Workshop Item]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, (4), [Article]

Davi, Lucas and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, [Conference or Workshop Item]

do Carmo, Rodrigo and Hollick, Matthias (2014):
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
In: Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014), IEEE/IFIP, [Conference or Workshop Item]

Davi, Lucas and Lehmann, Daniel and Sadeghi, Ahmad-Reza and Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra and Noack, David and Sadeghi, Ahmad-Reza and Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014, Marrakech, Morocco, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu HI USA, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: Asiacrypt 2013, Springer, In: LNCS, [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive, [Article]

Demmler, Daniel (2013):
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Daubert, Jörg and Fischer, Mathias and Schiffner, Stefan and Mühlhäuser, Max
Lopez, Javier and Huang, Xinyi and Sandhu, Ravi (eds.) (2013):
Distributed and Anonymous Publish-Subscribe.
In: The 7th International Conference on Network and System Security (NSS 2013), Springer, Madrid, Spain, LNCS 7873, ISBN 978-3-642-38630-5,
DOI: 10.1007/978-3-642-38631-2_57,
[Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference or Workshop Item]

do Carmo, Rodrigo and Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187,
[Article]

Demirel, Denise and Henning, Maria and van de Graaf, Jeroen and Ryan, Peter Y. A. and Buchmann, Johannes
Heather, James and Schneider, Steve and Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013, Springer, In: LNCS, [Conference or Workshop Item]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Davi, Lucas and Dmitrienko, Alexandra and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference or Workshop Item]

do Carmo, R. and Werner, M. and Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), [Conference or Workshop Item]

Demirel, Denise and Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Online-Edition: https://jusletter-it.weblaw.ch/redaktion.html],
[Article]

Demirel, Denise and van de Graaf, Jeroen and Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012, Bellevue, WA, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Tamrakar, Sandeep and Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, In: Lecture Notes in Computer Science (LNCS), 7344, [Conference or Workshop Item]

Djatmiko, Mentari and Boreli, Roksana and Seneviratne, Aruna and Ries, Sebastian (2012):
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, pp. 1-14, 18, DOI: 10.1007/s11276-012-0505-5,
[Article]

Das, Amitabh and Kocabaş, Ünal and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Kowalski, Christoph and Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC), ACM Press, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and Ryan, Peter Y. A. and Schneider, Steve and Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
In: 3rd international conference on e-voting and identity (VoteID 2011), Springer, Tallinn, Estonia, 7187 2012, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Demirel, Denise and Frankland, Richard and Volkamer, Melanie (2011):
Readiness of various eVoting systems for complex elections.
[Report]

Demmler, Daniel (2011):
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt, [Bachelor Thesis]

Demirel, Denise and Frankland, Richard and Popovic, Darko and Volkamer, Melanie
Parycek, Peter and Kripp, Melanie J and Noella, Edelmann (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, Edition Donau-Universität Krems, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics, Rome, Italy, [Conference or Workshop Item]

Dubuis, Eric and Spycher, Oliver and Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, [Conference or Workshop Item]

Dmitrienko, Alexandra and Hadzic, Zecir and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies, [Conference or Workshop Item]

Djatmiko, Mentari and Boreli, Roksana and Seneviratne, Aruna and Ries, Sebastian (2011):
Trust-based Content Distribution for Mobile Ad Hoc Networks.
In: 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2011) [to appear], [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10), IEEE Press, [Conference or Workshop Item]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference, Boca Raton, Florida, USA, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2010):
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: 13th Information Security Conference, Springer, Boca Raton, USA, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Demirel, Denise (2010):
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
TU Darmstadt, [Master Thesis]

Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Dagdelen, Özgür and Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: Euro-Par 2010, Springer, In: LNCS, 6272, [Conference or Workshop Item]

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Public-Key Cryptography (PKC), Springer-Verlag, In: Lecture Notes in Computer Science, 6056, [Conference or Workshop Item]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Derawi, Mohammad and Nickel, Claudia and Bours, Patrick and Busch, Christoph (2010):
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, [Conference or Workshop Item]

Datta, Anwitaman and Buchegger, Sonja and Vu, Le-Hung and Rzadca, Krzysztof and Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011), [Conference or Workshop Item]

Dahmen, Erik and Krauß, Christoph
Garay, Christoph A. and Miyaji, Atsuko and Otsuka, Akira (eds.) (2009):
Short Hash-Based Signatures for Wireless Sensor Networks.
In: CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-540-89640-1,
[Conference or Workshop Item]

Deußer, Clemens and Reubold, Jan (2009):
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt, [Master Thesis]

Davi, Lucas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, ACM, Chicago, Illinois, USA, In: STC '09, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Dobre, Dan and Majuntke, Matthias and Serafini, Marco and Suri, Neeraj (2009):
Efficient Robust Storage Using Secret Tokens.
In: 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), [Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: PQCrypto 2008, Springer, Cincinnati, USA, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Detken, Kai-Oliver and Gitz, Stephan and Bartsch, Steffen and Sethmann, Richard
Horster, Patrick (ed.) (2008):
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
In: D.A.CH. Security 2008, syssec Verlag, [Conference or Workshop Item]

E

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid and Dagdelen, Özgür and Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20, [Article]

El Bansarkhani, Rachid and Buchmann, Johannes
Pointcheval, David and Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Springer, Marrakesh, Morocco, In: LNCS, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: Selected Areas in Cryptography 2013 (SAC'13), Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Elovici, Yuval and Fire, Michael and Herzberg, Amir and Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid and Cabarcas, Daniel and Kuo, Po-Chun and Schmidt, Patrick and Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, pp. 81-102, 53, [Article]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid and Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: WISTP - Workshop in Information Security Theory and Practice 2012, Springer, London, UK, In: LNCS, [Conference or Workshop Item]

Eichberg, Michael and Sewe, Andreas (2011):
Encoding the Java Virtual Machine's Instruction Set.
In: Proceedings of the Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation, In: Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010), Paphos, Cyprus, 27 Mar 2010, In: Electronic Notes in Theoretical Computer Science, 264, ISSN 15710661,
[Online-Edition: http://dx.doi.org/10.1016/j.entcs.2011.02.004],
[Conference or Workshop Item]

Eikemeier, Oliver and Fischlin, Marc and Goetzmann, Jens-Fabian and Lehmann, Anja and Schroeder, Peter and Schröder, Dominique and Wagner, Daniel (2010):
History-Free Aggregate Message Authentication Codes.
In: Security and Cryptography for Networks (SCN) 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Endres, Christoph and Wurz, Andreas and Hoffmann, Marcus and Behring, Alexander
French, Simon and Tomaszewski, Brian and Zobel, Christopher (eds.) (2010):
A Task-based Messaging Approach To Facilitate Staff Work.
In: Proceedings of the 7th International Conference on Information Systems for Crisis Response and Management. International Conference on Information Systems for Crisis Response and Management (ISCRAM-2010), [Conference or Workshop Item]

Ekberg, Jan-Erik and Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009), [Conference or Workshop Item]

Erkin, Zekeriya and Franz, Martin and Guajardo, Jorge and Katzenbeisser, Stefan and Lagendijk, Inald and Toft, Tomas (2009):
Privacy-Preserving Face Recognition.
In: Privacy Enhancing Technologies Symposium (PETS 2009), [Conference or Workshop Item]

Eu, Joy Boy Joy (2001):
Specification of Dependable Trusted Third Parties.
[Report]

F

Fernando, Ruchith and Ranchal, Rohit and An, Byungchan and Othmane, Lotfi Ben and Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud, [Conference or Workshop Item]

Falzon, Kevin and Bodden, Eric
Lopez, Javier and Mitchell, Chris J. (eds.) (2015):
Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Information Security, In: Information Security Conference, Trondheim, In: Lecture Notes in Computer Science, 9290, [Conference or Workshop Item]

Funke, Sebastian and Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis and Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), poster proceedings, IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Follner, Andreas and Bodden, Eric (2015):
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
[Report]

Faraon, Montathar and Stenberg, Georg J. H. and Budurushi, Jurlind and Kaipainen, Mauri
Parycek, Peter and Sachs, Michael and Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Feier, Christian and Neumann, Stephan and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
TU Darmstadt, [Master Thesis]

Franz, Martin and Holzer, Andreas and Katzenbeisser, Stefan and Schallhart, Christian and Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, 8409, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja and Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
In: J. Cryptology, 27, DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

Falzon, Kevin and Bodden, Eric and Purandare, Rahul (2013):
Distributed Finite-State Runtime Monitoring with Aggregated Events.
In: Runtime Verification 2013 (RV'13), Springer, LNCS, [Article]

Fritz, Christian and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2013):
Highly Precise Taint Analysis for Android Applications.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, pp. 117-128, 17, (3), [Article]

Feng, Tan and Wang, Qixin and Bu, Lei and Zheng, Rong and Wang, Yufei and Suri, Neeraj (2013):
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS), [Conference or Workshop Item]

Fontein, Felix and Schneider, Michael and Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013, Bergen (Norway), [Conference or Workshop Item]

Fischlin, Marc and Onete, Cristina (2013):
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: ACNS, Springer, In: LNCS, [Conference or Workshop Item]

Falzon, Kevin and Pace, Gordon J.
Machado, Ricardo J. and Maciel, Rita Suzana and Rubin, Julia and Botterweck, Goetz (eds.) (2012):
Combining Testing and Runtime Verification.
In: 8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, Essen, Germany, September 04, 2012, [Online-Edition: http://www.di.uminho.pt/mompes],
[Conference or Workshop Item]

Frey, Hannes and Hollick, Matthias and Loch, Adrian (2012):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), DOI: 10.1109/WoWMoM.2012.6263689,
[Conference or Workshop Item]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

Frey, Hannes and Hollick, Matthias and Loch, Adrian (2011):
Curve-based Planar Graph Routing in Multihop Wireless Networks.
In: 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), DOI: 10.1109/MASS.2011.127,
[Conference or Workshop Item]

Frankland, Richard and Demirel, Denise and Budurushi, Jurlind and Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]

Filyanov, Atanas and McCune, Jonathan and Sadeghi, Ahmad-Reza and Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011), Hong Kong, [Conference or Workshop Item]

Fischer-Hübner, Simone and Grimm, Rüdiger and Lo Iacono, Luigi and Möller, Sebastian and Müller, Günter and Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14, [Article]

Feller, Thomas and Malipatlolla, Sunil and Meister, David and Huss, Sorin (2011):
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2011), [Conference or Workshop Item]

Franz, M. and Katzenbeisser, Stefan (2011):
Processing Encrypted Floating Point Signals.
In: Workshop on Multimedia and Security (MMSEC'11), ACM Press, [Conference or Workshop Item]

Franz, M. and Carbunar, B. and Sion, R. and Katzenbeisser, Stefan and Sotakova, M. and Williams, P. and Peter, Andreas (2011):
Oblivious Outsourced Storage with Delegation.
In: Financial Cryptography and Data Security (FC 2011), Springer, [Conference or Workshop Item]

Federrath, Hannes and Hansen, Marit and Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, pp. 5--7, 53, (1), [Article]

Fischer-Hübner, Simone and Hoofnagle, Chris and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061, Dagstuhl Reports, [Conference or Workshop Item]

Fischer-Hübner, Simone and Hoofnagle, Chris Jay and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, pp. 1--15, 1, (2), [Article]

Fischlin, Marc and Lehmann, Anja and Ristenpart, Thomas and Shrimpton, Thomas and Stam, Martijn and Tessaro, Stefano (2010):
Random Oracles With(out) Programmability.
In: Asiacrypt 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Feller, Thomas and Demirezen, Aziz (2010):
Hardware Trojans: Data Leakage Using General Purpose LEDs.
[Report]

Fischlin, Marc and Schröder, Dominique (2010):
On the Impossibility of Three-Move Blind Signature Schemes.
In: Advances in Cryptology - Eurocrypt, Springer-Verlag, In: Lecture Notes in Computer Science, 6110, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja (2010):
Hash Function Combiners in SSL and TLS.
In: CT-RSA, Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja (2010):
Delayed-Key Message Authentication for Streams.
In: Theory of Cryptography Conference (TCC), Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Fenzi, Michele and Liu, Huajian and Steinebach, Martin and Caldelli, Roberto (2010):
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
In: Proceeding of the Seventh IASTED International Conference on Signal Processing, Pattern Recognition and Applications (SPPRA 2010), Innsbruck, Austria, ACTA Press, [Conference or Workshop Item]

Finke, Thomas and Gebhardt, Max and Schindler, Werner
Clavier, C. and Gaj, K. (eds.) (2009):
A New Side-Channel Attack on RSA Prime Generation.
Springer, Berlin, In: LNCS, [Conference or Workshop Item]

Freiling, Felix and Heinson, Dennis (2009):
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), pp. 547-552, 2009, (9), [Article]

Fischer, Thomas and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, IEEE, [Conference or Workshop Item]

Fischlin, Marc (2009):
RSA Cryptographers' Track. Lecture Notes in Computer Science.
Springer, 5473, [Book]

Fischlin, Marc and Schröder, Dominique (2009):
Security of Blind Signatures under Aborts.
In: Public Key Cryptography (PKC 2009), [Conference or Workshop Item]

Fischer, Lars and Katzenbeisser, Stefan and Eckert, Claudia (2008):
Measuring Unlinkability Revisited.
In: WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM, Alexandria, Virginia, USA, ISBN 978-1-60558-289-4,
DOI: http://doi.acm.org/10.1145/1456403.1456421,
[Conference or Workshop Item]

Flentge, Felix and Weber, Stefan and Behring, Alexander and Ziegert, Thomas (2008):
Designing Context-Aware HCI for Collaborative Emergency Management.
In: Int'l Workshop on HCI for Emergencies in conjunction with CHI 2008 (electronic proceedings), [Conference or Workshop Item]

Field, Simon and Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, pp. 667--668, 32, (6), [Article]

G

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Gerber, Paul and Renaud, Karen and Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, pp. 8-26, 34, (1), DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, 10., [Conference or Workshop Item]

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Germanus, Daniel and Ismail, Hatem and Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, [Conference or Workshop Item]

Gazis, Vangelis and Görtz, Manuel and Huber, Marco and Leonardi, Alessandro and Mathioudakis, Kostas and Wiesmaier, Alexander and Zeiger, Florian and Vasilomanolakis, Emmanouil (2015):
A Survey of Technologies for the Internet of Things.
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, IEEE, Dubrovnik, Croatia, ISBN 978-1-4799-5343-1,
DOI: 10.1109/IWCMC.2015.7289234,
[Conference or Workshop Item]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, In: Weiterdenken, [Conference or Workshop Item]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Ghiglieri, Marco and Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, pp. 16-21, 45, (1), DOI: 10.1145/2738210.2738214,
[Article]

Gerber, Paul and Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, pp. 108 - 113, 2/2015, DOI: 10.1007/s11623-015-0375-y,
[Article]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC, Las Vegas, NV, [Conference or Workshop Item]

Ganji, Fatemeh and Krämer, Juliane and Seifert, Jean-Pierre and Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, US, [Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security, Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto and Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 11/2014, [Conference or Workshop Item]

Geihs, Matthias and Cabarcas, Daniel
Aranha, Diego F. and Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, Springer, Florianópolis, Brazil, In: LNCS, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
San Jose, California, [Other]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael (2014):
Personal DLP for Facebook.
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, In: 6, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco and Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014, [Conference or Workshop Item]

Gutmann, Andreas and Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
Kagawa, Japan, [Other]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 10/2013, [Conference or Workshop Item]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt, [Master Thesis]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt, [Master Thesis]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Grimm, Marco and Anderl, Reiner (2013):
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Proceedings of the 11th Annual Conference on Systems Engineering Research (CSER 2013), Elsevier, In: Procedia Computer Science, [Conference or Workshop Item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Ghiglieri, Marco and Kalabis, Lukas and Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Garcia-Saavedra, Andres and Serrano, Pablo and Banchs, Albert and Hollick, Matthias (2012):
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, pp. 631-645, 8, (5), [Article]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes
Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Garcia-Saavedra, Andres and Serrano, Pablo and Banchs, Albert and Hollick, Matthias (2012):
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In: In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Lucca, Italy, [Conference or Workshop Item]

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt, [Master Thesis]

Günther, Felix and Manulis, Mark and Strufe, Thorsten (2011):
Key Management in Distributed Online Social Networks.
In: Proceedings of WoWMoM/DSPAN, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Strufe, Thorsten (2011):
Cryptographic Treatment of Private User Profiles.
In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, [Conference or Workshop Item]

Gay, Richard and Mantel, Heiko and Sprick, Barbara (2010):
Service Automata for Secure Distributed Systems.
[Other]

Gottron, C. and Larbig, P. and König, A. and Hollick, Matthias and Steinmetz, R. (2010):
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
In: Proceedings of IEEE LCN 2010, Denver, Colorado, USA, [Conference or Workshop Item]

Geibig, Joanna and Bradler, Dirk (2010):
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10), [Article]

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Africacrypt 2010, Springer, In: Lecture Notes in Computer Science, 6055, [Conference or Workshop Item]

Gharadaghy, Rojan (2010):
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
TU Darmstadt, [Master Thesis]

Germanus, Daniel and Khelil, Abdelmajid and Suri, Neeraj (2010):
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
In: Proc. International Symposium on Architecting Critical Systems (ISARCS), [Conference or Workshop Item]

Gharadaghy, Rojan and Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, In: LNI, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Grimm, Rüdiger and Hupf, Katharina and Volkamer, Melanie
Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, In: LNI, 167, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Gottron, Christian and König, André and Hollick, Matthias and Bergsträßer, Sonja and Hildebrandt, Tomas and Steinmetz, Ralf (2009):
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
In: Proceedings of IFIP Wireless Days 2009, [Conference or Workshop Item]

Gajek, Sebastian and Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing, [Conference or Workshop Item]

Gebhardt, Max and Illies, Georg and Schindler, Werner (2009):
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
In: Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI, SecuMedia, Ingelheim, [Conference or Workshop Item]

Ghiglieri, Marco and Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]

Germanus, Daniel and Johansson, Andreas and Suri, Neeraj (2009):
Threat Modeling and Dynamic Profiling.
Elsevier, [Book Section]

Gasmi, Yacine and Hessmann, Christian and Pittenauer, Martin and Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), In: LNI, 1, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie
Hegering, Heinz-Gerd and Lehmann, Axel and Ohlbach, Hans Jürgen and Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: GI Jahrestagung, München, Band 1, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: Electronic Voting - 3rd International Conference, Gesellschaft für Informatik, In: LNI, 131, [Conference or Workshop Item]

Gebhardt, Max and Illies, Georg and Schindler, Werner
Alkassar, A. and Siekmann, J. (eds.) (2008):
On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
In: Sicherheit 2008, Gesellschaft für Informatik, Köllen, Bonn, In: Lecture Notes in Informatics, [Conference or Workshop Item]

Gebhardt, Max and Illies, Georg and Schindler, Werner (2008):
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
[Other]

Grimm, Rüdiger and Volkamer, Melanie
Ferro, Enrico and Scholl, Jochen and Wimmer, Maria (eds.) (2008):
Trust Models for Remote Electronic Voting.
In: Electronic Government 7th International Conference EGOV 2008, Koblenz, 27, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Grimm, Rüdiger and Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Electronic Voting 2006 - $2^{nd}$ International Conference, In: Springer LNI, 86, [Conference or Workshop Item]

Grimm, Rüdiger and Krimmer, Robert and Meißner, Nils and Reinhard, Kai and Volkamer, Melanie and Weinand, Marcel
Krimmer, Robert (ed.)
LNI, GI (Corporate Creators) (2006):
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006, Bonn, Gesellschaft für Informatik, pp. 203-212, [Book Section]

H

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Heuser, Stephan (2016):
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5663],
[Ph.D. Thesis]

Halvani, Oren and Winter, Christian and Pflug, Anika (2016):
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, pp. S33–S43, 16, (supplement), DOI: 10.1016/j.diin.2016.01.006,
[Article]

Huang, Jialin and Vaudenay, Serge and Lai, Xuejia and Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference or Workshop Item]

Horsch, Moritz and Hülsing, Andreas and Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Halvani, Oren and Winter, Christian
Cappellato, Linda and Ferro, Nicola and Jones, Gareth and Juan, Eric San (eds.) (2015):
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
In: CLEF2015 Working Notes, Working Notes of CLEF 2015 – Conference and Labs of the Evaluation forum, Toulouse, France, September 8–11, 2015, Sun SITE Central Europe, Toulouse, France, In: CEUR Workshop Proceedings, Vol-1391, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Volk, Florian and Hauke, Sascha and Mühlhäuser, Max
Ko, Ryan and Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, Amsterdam Heidelberg, Elsevier Syngress, pp. 463-493, DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Hasan, T. and Kikiras, Panayotis and Leonardi, Alessandro and Ziekow, Holger and Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Huang, Shin-Ying and Huang, Yennun and Suri, Neeraj (2014):
Event pattern discovery on IDS traces of Cloud Services.
In: IEEE International Conference on Big Data and Cloud Computing (BDCloud), [Conference or Workshop Item]

Habib, Sheikh Mahbub and Ries, Sebastian and Varikkattu, Prabhu and Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, pp. 2185-2200, 7, (11), DOI: 10.1002/sec.748,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.748],
[Article]

Halvani, Oren and Steinebach, Martin (2014):
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, pp. 33-43, (2014), [Article]

Hiemenz, Benedikt (2014):
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt, [Bachelor Thesis]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference or Workshop Item]

Halvani, Oren and Steinebach, Martin and Neitzel, Svenja
Katzenbeisser, Stefan and Lotz, Volkmar and Weippl, Edgar (eds.) (2014):
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 229-241, [Book Section]

Heuser, Stephan and Nadkarni, Adwait and Enck, William and Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Halvani, Oren and Steinebach, Martin
Cappellato, Linda and Ferro, Nicola and Halvey, Martin and Kraaij, Wessel (eds.) (2014):
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
In: Working Notes for CLEF 2014 Conference, Sheffield, UK, September 15-18, 2014., Sheffield, UK, [Conference or Workshop Item]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158, [Article]

Halvani, Oren and Steinebach, Martin and Zimmermann, Ralf
Forner, Pamela and Navigli, Roberto and Tufis, Dan and Ferro, Nicola (eds.) (2013):
Authorship Verification via k-Nearest Neighbor Estimation.
In: Working Notes for CLEF 2013 Conference , Valencia, Spain, September 23-26, 2013., CEUR-WS.org, In: CEUR - Workshop Proceedings, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Halvani, Oren and Steinebach, Martin and Wolf, Patrick and Zimmermann, Ralf (2013):
Natural Language Watermarking for German Texts.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, Montpellier, France, In: IH&MMSec '13, ISBN 978-1-4503-2081-8,
DOI: 10.1145/2482513.2482522,
[Conference or Workshop Item]

Horsch, Moritz and Hühnlein, Detlef and Breitenstrom, Christian and Wieland, Thomas and Wiesmaier, Alexander and Biallowons, Benedikt and Petrautzki, Dirk and Potzernheim, Simon and Schmölz, Johannes and Wesner, Alexander and Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Henecka, Wilko and Schneider, Thomas (2013):
Faster Secure Two-Party Computation with Less Memory.
In: 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), ACM, DOI: 10.1145/2484313.2484369,
[Conference or Workshop Item]

Hülsing, Andreas and Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013, Cairo, Egypt, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
In: Proceedings of 28th ACM SAC 2013, New York, NY, USA, ACM, pp. 1963-1965, DOI: 10.1145/2480362.2480727,
[Online-Edition: http://doi.acm.org/10.1145/2480362.2480727],
[Book Section]

Hauke, Sascha and Biedermann, Sebastian and Heider, Dominik and Mühlhäuser, Max (2013):
On the Application of Supervised Machine Learning to Trustworthiness Assessment.
(TR-014), DOI: 10.1109/TrustCom.2013.5,
[Report]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013, Springer, pp. 194-208, [Book Section]

Huss, Sorin A. and Stöttinger, Marc and Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, [Conference or Workshop Item]

Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
TU Darmstadt, [Master Thesis]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Halvani, Oren (2012):
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
TU Darmstadt, [Master Thesis]

Hülsing, Andreas and Busold, Christoph and Buchmann, Johannes
Knudsen, Lars and Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: SAC2012 - Conference on Selected Areas in Cryptography, Springer Berlin Heidelberg, Windsor, Canada, In: LNCS, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Habib, Sheikh Mahbub and Ries, Sebastian and Hauke, Sascha and Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
In: Proceedings of the IEEE TrustCom 2012, IEEE, Liverpool, UK, ISBN 978-1-4673-2172-3,
DOI: 10.1109/TrustCom.2012.165,
[Conference or Workshop Item]

Heuser, Annelie and Zohner, Michael (2012):
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]

Hartung, Daniel and Olsen, Martin Aastrup and Xu, Haiyun and Nguyen, Hai Thanh and Busch, Christoph (2012):
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, pp. 25-36, 1, (1), DOI: 10.1049/iet-bmt.2011.0013,
[Article]

Hartung, Daniel and Pflug, Anika and Busch, Christoph (2012):
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: Sicherheit 2012 - Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik e.V., In: LNI, [Conference or Workshop Item]

Hülsing, Andreas and Petzoldt, Albrecht and Schneider, Michael and Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012, Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Henriques, Joselito and von Lukas, Uwe and Mesing, Benjamin (2012):
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, Göller, Baden-Baden, pp. 84-86, 2, ISSN 1866-5004,
[Article]

Habib, Sheikh Mahbub and Ries, Sebastian and Hauke, Sascha and Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Trust Assessment for Cloud Marketplaces (Full version).
(31 pages), [Report]

Halvani, Oren and Steinebach, Martin
Schartner, Peter and Taeger, Jürgen (eds.) (2012):
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, Prof. Dr. Patrick Horster, pp. 174-185, [Book Section]

Hühnlein, Detlef and Petrautzki, Dirk and Schmölz, Johannes and Wich, Tobias and Horsch, Moritz and Wieland, Thomas and Eichholz, Jan and Wiesmaier, Alexander and Braun, Johannes and Feldmann, Florian and Potzernheim, Simon and Schwenk, Jörg and Kahlo, Christian and Kühne, Andreas and Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit, Darmstadt, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander and Schaaf, Joachim and Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September, [Conference or Workshop Item]

Henriques, Joselito Rodrigues and Völz, Diana and Anderl, Reiner (2012):
Data Exchange Processes based on Trust and Rights Management.
In: TMCE 2012: Tools and Methods of Competitive Engineering, Karlsruhe, ISBN 978-90-5155-082-5,
[Conference or Workshop Item]

Hintz, Nadina and Benenson, Zinaida and Strufe, Thorsten (2012):
Friendship in German Online Social Networks.
In: SOUPS, [Conference or Workshop Item]

Henning, Maria and Demirel, Denise and Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), Salzburg, Austria, [Conference or Workshop Item]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
TU Darmstadt, [Master Thesis]

Habib, Sheikh Mahbub and Ries, Sebastian and Mühlhäuser, Max (2011):
Towards a Trust Management System for Cloud Computing.
In: 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 (TrustCom 2011), IEEE CS, Changsha, China, ISBN 978-1-457-72135-9,
DOI: http://doi.ieeecomputersociety.org/10.1109/TrustCom.2011.129,
[Conference or Workshop Item]

Hartung, Daniel and Olsen, Martin Aastrup and Xu, Haiyun and Busch, Christoph (2011):
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011), [Article]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2011):
Mobile eID application for the German identity card.
[Report]

Hoffmann, Gerhard (2011):
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt, [Master Thesis]

Habib, Sheikh Mahbub and Varadharajan, Vijay and Ries, Sebastian and Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
(27 pages), [Report]

Horsch, Moritz and Stopczynski, Martin (2011):
The German eCard-Strategy.
[Report]

Horsch, Moritz (2011):
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
TU Darmstadt, [Master Thesis]

Hamacher, Kay and Katzenbeisser, Stefan (2011):
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011), ACM Press, pp. 115-124, [Book Section]

Heuser, Annelie and Kasper, Michael and Schindler, Werner and Stoettinger, Marc (2011):
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
In: 14th EUROMICRO Conference on Digital System Design (DSD2011), [Conference or Workshop Item]

Henriques, Joselito Rodrigues and Anderl, Reiner and Grimm, Marco (2010):
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
In: Proceeding of ASME 2010 International Mechanical Engineering Congress & Exposition, Vancouver, British Columbia, Canada, ISBN 978-0-7918-3891-4,
[Conference or Workshop Item]

Hollick, Matthias and Strufe, Thorsten and Buchmann, Alejandro (2010):
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, pp. 56-59, (2), [Article]

Habib, Sheikh Mahbub and Ries, Sebastian and Mühlhäuser, Max (2010):
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, IEEE Computer Society, Xi'an, China, ISBN 978-0-7695-4272-0,
DOI: http://doi.ieeecomputersociety.org/10.1109/UIC-ATC.2010.48,
[Conference or Workshop Item]

Heinson, Dennis and Schmidt, Bernd (2010):
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, pp. 540-547, 26, (8), [Article]

Halvani, Oren and Steinebach, Martin (2010):
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, pp. 285-291, 5/2010, [Article]

Hermans, Jens and Schneider, Michael and Buchmann, Johannes and Vercauteren, Frederik and Preneel, Bart
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: Africacrypt 2010, Springer, Stellenbpsch, South Africa, In: LNCS, 6055, [Conference or Workshop Item]

Heinson, Dennis and Yannikos, York and Franke, Frederik and Winter, Christian and Schneider, Markus (2010):
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, pp. 75–79, 34, (2), DOI: 10.1007/s11623-010-0039-x,
[Article]

Heumann, Thomas and Türpe, Sven and Keller, Jörg
Freiling, Felix (ed.) (2010):
Quantifying the Attack Surface of a Web Application.
In: Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit., Bonner Köllen Verlag, Bonn, In: Lecture Notes in Informatics (LNI), P-170, ISBN 978-3-88579-264-2,
[Conference or Workshop Item]

Hartmann, Frank (2010):
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
TU Darmstadt, [Master Thesis]

Hirzel, Jan and Hartung, Daniel and Busch, Christoph (2010):
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
[Conference or Workshop Item]

Hühnlein, Detlef and Korte, Ulrike and Langer, Lucie and Wiesmaier, Alexander (2009):
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), IEEE Press, DOI: 10.1109/NTMS.2009.5384830,
[Conference or Workshop Item]

Habib, Sheikh Mahbub and Jacob, Cyril and Olovsson, Tomas (2009):
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, pp. 968-975, 4, (10), DOI: 10.4304/jnw.4.10.968-975,
[Article]

Horsch, Moritz (2009):
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
TU Darmstadt, [Master Thesis]

Hornung, Gerrit and Schnabel, Christoph (2009):
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, pp. 115-122, 25, (2), [Article]

Hornung, Gerrit and Schnabel, Christoph (2009):
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, pp. 84-88, 25, (1), [Article]

Hartle, Michael and Fuchs, Andreas and Ständer, Marcus and Schumann, Daniel and Mühlhäuser, Max (2009):
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, pp. 90-111, 2, (1), [Article]

Hartung, Daniel (2009):
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]

Hahn, Timothy and Palmer, Bernard and Waidner, Michael and Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
[Standards, patents]

Hahn, Timothy and Waidner, Michael and Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
[Standards, patents]

Hornung, Gerrit and Knopp, Michael and Laue, Philip and Wilke, Daniel (2008):
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR, pp. 723-728, [Article]

Hollick, Matthias and Mogre, Parag S. and Schott, C. and Steinmetz, Ralf (2007):
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
In: Proceedings of the 15th IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA, [Conference or Workshop Item]

Helbach, Jörg and Krimmer, Robert and Meletiadou, Anastasia and Meissner, Nils and Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, pp. 434-440, 31, (6), [Article]

Hutter, Dieter and Volkamer, Melanie
Clark, John and Paige, Richard and Polack, Fiona and Brooke, Phillip (eds.) (2006):
Information Flow Control to Secure Dynamic Web Service Composition.
In: Security in Pervasive Computing, York, UK, [Conference or Workshop Item]

Hutter, Dieter and Klusch, Matthias and Volkamer, Melanie
Stormer, Henrik and Meier, Andreas and Schumacher, Michael (eds.) (2006):
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
In: Proceedings of the ECEH'06, Freiburg (Schweiz), 91, [Conference or Workshop Item]

Hollick, Matthias and Mogre, Parag S. and Krop, T. and Huth, H.-P. and Schmitt, J. and Steinmetz, Ralf (2005):
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
In: Proceedings of 30th Annual IEEE Conference on Local Computer Networks (LCN2005), Sydney, Australia, [Conference or Workshop Item]

Hansen, Marit and Berlich, Peter and Camenisch, Jan and Clauß, Sebastian and Pfitzmann, Andreas and Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, pp. 35--44, 9, (1), [Article]

Hollick, Matthias and Martinovic, Ivan and Krop, T. and Rimac, I. (2004):
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
In: Proceedings of the 30th EUROMICRO Conference (EUROMICRO 2004), Rennes, France, IEEE Computer Society Press, Los Alamitos, [Conference or Workshop Item]

Hollick, Matthias and Schmitt, J. and Seipl, C. and Steinmetz, Ralf (2004):
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
In: Proceedings of Second International Conference on Wired/Wireless Internet Communications (WWIC 2004), Frankfurt (Oder), Germany, Springer-Verlag Berlin/Heidelberg/New York, [Conference or Workshop Item]

Hollick, Matthias and Krop, T. and Schmitt, J. (2003):
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.
(TR-KOM-2003-02), [Report]

Hollick, Matthias and Steinmetz, Ralf (2002):
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
In: Enterprise Security, IT Verlag fr Informationstechnik GmbH, Höhenkirchen, [Conference or Workshop Item]

Hollick, Matthias and Schmitt, J. (2002):
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
(TR-KOM-2002-11), [Report]

Hollick, Matthias and Rosenow, W. and Bormuth, T. and Steinmetz, Ralf (2001):
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
In: Innovative Anwendungen in Kommunikationsnetzen, Proceedings der 15. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Germany, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Hollick, Matthias and Steinmetz, Ralf (2001):
Security Goals for Service Discovery in Ad-hoc Environments.
In: Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2001), Split, Croatia, FESB-Split, [Conference or Workshop Item]

Hollick, Matthias and Meissner, Andreas and Wolf, L. and Steinmetz, Ralf (2001):
A Security Model for Multicast Group Integrity Management.
In: Poster Session of Third International Workshop on Networked Group Communication, UCL, London, UK, Organised by UCL and COST 264 in cooperation with ACM SIGCOMM, [Other]

Hauser, Ralf and Steiner, Michael and Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, [Conference or Workshop Item]

I

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt, [Master Thesis]

Inostroza, Milton and Tanter, Éric and Bodden, Eric (2011):
Modular Reasoning with Join Point Interfaces.
[Report]

Inostroza, Milton and Tanter, Éric and Bodden, Eric (2011):
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Online-Edition: http://www.bodden.de/pubs/itb11jpi.pdf],
[Conference or Workshop Item]

Ivanova, Vanya (2010):
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt, [Master Thesis]

Israr, Adeel and Shoufan, Abdulhadi and Huss, Sorin (2009):
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
In: IEEE Int. Symposium on Quality Electronic Design, ISQED'09., [Conference or Workshop Item]

J

Jörg, Daubert and Fischer, Mathias and Mühlhäuser, Max and Grube, Tim (2015):
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
IEEE Computer Society, In: International Conference on Networked Systems (NetSys), [Conference or Workshop Item]

Jamison, Emily and Gurevych, Iryna
Aroonmanakun, Wirote and Boonkwan, Prachya and Supnithi, Thepchai (eds.) (2014):
Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
In: Proceedings of the The 28th Pacific Asia Conference on Language, Information and Computing, Department of Linguistics, Chulalongkorn University, Phuket, Thailand, [Online-Edition: http://www.arts.chula.ac.th/~ling/paclic28/program/pdf/479.p...],
[Conference or Workshop Item]

Jamison, Emily and Gurevych, Iryna
Aroonmanakun, Wirote and Boonkwan, Prachya and Supnithi, Thepchai (eds.) (2014):
Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
In: Proceedings of the 28th Pacific Asia Conference on Language, Information and Computing, Department of Linguistics, Chulalongkorn University, Phuket, Thailand, [Online-Edition: http://www.aclweb.org/anthology/Y/Y14/Y14-1030.pdf],
[Conference or Workshop Item]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Jiang, Xuxian and Grace, Michael and Sadeghi, Ahmad-Reza and Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec, ACM, [Conference or Workshop Item]

Jha, Somesh and Katzenbeisser, S. and Schallhart, C. and Veith, H. and Chenney, S. (2010):
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10, (1), [Article]

Jonker, Hugo and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: Proceedings of the 1st international conference on E-voting and identity, Springer-Verlag, Bochum, Germany, In: VOTE-ID'07, 4896, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Jerichow, Anja and Müller, Jan and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, pp. 495--509, April, Special Issue "Cop, [Article]

Janson, Phil and Waidner, Michael (1996):
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, pp. 10--15, 20, (6), [Article]

K

Kohnhäuser, Florian and Stute, Milan and Baumgärtner, Lars and Almon, Lars and Katzenbeisser, Stefan and Hollick, Matthias and Freisleben, Bernd (2017):
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
In: IEEE Conference on Local Computer Networks (LCN), IEEE, Singapore, [Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
In: International Conference on Human-Computer Interaction (HCII), Springer, 10292, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, pp. 24-29, 15, (3), DOI: 10.1109/MSP.2017.70,
[Article]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, [Conference or Workshop Item]

Kolb, Nina
Prinz, Wolfgang and Borchers, Jan and Jarke, Matthias (eds.) (2016):
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
In: Mensch und Computer 2016 - Tagungsband, Gesellschaft für Informatik e.V., Aachen, DOI: 10.18420/muc2016-mci-0075,
[Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, [Conference or Workshop Item]

Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Fischer, Mathias and Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference or Workshop Item]

Kulyk, Oksana and Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Krämer, Juliane and Kiss, Ágnes and Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Kolb, Nina and Diefenbach, Sarah and Niklas, Susanne
Endmann, Anja and Fischer, Holger and Krökel, Malte (eds.) (2015):
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
In: Mensch und Computer 2015 – Usability Professionals, De Gruyter Oldenbourg, Stuttgart, [Conference or Workshop Item]

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, [Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Fischer, Mathias and Mühlhäuser, Max (2015):
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: International Conference in Distributed Computing Systems, IEEE, Columbus, Ohio, ISBN 978-1-4673-7214-5,
[Conference or Workshop Item]

Kulcsar, Geza and Deckwerth, Frederik and Lochau, Malte and Varró, Gergely and Schürr, Andy
Rensink, Arend and Zambon, Eduardo (eds.) (2015):
Improved Conflict Detection for Graph Transformation with Attributes.
In: Graphs as Models, In: Graphs as Models, GaM 2015, In: Electronic Proceedings in Theoretical Computer Science, 181, [Online-Edition: http://dx.doi.org/10.4204/EPTCS.181.7],
[Conference or Workshop Item]

Kulyk, Oksana and Feier, Christian and Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Kolb, Nina and Bartsch, Steffen and Volkamer, Melanie and Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, Springer, Cham, Heraklion, Greece, 8533, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Kong, Joonho and Koushanfar, Farinaz and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, ACM Press, [Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2014):
Automatic protocol selection in secure two-party computations.
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14), [Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33],
[Conference or Workshop Item]

Koeberl, Patrick and Schulz, Steffen and Sadeghi, Ahmad-Reza and Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Kalabis, Lukas and Wolf, Ruben and Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, pp. 512-516, 37, (8), DOI: 10.1007/s11623-013-0209-8,
[Article]

Klose, Robin and Loch, Adrian and Hollick, Matthias (2013):
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
In: Proceedings of the 2nd Workshop of Software Radio Implementation Forum (SRIF 2013), co-located with ACM Sigcomm 2013, [Conference or Workshop Item]

Klose, Robin and Loch, Adrian and Hollick, Matthias (2013):
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
In: Proceedings of the 2013 IEEE International Conference on Sensing, Communication, and Networking (SECON 2013), [Conference or Workshop Item]

Kühne, Alexander and Loch, Adrian and Hollick, Matthias and Klein, Anja (2013):
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
In: Wireless Communications and Networking Conference (WCNC'13), DOI: 10.1109/WCNC.2013.6554877,
[Conference or Workshop Item]

Kocabas, Unal and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference or Workshop Item]

Kauer, Michaela and Günther, Sebastian and Storck, Daniel and Volkamer, Melanie
Marinos, Louis and Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Springer, In: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, In: Lecture Notes in Computer Science, 8030, ISBN ISBN 978-3-642-39345-7,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39345-7_11],
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13), [Other]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), IOS Press, pp. 283-315, 21, (2), [Online-Edition: http://dx.doi.org/10.3233/JCS-130464],
[Article]

Kauer, M. and Franz, B. and Pfeiffer, T. and Heine, M. and Christin, Delphine (2013):
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
In: Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress), [Conference or Workshop Item]

Katzenbeisser, Stefan and Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885, [Article]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, pp. 305-308, 35, (4), [Article]

Knauer, Julian and Baier, Harald (2012):
Zur Sicherheit von ATA-Festplattenpasswörtern.
In: DACH Security 2012, [Conference or Workshop Item]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Kelbert, Florian and Shirazi, Fatemeh and Simo, Hervais and Wüchner, Tobias and Buchmann, Johannes and Pretschner, Alexander and Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, pp. 189-279, [Book Section]

Katzenbeisser, Stefan and Kocabaş, Ünal and Rožic, Vladimir and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 7428, [Conference or Workshop Item]

Kononenko, Kirill (2012):
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
In: International Conference on Mobile Computing and Networking, [Conference or Workshop Item]

Kiefer, Franziskus and Wiesmaier, Alexander and Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12), Las Vegas, USA, [Conference or Workshop Item]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: Sicherheit, GI, Darmstadt, Germany, In: LNI, 195, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Kalabis, Lukas and Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, pp. 670--675, 36, (9), DOI: 10.1007/s11623-012-0224-1,
[Article]

Kauer, Michaela and Kiesel, Florian and Ueberschaer, Felix and Volkamer, Melanie and Bruder, Ralph
Jähnke, Jochen and Mühlen, Nicolas von zur and Rechert, Klaus and Suchodoletz, Dirk von (eds.)
Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, Berlin, Duncker & Humblot, pp. 215-220, [Book Section]

Kocabaş, Ünal and Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Springer, In: LNCS, [Conference or Workshop Item]

Kneževic, M. and Kobayashi, K. and Ikegami, J. and Matsuo, S. and Satoh, A. and Kocabas, U. and Fan, J. and Katashita, T. and Sugawara, T. and Sakiyama, K. and Verbauwhede, I. and Ohta, K. and Homma, N. and Aoki, T. (2011):
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal, [Article]

Karuppayah, Shankar and Samad, Fahad (2011):
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
In: Lecture Notes in Informatics GI-Edition, pp. 279-282, S-10, (Informatiktage 2011), [Article]

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Schröder, Heike and Wachsmann, Christian (2011):
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 6917, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, pp. 177-186, 1, (3), [Article]

Kinder, J. and Katzenbeisser, S. and Schallhart, C. and Veith, H. (2010):
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing, [Article]

Kasper, Michael and Schindler, Werner and Stoettinger, Marc (2010):
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implementations.
In: Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010, [Conference or Workshop Item]

Kasper, Michael and Schindler, Werner and Stöttinger, Marc (2010):
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implemenations.
In: Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010, [Conference or Workshop Item]

Krumov, Lachezar and Schweizer, Immanuel and Bradler, Dirk and Strufe, Thorsten (2010):
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: IEEE Globecom, DOI: 10.1109/GLOCOM.2010.5683139,
[Conference or Workshop Item]

Krumov, Lachezar and Schweizer, Immanuel and Bradler, Dirk and Strufe, Thorsten (2010):
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom, pp. to appear, [Article]

Kim, Chang Hwan Peter and Bodden, Eric and Batory, Don and Khurshid, Sarfraz (2010):
Reducing Configurations to Monitor in a Software Product Line.
Springer, In: 1st International Conference on Runtime Verification (RV), In: LNCS, 6418, [Online-Edition: http://www.bodden.de/pubs/kbbk10reducing.pdf],
[Conference or Workshop Item]

Kinder, Johannes and Veith, Helmut
Bloem, Roderick and Sharygina, Natasha (eds.) (2010):
Precise Static Analysis of Untrusted Driver Binaries.
In: Proceedings of the 10th International Conference on Formal Methods in Computer-Aided Design (FMCAD 2010), IEEE Computer Society, [Conference or Workshop Item]

Katzenbeisser, Stefan and Liu, Huajian and Steinebach, Martin
Li, Chang-Tsun (ed.) (2010):
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
Idea Group Reference, pp. 155-175, [Book Section]

Kiefer, Franziskus (2010):
Effiziente Implementierung des PACE- und EACProtokolls für mobile Geräte.
TU Darmstadt, [Master Thesis]

Kern, Oliver and Ranade, Kedar and Seyfarth, Ulrich (2010):
Complete sets of cyclic mutually unbiased bases in even prime-power dimensions.
In: J. Phys. A, pp. 5305--5321, 43, (27), DOI: 10.1088/1751-8113/43/27/275305,
[Article]

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, [Conference or Workshop Item]

Karatsiolis, Vangelis and Langer, Lucie and Schmidt, Axel and Tews, Erik and Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]

Khelil, Abdelmajid and Germanus, Daniel and Suri, Neeraj (2010):
Protection of SCADA Communication Channels.
Springer, [Book Section]

Kobayashi, K. and Ikegami, J. and Kneževic, M. and Guo, X. and Matsuo, S. and Huang, S. and Nazhandali, L. and Kocabas, U. and Fan, J. and Satoh, A. and Verbauwhede, I. and Sakiyama, K. and Ohta, K. (2010):
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
In: IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63, [Conference or Workshop Item]

Khelil, Abdelmajid and Jeckel, Sebastian and Germanus, Daniel and Suri, Neeraj (2010):
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
In: Proc. of The 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT), [Conference or Workshop Item]

Khalilbeigi, Mohammadreza and Bradler, Dirk and Schweizer, Immanuel and Probst, Florian and Steimle, Jürgen (2010):
Towards Computer Support of Paper Workflows in Emergency Management.
In: 7th International Conference on Information Systems for Crisis Response and Management, Seattle, Washington, USA, [Conference or Workshop Item]

Kemetmüller, Christoph and Seeger, Mark and Baier, Harald and Busch, Christoph (2010):
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
In: Eighth International Network Conference (INC 2010), [Conference or Workshop Item]

Kevenaar, Tom and Korte, Ulrike and Merkle, Johannes and Niesing, Matthias and Ihmor, Heinrich and Busch, Christoph and Zhou, Xuebing (2010):
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.
[Conference or Workshop Item]

Krumov, Lachezar and Andreeva, Adriana and Strufe, Thorsten (2010):
Resilient Peer-to-Peer Live-Streaming using Motifs.
In: 11th IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), [Conference or Workshop Item]

König, André and Seither, Daniel and Hollick, Matthias and Steinmetz, Ralf (2009):
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
In: Proceedings of IEEE GLOBECOM 2009, [Conference or Workshop Item]

Katzenbeisser, Stefan and Kursawe, Klaus and Stumpf, Frederic (2009):
Revocation of TPM Keys.
In: Second International Conference on Trusted Computing (TRUST 2009), [Conference or Workshop Item]

Kallel, Slim and Charfi, Anis and Mezini, Mira and Klose, Karl and Jmaiel, Mohamed (2009):
From Formal Access Control Policies to Runtime Enforcement Aspects.
In: Proc. of the International Symposium on Engineering Secure Software and Systems (ESSOS), Springer Verlag, Leuven, Belgium, ISBN 978-3-642-00198-7,
DOI: 10.1007/978-3-642-00199-4_2,
[Conference or Workshop Item]

Kinder, Johannes and Veith, Helmut and Zuleger, Florian (2009):
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
In: Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2009), Springer, In: Lecture Notes in Computer Science, 5403, DOI: 10.1007/978-3-540-93900-9_19,
[Conference or Workshop Item]

König, A. and Hollick, Matthias and Steinmetz, R. (2009):
An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract).
In: Proceedings of the 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop Visions of Future Generation Networks (EuroView2009), Würzburg, Germany, [Conference or Workshop Item]

König, A. and Hollick, Matthias and Steinmetz, R. (2009):
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
In: Procedings of the IEEE International Conference on Communications (IEEE ICC 2009), Dresden, Germany, IEEE Computer Society Press, [Conference or Workshop Item]

Kern, Oliver (2009):
Randomized Dynamical Decoupling Strategies and Improved One-Way Key Rates for Quantum Cryptography.
TU-Darmstadt, [Ph.D. Thesis]

König, André and Gottron, Christian and Hollick, Matthias and Steinmetz, Ralf (2008):
Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes.
In: Procedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2008), Atlanta, USA, IEEE Computer Society Press, [Conference or Workshop Item]

Killmann, Wolfgang and Schindler, Werner
Oswald, E. and Rohatgi, P. (eds.) (2008):
A Design for a Physical RNG with Robust Entropy Estimators.
In: Cryptographic Hardware and Embedded Systems, CHES 2008, Springer, Berlin, In: LNCS, [Conference or Workshop Item]

König, André and Hollick, Matthias and Steinmetz, Ralf (2008):
Security for Future Wireless and Decentralized Communication Networks - Harnessing Cooperation, Space, and Time.
In: Proceedings of the 8th Wuerzburg Workshop on IP: Joint EuroNF, ITC, and ITG Workshop "Visions of Future Generation Networks" (EuroView2008), [Conference or Workshop Item]

Kinder, Johannes and Veith, Helmut (2008):
Jakstab: A Static Analysis Platform for Binaries.
In: Proceedings of the 20th International Conference on Computer Aided Verification (CAV 2008), Springer, 5123, [Conference or Workshop Item]

König, A. and Hollick, Matthias and Krop, T. and Steinmetz, R. (2008):
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
In: Security and Communication Networks (SCN), Wiley, pp. 271--288, 2, [Article]

Krimmer, Robert and Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimmer, Robert and Volkamer, Melanie
Krishna, Jaya and Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: E-Voting - Perspectives and Experiences, In: The Icfai University Press, [Conference or Workshop Item]

Krimm, Rüdiger and Volkamer, Melanie (2008):
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008, Boorberg Verlag, [Conference or Workshop Item]

Krop, T. and Bredel, M. and Hollick, Matthias and Steinmetz, Ralf (2007):
JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks.
In: Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2007) co-located with ACM MobiCom 2007, Montreal, Canada, [Conference or Workshop Item]

König, André and Hollick, Matthias and Ackermann, R. and Steinmetz, R. (2007):
Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach.
In: Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security, Nova Science Publishers, [Conference or Workshop Item]

Kutscher, Dirk and Ott, Jörg and Bartsch, Steffen (2007):
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, p. 225, 24, (4), DOI: 10.1108/10650740710834626,
[Article]

Krimmer, Robert and Triessnig, Stefan and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: E-Voting and Identity, First International Conference, VOTE-ID 2007, Springer-Verlag, Bochum, Germany, In: VOTE-ID'07, 4896, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

König, A. and Hollick, Matthias and Schmitt, J. and Steinmetz, R. (2006):
Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract).
In: Proceedings of 2. Essener Workshop zu Neuen Herausforderungen in der Netzsicherheit (EWNS 2006), Essen, Germany, [Conference or Workshop Item]

Krop, T. and Widmer, J. and Hollick, Matthias and Prehofer, C. and Steinmetz, Ralf (2006):
Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post).
In: Proceedings of Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Montreal, Canada, [Conference or Workshop Item]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, Springer-Verlag, Berlin, [Conference or Workshop Item]

Krop, T. and Hollick, Matthias and Krist, F. and Mogre, Parag S. and Steinmetz, R. (2005):
Modeling Static and Dynamic Behavior of Routes in Mobile Ad hoc Networks (Extended Abstract and Poster).
In: Proceedings of ACM MobiCom 2005, Köln, Germany, [Conference or Workshop Item]

Krimmer, Robert and Volkamer, Melanie
Schweighöfer, Erich and Liebwald, Doris and Augeneder, Silvia and Menzel, Thomas (eds.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, In: Boorberg Verlag, [Conference or Workshop Item]

Krimmer, Robert and Volkamer, Melanie (2005):
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
In: Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005, Kopenhagen, 13, [Conference or Workshop Item]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Krop, T. and Kappes, M. and Hollick, Matthias (2005):
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
In: Proceedings of Kommunikation in Verteilten Systemen (KiVS 2005), Workshop Peer-to-Peer-Systeme und -Anwendungen, Kaiserslautern, Germany, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, pp. 3--9, 27, (1), [Article]

Karjoth, Günter and Waidner, Michael (2004):
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, pp. 18--21, 4, (1), [Article]

Karjoth, Günter and Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)), [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001, Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Keller, Ludwig and Kottmann, Dietmar and Waidner, Michael (1994):
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.
[Report]

L

Lettner, Julian and Kollenda, Benjamin and Homescu, Andrei and Larsen, Per and Schuster, Felix and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Conference or Workshop Item]

Larsen, Per and Brunthaler, Stefan and Davi, Lucas and Sadeghi, Ahmad-Reza and Franz, Michael (2015):
Automated Software Diversity.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Lilien, Leszek and Othmane, Lotfi Ben and Angin, Pelin and Bhargava, Bharat and Salih, Raed and DeCarlo, Andrew (2015):
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
In: Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW), [Conference or Workshop Item]

Luna, Jesus and Suri, Neeraj and Iorga, Michaela and Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York, [Conference or Workshop Item]

Loruenser, Thomas and Rodriguez, Charles Bastos and Demirel, Denise and Fischer-Hübner, Simone and Gross, Thomas R. and Langer, Thomas and des Noes, Mathieu and Poehls, Henrich and Rozenberg, Boris and Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
TU Darmstadt, [Master Thesis]

Loch, Adrian and Quesada, Pablo and Hollick, Matthias and Kühne, Alexander and Klein, Anja (2014):
Building Cross-Layer Corridors in Wireless Multihop Networks.
In: 11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2014), DOI: 10.1109/MASS.2014.19,
[Conference or Workshop Item]

Loch, Adrian and Hong, Wei-Chih and Hollick, Matthias (2014):
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
In: 39th IEEE Conference on Local Computer Networks (LCN), DOI: 10.1109/LCN.2014.6925754,
[Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Kühne, A. and Klein, A. (2014):
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN 2014), [Conference or Workshop Item]

Loch, Adrian and Schulz, Matthias and Hollick, Matthias (2014):
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
In: Proceedings of the 3rd Workshop of Software Radio Implementation Forum (SRIF 2014), co-located with ACM Sigcomm 2014, [Conference or Workshop Item]

Loch, Adrian and Meier, David and Hollick, Matthias (2014):
How did you get here? PHY-Layer Path Signatures.
In: Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Nitsche, Thomas and Widmer, J. and Kühne, A. and Klein, A. (2014):
Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), DOI: 10.1109/WoWMoM.2014.6918922,
[Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Kühne, A. and Klein, A. (2014):
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), DOI: 10.1109/WoWMoM.2014.6919011,
[Conference or Workshop Item]

Liu, Huajian and Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Watermarking Textures in Video Games.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, [Conference or Workshop Item]

Li, Li and Bartel, Alexandre and Klein, Jacques and Traon, Yves Le and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and McDaniel, Patrick (2014):
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Online-Edition: http://www.abartel.net/static/p/tr-iccta.pdf],
[Report]

Loch, Adrian and Klose, Robin and Hollick, Matthias and Kuehne, Alexander and Klein, Anja (2013):
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013, Demo Session), [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias and Nitsche, Thomas and Widmer, Jörg and Kuehne, Alexander and Klein, Anja (2013):
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013), [Conference or Workshop Item]

Loch, Adrian and Hollick, Matthias (2013):
Face the Enemy: Attack Detection for Planar Graph Routing.
In: Proceedings of the 2013 Conference on Networked Systems (NetSys 2013), [Conference or Workshop Item]

Loch, Adrian and Frey, Hannes and Hollick, Matthias (2013):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing, DOI: 10.1016/j.pmcj.2013.03.004,
[Article]

Liu, H. and Li, Y. and Steinebach, M. (2013):
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
In: Proceeding of 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security -- CMS'2013, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Luna, Jesus and Vateva-Gurova, Tsvetoslava and Suri, Neeraj and Rak, Massimiliano and Liccardo, Loredana (2013):
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
In: Proc. of the International Conference on Cloud Computing and Services Science (CLOSER), [Conference or Workshop Item]

Lauinger, Tobias and Laoutaris, Nikolaos and Rodriguez, Pablo and Strufe, Thorsten and Biersack, Ernst and Kirda, Engin (2012):
Privacy Risks in Named Data Networking: What is the Cost of Performance?
DOI: 2378956.2378966,
[Other]

Lauinger, Tobias and Laoutaris, Nikolaos and Rodriguez, Pablo and Strufe, Thorsten and Biersack, Ernst and Kirda, Engin (2012):
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.
(0812-001), [Report]

Liu, Huajian and Steinebach, Martin (2012):
Improved Fourier domain template and patchwork embedding using spatial masking.
In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, In: Proceedings of SPIE, [Conference or Workshop Item]

Luna, Jesus and Langenberg, Robert and Suri, Neeraj (2012):
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees.
In: Proc. of the ACM Cloud Computing Security Workshop, [Conference or Workshop Item]

Luna, Jesus and Suri, Neeraj and Krontiris, Ioannis (2012):
Privacy-by-Design Based on Quantitative Threat Modeling.
In: Proc. of 7th Intl Conference on Risks and Security of Internet and Systems (CRISIS), [Conference or Workshop Item]

Luna, Jesus and Ghani, Hamza and Vateva-Gurova, Tsvetoslava and Suri, Neeraj (2012):
Quantitative Assessment of Cloud Security Level Agreements: A Case Study.
In: Proc. of International Conference on Security and Cryptography (SECRYPT), [Conference or Workshop Item]

Lam, Patrick and Bodden, Eric and Lhotak, Ondrej and Hendren, Laurie (2011):
The Soot framework for Java program analysis: a retrospective.
In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011), [Online-Edition: http://www.bodden.de/pubs/lblh11soot.pdf],
[Conference or Workshop Item]

Likavec, Lena (2011):
Application of Lattice Basis Reduction.
TU Darmstadt, [Master Thesis]

Lux, Alexander and Starostin, Artem (2011):
A Tool for Static Detection of Timing Channels in Java.
In: 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, [Conference or Workshop Item]

Li, Shujun and Sadeghi, Ahmad-Reza and Heisrath, Soeren and Schmitz, Roland and Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC), St. Lucia, [Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander and Buchmann, Johannes (2011):
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, pp. 14-15, (7), [Article]

Lindner, Richard and Peikert, Chris (2011):
Better Key Sizes (and Attacks) for LWE-Based Encryption.
In: CT-RSA 2011, [Conference or Workshop Item]

Lux, Alexander and Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Other]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010), [Conference or Workshop Item]

Löhr, Hans and Pöppelmann, Thomas and Rave, Johannes and Steegmanns, Martin and Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Lux, Alexander and Mantel, Heiko and Perner, Matthias and Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Report]

Liu, Y. and Ghosal, D. and Armknecht, F. and Sadeghi, A. and Schulz, S. and Katzenbeisser, S. (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding (IH 2010), Springer, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2010):
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
[Report]

Löhr, Hans and Sadeghi, Ahmad-Reza and Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),, [Conference or Workshop Item]

Langer, Lucie and Volkamer, Melanie and Schmidt, Axel and Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference or Workshop Item]

Langer, Lucie and Jonker, Hugo and Pieters, Wolter (2010):
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
In: ICICS, Barcelona, Spain, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, [Conference or Workshop Item]

Langer, Lucie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie and Volkamer, Melanie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes
Davies, Jim and Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, 322, [Conference or Workshop Item]

Lodrova, Dana and Busch, Christoph and Tabassi, Elham and Krodel, Wolfgang and Drahansky, Martin (2009):
Semantic Conformance Testing Methodology for Finger Minutiae Data.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications, ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander (2009):
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
In: 8th European Conference on Digital Archiving (ECA2010), Geneva, Switzerland, [Conference or Workshop Item]

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: European Symposium on Research in Computer Security (ESORICS), Springer, In: LNCS, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4, [Article]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander (2009):
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
[Report]

Löhr, Hans and Sadeghi, Ahmad-Reza and Stüble, Christian and Weber, Marion and Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: Proceedings of the 2nd International Conference on Trusted Computing, Springer, In: LNCS, 5471, [Conference or Workshop Item]

Löhr, Hans and Sadeghi, Ahmad-Reza and Vishik, Claire and Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: 5th Information Security Practice and Experience Conference (ISPEC'09), Springer, In: LNCS, 5451, [Conference or Workshop Item]

Liu, Huajian and Steinebach, Martin and Schneider, Marcel (2009):
Efficient watermark embedding for web images.
In: Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2009):
From Student Smartcard Applications to the German Electronic Identity Card.
In: ECEG09, ACI, ISBN 978-1-906638-34-4,
[Conference or Workshop Item]

Langer, Lucie and Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
In: IRIS 2009, [Conference or Workshop Item]

Langer, Lucie and Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9, [Article]

Langer, Lucie (2009):
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement, Practical studies in e-Governement, [Book Section]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Prosser, Alexander and Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, OCG Verlag, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Lacoste, Gérard and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Lacoste, Gérard and Waidner, Michael (2000):
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press, pp. 147--157, [Article]

Lukat, Jörg and Pfitzmann, Andreas and Waidner, Michael (1991):
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, pp. 71--75, 15, (2), [Article]

M

Mantel, Heiko and Weber, Alexandra and Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, Vienna, Austria, In: CCS '16, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Mohan, Vaishnavi and Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), [Conference or Workshop Item]

McGrew, David and Kampanakis, Panos and Fluhrer, Scott and Gazdag, Stefan-Lukas and Butin, Denis and Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016), Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, 1575, [Conference or Workshop Item]

McLaughlin, Stephen and Konstantinou, Charalambos and Wang, Xueyang and Davi, Lucas and Sadeghi, Ahmad-Reza and Maniatakos, Michail and Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP, (99), DOI: 10.1109/JPROC.2015.2512235,
[Article]

Mayer, Peter and Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: Proceedings of the 31st Annual Computer Security Applications Conference, ACM, Los Angeles, CA, USA, In: ACSAC 2015, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Maass, Max and Müller, Uwe and Schons, Tom and Wegemer, Daniel and Schulz, Matthias (2015):
NFCGate: An NFC Relay Application for Android.
In: Proceedings of the 8th ACM Conference on Security \& Privacy in Wireless and Mobile Networks, In: ACM WiSec'15, New York, June 24-26th, 2015, In: WiSec, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/5414/],
[Conference or Workshop Item]

Maseberg, Sönke and Bodden, Eric and Kus, Mehmet and Brucker, Achim and Rasthofer, Siegfried and Berger, Bernhard and Huber, Stephan and Sohr, Karsten and Gerber, Paul and Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Mannes, Elisa and Maziero, Carlos A. and Lassance, Luiz Carlos and Borges, Fábio (2015):
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks.
In: ISCC 2015 - The Twentieth IEEE Symposium on Computers and Communications, IEEE, Larnaca, Cyprus, [Conference or Workshop Item]

Mayer, Peter and Volkamer, Melanie and Kauer, Michaela
Prakash, Atul and Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Information Systems Security : International Conference on Information Systems Security (ICISS), Berlin, Cham, Springer International Publishing, In: International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, In: Lecture notes in computer science, 8880, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
TU Darmstadt, [Master Thesis]

Mustafa, Hossen and Sadeghi, Ahmad-Reza and Schulz, Steffen and Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Mannes, Elisa and Maziero, Carlos and Lassance, Luiz Carlos and Borges, Fábio (2014):
Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação.
In: XIV Brazilian Symposium on Information Security and Computer Systems (SBSeg), Belo Horizonte - Brazil, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Moecke, Cristian Thiago and Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, pp. 41-52, 21, DOI: 10.1108/09685221311314419,
[Article]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Applied Cryptography and Network Security, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Moecke, Cristian Thiago and Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85, DOI: 10.1108/09685221311314419,
[Article]

Meziani, Mohammed and Hoffmann, Gerhard and Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: AfricaCrypt 2012, Springer, Al Akhawayn University, Ifran, Morocco, In: LNCS, [Conference or Workshop Item]

Meziani, Mohammed and El Bansarkhani, Rachid (2012):
An Efficient and Secure Coding-based Authenticated Encryption.
In: 7th DPM International Workshop on Data Privacy Management (DPM 2012), Springer, Pisa, Italy, In: LNCS, [Conference or Workshop Item]

Mittelbach, Arno (2012):
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Security and Cryptography for Networks, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Martucci, Leonardo and Zuccato, Albin and Smeets, Ben and Habib, Sheikh Mahbub and Johansson, Thomas and Shahmehri, Nahid (2012):
Privacy, Security and Trust in Cloud Computing-- The Perspective of the Telecommunication Industry.
In: 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012, IEEE, Fukuoka, ISBN 978-1-4673-3084-8,
DOI: 10.1109/UIC-ATC.2012.166,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno University, Czech Republic, In: Communications in Computer and Information Science, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno, Czech Republic, In: Communications in Computer and Information Science, 200, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Martucci, Leonardo and Fischer-Hübner, Simone
Poblet, Marta (ed.) (2011):
Privacy for Reporters of Human Rights Abuses [to appear].
In: Mobile Technologies for Conflict Management. New Avenues for Online Dispute Resolution, Springer, [Book Section]

Meziani, M. and Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis (2011):
Hash Functions Based on Coding Theory.
In: 2nd Workshop on Codes, Cryptography and Communication Systems (WCCCS 2011), [Conference or Workshop Item]

Martucci, Leonardo and Ries, Sebastian and Mühlhäuser, Max (2011):
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services.
In: Journal of Information Processing, pp. 317-331, 19, [Article]

McHardy, Patrick and Schuler, Andreas and Tews, Erik (2011):
Interactive decryption of DECT phone calls.
In: Fourth ACM Conference on Wireless Network Security (WiSec '11), Hamburg, [Conference or Workshop Item]

Mönkehues, Stephan (2011):
SWIFFT-Modifikationen, Korrektur von Operm5.
TU Darmstadt, [Master Thesis]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, Darmstadt, [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2011):
A Novel Network Platform for Secure and Efficient Malware Collection based on Reconfigurable Hardware Logic.
In: World Congress on Internet Security (WorldCIS 2011), [Conference or Workshop Item]

Mitschke, Ralf and Sewe, Andreas and Mezini, Mira (2011):
Magic for the Masses: Safer High-level Low-level Programming through Customizable Static Analyses.
In: Proceedings of the 1st workshop on Modularity in Systems Software, In: First workshop on Modularity in Systems Software, Porto de Galinhas, Brazil, 22 Mar 2011, In: ACM Digital Library, [Online-Edition: http://dx.doi.org/10.1145/1960518.1960522],
[Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2011):
NetStage/DPR: A Self-Adaptable FPGA Platform for Application-Level Network Security.
In: 7th International Symposium on Applied Reconfigurable Computing (ARC 2011), [Conference or Workshop Item]

Milde, Benjamin and Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011, [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2011):
A Scalable Multi-FPGA Platform for Complex Networking Applications.
In: 19th Annual IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM 2011), [Conference or Workshop Item]

Malipatlolla, Sunil and Huss, Sorin (2011):
A Novel Method for Secure Intellectual Property Deployment in Embedded Systems.
In: VII Southern IEEE International Conference on Prgrammable Logic, [Conference or Workshop Item]

Molter, Gregor and Stoettinger, Marc and Shoufan, Abdulhadi and Strenzke, Falko (2011):
A Simple Power Analysis Attack on a McEliece Cryptoprocessor.
In: Journal of Cryptographic Engineering, [Article]

Müller, S. and Katzenbeisser, Stefan (2011):
Hiding the Policy in Cryptographic Access Control.
In: International Workshop on Security and Trust Management (STM 2011), Springer, [Conference or Workshop Item]

Molter, Gregor and Seffrin, André and Huss, Sorin (2011):
State Space Optimization within the DEVS Model of Computation for Timing Efficiency.
In: 19th IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC'11), [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36, [Article]

Mantel, Heiko and Sands, David and Sudbrock, Henning (2011):
Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, [Conference or Workshop Item]

Milman, Ivan and Wolfson, Charles and Schunter, Matthias and Hinton, Heather and Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
[Standards, patents]

Meziani, Mohammed and Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
2SC: An Efficient Code-Based Stream Cipher.
In: ISA, Springer, 200, [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2010):
An FPGA-based Scalable Platform for High-Speed Malware Collection in Large IP Networks.
In: 2010 International Conference on Field Programmable Technology (FPT 2010), [Conference or Workshop Item]

Mühlbach, Sascha and Koch, Andreas (2010):
A Dynamically Reconfigured Network Platform for High-Speed Malware Collection.
In: 2010 International Conference on ReConFigurable Computing and FPGAs (ReConFig 2010), [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav
Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, Springer, Seoul, Korea, Lecture Notes in Computer, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Bulygin, Stanislav and Ding, Jintai and Buchmann, Johannes and Werner, Fabian
Heng, S.-H. and Wright, R. N. and Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), Springer, Kuala Lumpur, Malaysia, In: Lecture Notes in Computer Science, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Müller, Jürgen and Massoth, Michael (2010):
Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony.
In: International Journal on Advances in Telecommunications, pp. 193--202, 3, (3&4), [Article]

Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Kohler, Jonathan and Carlos, Marcelo Carlomagno (2010):
Uma ICP baseada em certificados digitais autoassinados.
In: X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, [Conference or Workshop Item]

Madlener, Felix and Weingart, Julia and Huss, Sorin (2010):
Verification of Dynamically Reconfigurable Embedded Systems by Model Transformation Rules.
In: 4th IEEE/ACM International Conference on Hardware-Software Codesign and System Synthesis (CODES+ISSS 2010), part of the Embedded Systems Week, [Conference or Workshop Item]

Mink, Martin and Greifeneder, Rainer
Rannenberg, Kai and Varadharajan, Vijay and Weber, Christian (eds.) (2010):
Evaluation of the Offensive Approach in Information Security Education.
In: Proceedings of the 25th IFIP TC11 International Information Security Conference, SEC 2010, Springer, [Conference or Workshop Item]

Malipatlolla, Sunil and Huss, Sorin (2010):
A Novel Technique for FPGA IP Protection.
In: Systems and Network Security Doctoral Workshop, 55th International Scientific Colloquium (IWK 2010), TU Ilmenau, [Conference or Workshop Item]

Mühlbach, Sascha and Brunner, Martin and Roblee, Christopher and Koch, Andreas (2010):
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot using Reconfigurable Technology.
In: 20th International Conference on Field Programmable Logic and Applications (FPL 2010), [Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Kleinjung, Thorsten and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Meziani, Mohammed and Cayrel, Pierre-Louis (2010):
Multi-Signature Scheme based on Coding Theory.
In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", 63 March 2010, [Conference or Workshop Item]

Müller, Sascha and Katzenbeisser, Stefan (2010):
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Press, [Book Section]

Miede, André and Ackermann, Tobias and Repp, Nicolas and Abawi, Daniel and Steinmetz, Ralf and Buxmann, Peter
Schumann, Matthias and Kolbe, Lutz and Breitner, Michael and Frerichs, Arne (eds.) (2010):
Attacks on the Internet of Services – The Security Impact of Cross-organizational Service-based Collaboration.
In: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI) 2010, Göttingen, Germany, [Conference or Workshop Item]

Massoth, Michael and Acker, Robin and Moore, Ronald (2010):
Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen.
In: Querschnitt, [Article]

Mogre, Parag S. and d'Heureuse, N. and Hollick, Matthias and Steinmetz, R. (2010):
CORE: Centrally Optimized Routing Extensions for Efficient Bandwidth Management and Network Coding in the IEEE 802.16 MeSH Mode.
In: Wireless Communications and Mobile Computing, [Article]

Müller, Jürgen and Massoth, Michael (2010):
Defense Against Direct Spam Over Internet Telephony by Caller Pre-Validation.
In: Proceedings of the 6th Advanced International Conference on Telecommunications (AICT'10), IEEE, DOI: 10.1109/AICT.2010.40,
[Conference or Workshop Item]

Mantel, Heiko and Sudbrock, Henning (2010):
Flexible Scheduler-independent Security.
In: European Symposium on Research in Computer Security (ESORICS), Springer, In: LNCS 6345, [Conference or Workshop Item]

Mogre, Parag S. and Graffi, K. and Hollick, Matthias and Steinmetz, R. (2010):
A Security Framework for Wireless Mesh Networks.
In: Wireless Communications and Mobile Computing, [Article]

Mahmudimanesh, Mohammadreza and Khelil, Abdelmajid and Suri, Neeraj (2010):
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks.
In: The Third IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), [Conference or Workshop Item]

Müller, Jürgen and Massoth, Michael (2010):
Abwehr von Direct Spam over Internet Telephony mittels Anrufer Pre-Validierung.
In: Technologien und Anwendungen - Vorträge der 15. ITG-Fachtagung, [Conference or Workshop Item]

Martucci, Leonardo and Ries, Sebastian and Mühlhäuser, Max (2010):
Identifiers, Privacy and Trust in the Internet of Services.
In: Proceedings {o}f the 4th {IFIP} {I}nternational {C}onference on {T}rust {M}anagement ({IFIPTM} 2010), [Conference or Workshop Item]

Madlener, Felix and Stoettinger, Marc and Huss, Sorin (2009):
Novel Hardening Techniques against Differential Power Analysis for Multiplication in GF(2^n).
In: IEEE International Conference on Field-Programmable Technology (ICFPT'09), DOI: 10.1109/FPT.2009.5377676,
[Conference or Workshop Item]

Molter, Gregor and Madlener, Felix and Huss, Sorin (2009):
A System Level Design Flow for Embedded Systems based on Model of Computation Mappings.
In: 4th IFAC Workshop on Discrete-Event System Design (DESDes'09), [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes and Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: Cryptology and Network Security, 8th International Conference, CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Madlener, Felix and Huss, Sorin and Biedermann, Alexander (2009):
RecDEVS: A Comprehensive Model of Computation for Dynamically Reconfigurable Hardware Systems.
In: 4th IFAC Workshop on Discrete-Event System Design (DESDes'09), [Conference or Workshop Item]

Molter, Gregor and Seffrin, André and Huss, Sorin (2009):
DEVS2VHDL: Automatic Transformation of XML-specified DEVS Model of Computation into Synthesizable VHDL Code.
In: 12th IEEE Forum on Specification and Design Languages (FDL 2009), [Conference or Workshop Item]

Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference or Workshop Item]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, pp. 803-819, 46, (4), [Article]

Madlener, Felix and Molter, Gregor and Huss, Sorin (2009):
SC-DEVS: An efficient SystemC Extension for the DEVS Model of Computation.
In: ACM/IEEE Design Automation and Test in Europe (DATE'09), In: https://www.date-conference.com/proceedings-archive/PAPERS/2009/DATE09/PDFFILES/11.6_4.PDF, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Schwingenschlögl, C. and Ziller, A. and Steinmetz, R.
Katz, Marcos and Fitzek, Frank (eds.) (2009):
WiMAX Mesh Architectures and Network Coding.
In: WiMAX Evolution: Emerging Technologies and Applications, Wiley, pp. 145--162, [Book Section]

Mogre, Parag S. and Hollick, Matthias and Steinmetz, R. and Dadia, V. and Sengupta, S. (2009):
Distributed Bandwidth Reservation Strategies to Support Efficient Bandwidth Utilization and QoS on a Per-Link Basis in IEEE 802.16 Mesh Networks.
In: Proceedings of the 34th IEEE Conference on Local Computer Networks (IEEE LCN 2009), Zurich, Switzerland, IEEE Communications Society, [Conference or Workshop Item]

Myhr, Geir Ove and Renes, Joseph and Doherty, Andrew and Lütkenhaus, Norbert (2009):
Symmetric extension in two-way quantum key distribution.
In: Phys. Rev. A 79, 042329, [Article]

Mogre, Parag S. and Hollick, Matthias and Dimitrov, S. and Steinmetz, R. (2009):
Incorporating Spatial Reuse into Algorithms for Bandwidth Management and Scheduling in IEEE 802.16j Relay Networks.
In: Proceedings of the 34th IEEE Conference on Local Computer Networks (IEEE LCN 2009), Zurich, Switzerland, IEEE Communications Society, [Conference or Workshop Item]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: International Conference on lnformation Security and Cryptology (ICISC 2008), [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Kropff, M. and Steinmetz, R. and Schwingenschlögl, C. (2008):
A Note on Practical Deployment editions for Network Coding in the IEEE 802.16 MeSH Mode.
In: Proceedings of the 1st IEEE International Workshop on Wireless Network Coding (IEEE WiNC 2008) co-located with IEEE SECON 2008, San Francisco, USA, [Conference or Workshop Item]

Mogre, Parag S. and Graffi, K. and Hollick, Matthias and Steinmetz, R. (2007):
AntSec, WatchAnt and AntRep:Innovative Security Mechanisms for Wireless Mesh Networks.
In: Proceedings of the 32nd IEEE Conference on Local Computer Networks (IEEE LCN 2007), Dublin, Ireland, [Conference or Workshop Item]

Mogre, Parag S. and Hollick, Matthias and Steinmetz, R. (2007):
QoS in Wireless Mesh Networks: Challenges, Pitfalls and Roadmap to its Realization (Keynote Paper).
In: Proceedings of the 17th International Workshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV 2007), Urbana-Champaign, IL, USA, [Conference or Workshop Item]

Mogre, Parag S. and d'Heureuse, N. and Hollick, Matthias and Steinmetz, R. (2007):
A Case for Joint Routing and Scheduling and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach (Extended Abstract and Poster).
In: Proceedings of IEEE MASS 2007, Pisa, Italy, [Conference or Workshop Item]

Masip-Bruin, X. and Yannuzzi, M. and Domingo-Pascual, J. and Fonte, A. and Curado, M. and Monteiro, E. and Kuipers, F. and Van Mieghem, P. and Avallone, S. and Ventre, G. and Aranda-Gutierrez, P. and Hollick, Matthias and Steinmetz, R. and Iannone, L. and Salamatian, K. (2006):
QoS Routing Open Agenda.
In: Computer Communications, Elsevier Science B.V., Amsterdam, pp. 563--581, 29, [Article]

Mogre, Parag S. and Hollick, Matthias (2006):
The IEEE 802.16-2004 MESH Mode Explained.
(TR-KOM-2006-08), [Report]

Meissner, Andreas and Wolf, Lars and Hollick, Matthias and Steinmetz, Ralf (2001):
Security Issues in Group Integrity Management for Multimedia Multicasting.
In: Proceedings of Third International Conference on Information, Communications & Signal Processing (ICICS 2001), Singapore, Nanyang Technological University, Singapore, [Conference or Workshop Item]

N

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Springer, Rome, Italy, 502, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering, ACM, Austin, Texas, USA, [Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, pp. 747-752, 11/2015, DOI: 10.1007/s11623-015-0512-7,
[Article]

Nagy, Marcin and Bui, Thanh Phong and Cristofaro, Emiliano De and Asokan, N. and Ott, Jörg and Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015, [Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Sahin, Perihan and Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), TUT Press, Lochau, [Conference or Workshop Item]

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, In: Lecture Notes in Computer Science, 8650, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Noisternig, M. and Hollick, Matthias (2014):
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
In: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14), Montreal, Canada, [Conference or Workshop Item]

Nautsch, Andreas and Rathgeb, Christian and Busch, Christoph and Reininger, Herbert and Kasper, Klaus (2014):
Towards Duration Invariance of i-Vector-based Adaptive Score Normalization.
In: Odyssey: The Speaker and Language Recognition Workshop, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
IGI Global, pp. 76-91, [Book Section]

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
IGI Global, pp. 27-61, [Book Section]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: In: Cryptology ePrint Archive: Report 2013/464, 2013., Koblenz, [Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie
Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: 5th International Conference on eParticipation (ePart 2013), Springer, Koblenz, Germany, In: Lecture Notes in Computer Science, 8075, [Conference or Workshop Item]

Northrop, Erik and Lipford, Heather Richter and Bartsch, Steffen and Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Other]

Nas, Aysegül and Filyanov, Atanas and Volkamer, Melanie and Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
Menlo Park, California, [Other]

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13), [Conference or Workshop Item]

Nitsche, Thomas and Widmer, Jörg and Loch, Adrian and Hollick, Matthias (2013):
EVM and RSSI Link Quality Measurements in Frequency Selective Fading Channels.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013), [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, [Conference or Workshop Item]

Nie, Xuyun and Xu, Zhaohu and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Nie, Xuyun and Petzoldt, Albrecht and Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, Regensburg, Germany, In: LNCS, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Niebuhr, Robert and Meziani, Mohammed and Bulygin, Stanislav and Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, pp. 137-147, 11, (3), [Article]

Neumann, Stephan and Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), ThinkMind Digital Library, Stuttgart. Germany, ICIMP 2012, The Seventh I, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Nogueira, Hendri and Custódio, Ricardo Felipe and Moecke, Cristian Thiago and Wangham, Michelle (2011):
Using Notary Based Public Key Infrastructure in Shibboleth Federation.
In: Workshop de Gestão de Identidades - WGID/SBSeg, [Conference or Workshop Item]

Nazar, Assem and Seeger, Mark and Baier, Harald (2011):
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
In: 16th Nordic Conference in Secure IT Systems (NordSec 2011), Springer-Verlag, Tallinn, Estonia, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis (2011):
Broadcast Attacks against Code-Based Schemes.
In: 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, Springer, Weimar, Germany, In: LNCS, ISBN 978-3-642-34158-8,
[Conference or Workshop Item]

Nickel, Claudia and Busch, Christoph and Rangarajan, Sathyanarayanan and Möbius, Manuel (2011):
Using Hidden Markov Models for Accelerometer-Based Biometric Gait Recognition.
[Conference or Workshop Item]

Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2011):
Re-synchronizing audio watermarking after nonlinear time stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII, [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Buchmann, Johannes (2011):
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
In: The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011), [Conference or Workshop Item]

Nickel, Claudia and Derawi, Mohammad and Bours, Patrick and Busch, Christoph (2011):
Scenario Test for Accelerometer-Based Biometric Gait Recognition.
In: 3rd International Workshop on Security and Communication Networks (IWSCN 2011), [Conference or Workshop Item]

Nickel, Claudia and Busch, Christoph (2011):
Classifying Accelerometer Data via Hidden Markov Models to Authenticate People by the Way they Walk.
In: 45th IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, [Conference or Workshop Item]

Nickel, Claudia and Brandt, Holger and Busch, Christoph (2011):
Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices.
In: BIOSIG 2011, [Conference or Workshop Item]

Nickel, Claudia and Brandt, Holger and Busch, Christoph (2011):
Benchmarking the Performance of SVMs and HMMs for Accelerometer-Based Biometric Gait Recognition.
In: Proceedings of the 11th IEEE International Symposium on Signal Processing and Information Technology, [Conference or Workshop Item]

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin (2010):
RAY - A Secure Microkernel Architecture.
In: IEEE Privacy Security and Trust 2010 (PST2010), [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010, China Press, [Conference or Workshop Item]

Nickel, Claudia and Zhou, Xuebing and Busch, Christoph (2010):
Template Protection for Biometric Gait Data.
[Conference or Workshop Item]

Nickel, Claudia and Zhou, Xuebing and Busch, Christoph (2009):
Template Protection via Piecewise Hashing.
In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009), [Conference or Workshop Item]

Nickel, Claudia (2009):
Authentisierung an mobilen Geräten mittels Gangerkennung.
In: Datenschutz und Datensicherheit (DuD), pp. 280-283, 5, [Article]

Novotny, Jaroslav and Alber, Gernot and Jex, Igor (2009):
Random unitary dynamics of quantum networks.
In: eprint, [Article]

Novotny, J. and Alber, G. and Jex, I. (2009):
Random unitary dynamics of quantum networks.
In: J. Phys. A 42, 282003, [Article]

O

Othmane, Lotfi Ben and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim (2015):
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
[Report]

Othmane, Lotfi Ben and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim and Miseldine, Philip (2015):
Factors Impacting the Effort Required to Fix Security Vulnerabilities.
In: Proc. of the 18th Information Security Conference (ISC 2015), [Conference or Workshop Item]

Othmane, Lotfi Ben and Ranchal, Rohit and Fernando, Ruchith and Bhargava, Bharat and Bodden, Eric (2015):
Incorporating Attacker Capabilities in Risk Estimation and Mitigation.
In: Computers & Security, pp. 41–61, 51, DOI: 10.1016/j.cose.2015.03.001,
[Article]

Ossenbühl, Sven and Steinberger, Jessica and Baier, Harald (2015):
Towards automated incident handling: How to select an appropriate response against a network-based attack?
p. 17, In Proceedings of 9th Int, [Article]

Othmane, Lotfi Ben and Weffers, Harold and Mohamad, Mohd Murtadha and Wolf, Marko
Benhaddou, Driss and Al-Fuqaha, Ala (eds.) (2015):
Wireless Sensor and Mobile Ad-Hoc Networks.
Springer New York, pp. 217-247, [Book Section]

Othmane, Lotfi Ben and Cerqueus, Thomas and Thiery, Adrien and Salehie, Mazeiar and Noel, Nicolas and Labaere, Anthony and Domingues, Remi and Cordier, Arnaud and Ventresque, Anthony and Pasquale, Liliana and Perry, Philip and Nuseibeh, Bashar (2015):
Response to Emergency Situations in a Traffic Management System.
In: Proc. International Conference on Computer Information Systems, [Conference or Workshop Item]

Oueslati, Hela and Rahman, Mohammad Masudur and Othmane, Lotfi Ben (2015):
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
In: Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, [Conference or Workshop Item]

Othmane, Lotfi Ben and Angin, Pelin and Weffers, Harold and Bhargava, Bharat (2014):
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, pp. 497-509, 11, (6), [Article]

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master Thesis]

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Othmane, Lotfi Ben and Angin, Pelin and Bhargava, Bharat (2014):
Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
In: Proc. of the 9th International Conference on Availability, Reliability and Security (ARES), Fribourg, Switzerland, [Conference or Workshop Item]

Octeau, Damien and McDaniel, Patrick and Jha, Somesh and Bartel, Alexandre and Bodden, Eric and Klein, Jacques and Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security, Berkeley, Calif, USENIX Association, pp. 543-558, [Book Section]

Oren, Yossef and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes on Computer Science (LNCS), 8068, [Conference or Workshop Item]

Olembo, Maina and Bartsch, Steffen and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie
Saeed, Saqib and Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
IGI Global, pp. 172 - 201, DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Olembo, Maina and Stockhardt, Simon and Hülsing, Andreas and Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), [Conference or Workshop Item]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master Thesis]

Olembo, Maina and Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie
Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, In: LNI - Lecture Notes in Informatics, 205, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Olsen, Martin Aastrup and Xu, Haiyun and Busch, Christoph (2012):
Gabor Filters as Candidate Quality Measure for NFIQ 2.0.
In: The 5th IAPR International Conference on Biometrics, [Article]

Olsen, Martin Aastrup and Hartung, Daniel and Busch, Christoph and Larsen, Rasmus (2011):
Convolution Approach for Feature Detection in Topological Skeletons Obtained from Vascular Patterns.
In: IEEE Symposium Series on Computational Intelligence 2011, [Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie (2011):
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
[Report]

Olembo, Maina and Schmidt, Patrick and Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), IEEE Computer Society, Vienna, Austria, [Conference or Workshop Item]

Onete, Cristian and Onete, Cristina (2010):
Enumerating all the spanning trees in an un-oriented graph -- A novel approach.
[Article]

Oberender, Jens and Volkamer, Melanie and de Meer, Hermann (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
[Conference or Workshop Item]

Ort, Andreas and Assmann, Ralf and Bleumer, Gerrit and Böttger, Manfred and Fox, Dirk and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1992):
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, pp. 571--579, 16, (11), [Article]

P

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Piper, Thorsten and Suri, Neeraj and Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, [Conference or Workshop Item]

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Conference or Workshop Item]

Piper, Thorsten and Winter, Stefan and Schwahn, Oliver and Bidarahalli, Suman and Suri, Neeraj (2015):
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems.
In: ISORC, [Conference or Workshop Item]

Paul, Thomas and Hornung, Marius and Strufe, Thorsten (2014):
Distributed Discovery of User Handles with Privacy.
In: GlobeCom, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference or Workshop Item]

Patzina, Sven (2014):
Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4132],
[Ph.D. Thesis]

Patzina, Lars (2014):
Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4133],
[Ph.D. Thesis]

Pham, Thieu Nga and Hoang, Dang Hai and Strufe, Thorsten and Le, Quang Duc and Bui, Phong Thanh and Thai, Nguyet Thi and Le, Thuy Duong and Schweizer, Immanuel (2013):
Processing and Visualizing Traffic Pollution Data in Hanoi City From a Wireless Sensor Network.
In: IEEE SenseApp, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, pp. 255 - 275, 24, (3 - 4), DOI: 10.1007/s00200-013-0190-3,
[Article]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Patzina, Lars and Patzina, Sven and Piper, Thorsten and Manns, Paul
Gorp, Pieter Van and Ritter, Tom and Rose, Louis (eds.) (2013):
Model-Based Generation of Run-Time Monitors for AUTOSAR.
In: Modelling Foundations and Applications, Springer, Montpellier, In: Lecture Notes in Computer Science, 7949, ISBN 978-3-642-39012-8,
DOI: 10.1007/978-3-642-39013-5_6,
[Conference or Workshop Item]

Peter, Andreas and Hartmann, T. and Müller, S. and Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), IEEE, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Springer 2013, Seoul, Korea, In: Lecture Notes in Computer Science, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Pflug, Anika and Hartung, Daniel and Busch, Christoph (2012):
Feature Extraction from Vein Images using Spatial Information and Chain Codes.
In: ISTR, pp. 26-35, (17), DOI: 10.1016/j.istr.2012.02.003,
[Article]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
In: Proceedings of the 21st international conference companion on World Wide Web, ACM, Lyon, France, WWW '12 Companion, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Colors for Privacy Settings.
In: Proceedings of the World Wide Web Conference (WWW), [Conference or Workshop Item]

Poller, Andreas and Steinebach, Martin and Liu, Huajian (2012):
Robust image obfuscation for privacy protection in Web 2.0 applications.
In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012, In: Proceedings of SPIE, [Conference or Workshop Item]

Patzina, Sven and Patzina, Lars
Schürr, Andy and Varró, Daniel and Varró, Gergely (eds.) (2012):
A Case Study Based Comparison of ATL and SDM.
In: Applications of Graph Transformations with Industrial Relevance, Springer Berlin Heidelberg, In: Lecture Notes in Computer Science, 7233, ISBN 978-3-642-34175-5,
DOI: 10.1007/978-3-642-34176-2_18,
[Conference or Workshop Item]

Peter, Andreas and Kronberg, M. and Trei, W. and Katzenbeisser, Stefan (2012):
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
In: International Conference on Information Security (ISC 2012), Springer, [Conference or Workshop Item]

Paul, Thomas and Greschbach, Benjamin and Buchegger, Sonja and Strufe, Thorsten (2012):
Exploring Decentralization Dimensions of Social Network Services: Adversaries and Availability.
In: First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, [Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Social Informatics 4th International Conference, SocInfo 2012, proceedings, Berlin, Heidelberg, Springer, pp. 188-201, DOI: 10.1007/978-3-642-35386-4_15,
[Book Section]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage their Privacy Settings.
In: Proceedings of SocInfo, [Conference or Workshop Item]

Pullonen, Pille and Bogdanov, Dan and Schneider, Thomas (2012):
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...],
[Report]

Petzoldt, Albrecht and Thomae, Enrico and Bulygin, Stanislav and Wolf, Christopher
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", Springer, In: Lecture Notes in Computer Science, 6917, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Catalano, Dario and Fazio, Nelly and Gennaro, Rosario and Nicolosi, Antonio (eds.) (2011):
Linear Recurring Sequences for the UOV Key Generation.
In: Proceedings of PKC 2011, Springer, In: LNCS, [Conference or Workshop Item]

Popovic, Darko (2011):
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
TU Darmstadt, [Master Thesis]

Paul, Thomas and Buchegger, Sonja and Strufe, Thorsten
Bianchi, Giuseppe (ed.) (2011):
Handbook on the Trustworthy Internet.
Springer, [Book Section]

Paul, Thomas and Strufe, Thorsten (2011):
Improving the Usability of Privacy Settings in Facebook.
In: Proceedings of HCI/Health, Wealth and Identity Theft, [Conference or Workshop Item]

Pantel, Björn (2011):
Secure Logging of Data Transferred from Optical Disc Media.
TU Darmstadt, [Master Thesis]

Pfitzmann, Birgit and Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
[Standards, patents]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Popall, Enrico (2010):
Wirtschaftlicher Nutzen des neuen Personalausweises.
TU Darmstadt, [Master Thesis]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Sendrier, Nicolas (ed.) (2010):
Selecting Parameters for the Rainbow Signature Scheme.
In: Proceedings of PQCrypto 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Paul, Thomas and Buchegger, Sonja and Strufe, Thorsten (2010):
Decentralizing Social Networking Services.
In: International Tyrrhenian Workshop on Digital Communications, [Conference or Workshop Item]

Plies, Andreas and Massoth, Michael and Marx, Ronald (2010):
Approach to Identity Card-based Voice-over-IP Authentication.
In: Proceedings of the 2nd International Conferences on Advances in Multimedia (MMEDIA'10), [Conference or Workshop Item]

Petter, Andreas and Behring, Alexander and Mühlhäuser, Max (2009):
A Methodology for Model-Driven Development of Crisis Management Applications using Solverational.
In: INFORMATIK 2009, Lübeck, In: Lecture Notes in Informatics, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2005):
Digital Rights Management.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
In: International Workshop on Security Protocols, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2003):
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, pp. 38--44, 7, (6), [Article]

Pfitzmann, Birgit and Waidner, Michael (2003):
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Identity Management System Using Single Sign-on.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2002):
Token-based Web Single Signon with Enabled Clients.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2002):
BBAE -- A General Protocol for Browser-based Attribute Exchange.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2002):
Privacy in Browser-Based Attribute Exchange.
In: ACM Workshop on Privacy in the Electronic Society, ACM, [Conference or Workshop Item]

Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
A Formal Model for Multiparty Group Key Agreement.
[Report]

Powell, D. and Adelsbach, A. and Cachin, C. and Creese, S. and Dacier, M. and Deswarte, Y. and McCutcheon, T. and Neves, N. and Pfitzmann, B. and Randell, B. and Stroud, R. and Verissimo, P. and Waidner, M. (2001):
MAFTIA---Malicious- and Accidental-Fault Tolerance for Internet Applications.
In: Supplement of the 2001 Int. Conf. on Dependable Systems and Networks, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2001):
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
In: IEEE Symposium on Security and Privacy, [Conference or Workshop Item]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01, [Conference or Workshop Item]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2000):
Composition and Integrity Preservation of Secure Reactive Systems.
In: 7th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (2000):
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.
[Report]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1998):
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, [Article]

Pfitzmann, Birgit and Waidner, Michael (1998):
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, pp. 258--264, 22, (5), [Article]

Pfitzmann, Birgit and Waidner, Michael (1998):
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, pp. 23--28, 32, (1), [Article]

Pfitzmann, Birgit and Waidner, Michael (1997):
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97, DuD Fachbeiträge, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1997):
Anonymous Fingerprinting.
In: Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, pp. 61--68, 30, (2), [Article]

Pfitzmann, Birgit and Waidner, Michael (1997):
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, pp. 194--213, 15, (2), [Article]

Pfitzmann, Birgit and Waidner, Michael (1997):
Asymmetric Fingerprinting for Larger Collusions.
In: 4th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1996):
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1996):
Properties of Payment Systems - General Definition Sketch and Classification.
[Report]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
[Standards, patents]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1994):
A General Framework for Formal Notions of "Secure" Systems.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1993):
Attacks on Protocols for Server-Aided RSA Computation.
In: Eurocrypt '92, LNCS 658, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1993):
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München, pp. 75--121, [Article]

Pfitzmann, Birgit and Waidner, Michael (1992):
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1992):
Unconditional Byzantine Agreement for any Number of Faulty Processors.
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1992):
How to Break and Repair a "Provably Secure" Untraceable Payment System.
In: Crypto '91, LNCS 576, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
In: Verlässliche Informationssysteme (VIS'91), Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Fail-stop-Signaturen und ihre Anwendung.
In: Verlässliche Informationssysteme (VIS'91), Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Fail-stop Signatures and their Application.
In: SECURICOM 91, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1991):
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
In: Information Security, IFIP/Sec'91, [Conference or Workshop Item]

Pfitzmann, Andreas and Waidner, Michael (1991):
Netze mit unbeobachtbarer Kommunikation.
In: Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'', Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1990):
Formal Aspects of Fail-stop Signatures.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1990):
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, pp. 305--315, 14, (5--6), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1989):
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, pp. 605--622, 13, (12), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1988):
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, pp. 5--7, 11, (1), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1987):
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, pp. 293--299, 11, (6), [Article]

Pfitzmann, Andreas and Waidner, Michael (1986):
Networks without user observability---design options.
In: Computer & Security, pp. 158--166, 6, (2), [Article]

Pfitzmann, Andreas and Waidner, Michael (1986):
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, pp. 16--22, 10, (1), [Article]

R

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Article]

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, pp. 400-415, 24, (4), DOI: 10.1108/ICS-06-2015-0024,
[Article]

Reinheimer, Benjamin and Braun, Kristoffer and Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“, Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
TU Darmstadt, [Master Thesis]

Rauzy, Pablo and Kiss, Ágnes and Krämer, Juliane and Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference or Workshop Item]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master Thesis]

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015, [Conference or Workshop Item]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
How Current Android Malware Seeks to Evade Automated Code Analysis.
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015), [Conference or Workshop Item]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.
[Report]

Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric (2015):
Harvesting Runtime Data in Android Applications for Identifying Malware and Enhancing Code Analysis.
(TUD-CS-2015-0031), [Report]

Renaud, Karen and Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), IEEE, [Conference or Workshop Item]

Riecker, Michael and Yuan, Dingwen and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Patrolling wireless sensor networks: Randomized intrusion detection.
In: 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, Montreal, QC, Canada, [Conference or Workshop Item]

Renkema-Padmos, Arne and Baum, Jerome and Renaud, Karen and Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance, Lulu Press, Raleigh, [Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie and Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: Human Aspects of Information Security, Privacy, and Trust, Springer, Heraklion, Crete, In: 8533, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems, ACM Digital Library, New York, [Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric (2014):
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS), [Article]

Rasthofer, Siegfried and Arzt, Steven and Lovat, Enrico and Bodden, Eric (2014):
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES), [Article]

Riecker, Michael and Thies, D. and Hollick, Matthias (2014):
Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Roos, Stefanie and Strufe, Thorsten (2014):
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165, [Article]

Riecker, Michael and Biedermann, Sebastian and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, Springer, pp. 155-167, 14, (2), ISSN 1615-5270,
[Article]

Renaud, Karen and Mayer, Peter and Volkamer, Melanie and Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, Krakow, [Conference or Workshop Item]

Rynkowski, Gregor (2013):
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
TU Darmstadt, [Master Thesis]

Riecker, Michael and Hollick, Matthias (2013):
Weniger ist Mehr: Leichtgewichtige Metriken zur Erkennung von Denial-of-Service Angriffen in Drahtlosen Sensornetzen.
In: Proceedings of the 12th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN13), [Conference or Workshop Item]

Raghavendra, R. and Raja, K. and Yang, B. and Busch, C. (2013):
Combining Iris and Periocular for Robust Person Verification using Light Field Camera.
In: the 2nd IAPR Asian Conference on Pattern Recognition (ACPR 2013), Japan, [Conference or Workshop Item]

Raghavendra, R. and Raja, K. and Yang, B. and Busch, C. (2013):
Improved Face Recognition At A Distance Using Light Field Camera & Super Resolution Schemes.
In: the 6th International Conference on Security of Information and Networks (SIN 2013), Turkey, [Conference or Workshop Item]

Reinhardt, Andreas and Christin, Delphine and Steinmetz, Ralf (2013):
Pre-Allocating Code Mappings for Energy-Efficient Data Encoding in Wireless Sensor Networks.
In: Proceedings of the 9th IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerCom Workshops), [Conference or Workshop Item]

Reinhardt, Andreas and Christin, Delphine and Kanhere, Salil (2013):
Predicting the Power Consumption of Electric Appliances through Time Series Pattern Matching.
In: accepted for publication in Proceedings of 5th ACM Workshop on Embedded Systems for Energy-Efficient Buildings (BuildSys posters), [Conference or Workshop Item]

Reinhard, Alexander and Christin, Delphine and Li, Kai and Kanhere, Salil and Zhang, Jin (2013):
Smarter Building for the Smart Grid? Let them Forecast Their Power Consumption.
In: Accepted for publication in Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN demo), [Conference or Workshop Item]

Reinhardt, Andreas and Englert, F. and Christin, Delphine (2013):
Enhancing User Privacy by Prepocessing Distributed Smart Meter Data.
In: Accepted for publication in Proceedings of the 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), [Conference or Workshop Item]

Roos, Stefanie and Strufe, Thorsten (2013):
A Contribution to Analyzing and Enhancing Darknet Routing.
In: Proceedings of International Conference on Computer Communications (INFOCOM), [Conference or Workshop Item]

Reinhardt, Andreas and Baumann, Peter and Burgstahler, D. and Hollick, Matthias and Chonov, H. and Werner, Marc and Steinmetz, R. (2012):
On the Accuracy of Appliance Identification Based on Distributed Load Metering Data.
In: Proceedings of the 2nd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT), [Conference or Workshop Item]

Roos, Björn and Baier, Harald (2012):
IT-Forensik im Wandel - Die Aufweichung des Paradigmas der Unveränderbarkeit am Beispiel von Smartphones mit dem Windows Phone Betriebssystem.
In: DACH Security 2012, ISBN 978-3-00-039221-4,
[Conference or Workshop Item]

Robillard, Martin P. and Bodden, Eric and Kawrykow, David and Mezini, Mira and Ratchford, Tristan (2012):
Automated API Property Inference Techniques.
In: IEEE Transactions on Software Engineering (TSE), [Online-Edition: http://www.bodden.de/pubs/rbk+12automated.pdf],
[Article]

Roos, Stefanie and Strufe, Thorsten (2012):
Provable Polylog Routing for Darknets.
In: 4th IEEE ICDCS International Workshop on Hot Topics in Peer-to-Peer Computing and Online Social Networking (HotPost), [Conference or Workshop Item]

Riecker, Michael and Barroso, Ana and Hollick, Matthias (2012):
It's the Data that Matters! On the Detection of False Data in Wireless Sensor Networks.
In: 6. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", [Conference or Workshop Item]

Riecker, Michael and Barroso, Ana and Hollick, Matthias and Biedermann, Sebastian (2012):
On Data-centric Intrusion Detection in Wireless Sensor Networks.
In: Proceedings of the IEEE Conference on Cyber, Physical and Social Computing (CPSCom), [Conference or Workshop Item]

Riecker, Michael and Thome, R. and Yuan, D. and Hollick, Matthias (2012):
A Secure Monitoring and Control System for Wireless Sensor Networks.
In: Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN), [Conference or Workshop Item]

Ries, Sebastian and Habib, Sheikh Mahbub and Varadharajan, Vijay and Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Short Paper).
In: In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011), Springer Berlin Heidelberg, Pittsburgh, USA, Lecture Notes in Computer, ISBN 978-3-642-21599-5,
DOI: 10.1007/978-3-642-21599-5_19,
[Conference or Workshop Item]

Rothenberg, Christian Esteve and Macapuna, Carlos A. B. and Magalhães, Maurício F. and Verdi, Fábio and Wiesmaier, Alexander (2011):
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, pp. 1364-1378, 55, (6), [Article]

Ries, Sebastian and Fischlin, Marc and Martucci, Leonardo and Mühlhäuser, Max (2011):
Learning Whom to Trust in a Privacy-Friendly Way.
In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), [Conference or Workshop Item]

Römer, Jonathan (2011):
Entwicklung eines Container-Verfahrens für digitale Bildwasserzeichen.
TU Darmstadt, [Master Thesis]

Riecker, Michael and Müller, W. and Hollick, Matthias and Saller, K. (2011):
A Secure Monitoring and Control System for Wireless Sensor Networks.
In: Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11), [Conference or Workshop Item]

Rückert, Markus
Abe, Masayuki (ed.) (2010):
Lattice-based Blind Signatures.
In: ASIACRYPT 2010, Springer, Singapore, In: LNCS, ISBN 978-3-642-17372-1,
[Conference or Workshop Item]

Roßnagel, Alexander (2010):
Das Bundesverfassungsgericht und die Vorratsdatenspeicherung in Europa.
In: DuD, 8, [Article]

Roßnagel, Alexander and Jandt, Silke (2010):
Datenschutzkonformes Energieinformationsnetz.
In: DuD, pp. 373-378, 6, [Article]

Rückert, Markus
Garay, Markus A. and Prisco, Roberto De (eds.) (2010):
Adaptively Secure Identity-based Identification from Lattices without Random Oracles.
In: SCN 2010, Springer, Amalfi, Italy, In: LNCS, ISBN 978-3-642-15316-7,
[Conference or Workshop Item]

Rückert, Markus (2010):
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices Without Random Oracles.
In: PQCrypto 2010, Springer, Darmstadt, In: LNCS, LNCS, ISBN 978-3-642-12928-5,
[Conference or Workshop Item]

Rührmair, Ulrich and Katzenbeisser, Stefan and Steinebach, Martin and Zmudzinski, Sascha (2010):
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
In: Proceeding of 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2010), 31 May - 02 June, 2010, Linz, Austria, Springer, In: LNCS, Security and Cryptology, ISBN 978-3-642-13240-7,
[Conference or Workshop Item]

Rückert, Markus and Schneider, Michael and Schröder, Dominique
Zhou, Jianying and Yung, Moti (eds.) (2010):
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
In: ACNS 2010, Springer, Beijing, China, In: 6123 of LNCS, ISBN 978-3-642-13707-5,
[Conference or Workshop Item]

Rückert, Markus and Schröder, Dominique
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Fair Partially Blind Signatures.
In: Africacrypt 2010, Springer, In: LNCS, LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Richter, Philipp and Langer, Lucie and Hupf, Katharina and Volkamer, Melanie and Buchmann, Johannes
Schweighöfer, Erich and Geist, Anton and Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, Salzburg, [Conference or Workshop Item]

Reinhard, Alexander and Christin, Delphine and Hollick, Matthias and Schmitt, Johannes and Mogre, Parag S. and Steinmetz, Ralf (2010):
Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks.
In: Proceedings of the 7th European Conference on Wireless Sensor Networks (EWSN 2010), Springer-Verlag, [Conference or Workshop Item]

Rossberg, Michael and Schäfer, Günter and Strufe, Thorsten (2010):
Distributed Automatic Configuration of Complex IPsec-Infrastructures.
In: IEEE Journal of Network and Systems Management, pp. 300 -- 326, [Article]

Riedmüller, Reinhard and Seeger, Mark and Wolthusen, Stephen and Baier, Harald and Busch, Christoph (2010):
Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection.
In: 2nd International Workshop on Security and Communication Networks (IWSCN 2010), [Conference or Workshop Item]

Roßnagel, Alexander and Hornung, Gerrit and Knopp, Michael and Wilke, Daniel (2009):
De-Mail und Bürgerportale.
In: DuD, pp. 728-734, 12, [Article]

Rückert, Markus and Schröder, Dominique
Shacham, Hovav and Waters, Brent (eds.) (2009):
Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles.
In: Pairing 2009, Springer, Palo Alto, USA, LNCS, ISBN 978-3-642-03297-4,
[Conference or Workshop Item]

Rückert, Markus
Roy, Bimal and Sendrier, Nicolas (eds.) (2009):
Verifiably Encrypted Signatures from RSA without NIZKs.
In: Indocrypt 2009, Springer, New Delhi, India, In: LNCS, ISBN 978-3-642-10627-9,
[Conference or Workshop Item]

Rößling, Guido and Müller, Marius (2009):
Social Engineering: A Serious Underestimated Problem.
In: Proceedings of the 14th Annual ACM SIGCSE Conference on Innovation and Technology in Computer Science Education, ACM Press, [Conference or Workshop Item]

Ries, Sebastian and Aitenbichler, Erwin (2009):
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA Environments.
In: Proceedings of the The First International Symposium on Cyber-Physical Intelligence (CPI-09), IEEE, Brisbane, QLD, ISBN 978-1-4244-4902-6,
DOI: 10.1109/UIC-ATC.2009.82,
[Conference or Workshop Item]

Roßnagel, Alexander (2009):
Die Novellen zum Datenschutzrecht - Scoring und Adresshandel.
In: Neue Juristische Wochenschrift (NJW), pp. 2716-2722, 2009, (Heft 37), [Article]

Ranade, Kedar (2009):
Symmetric extendibility for a class of qudit states.
In: J. Phys. A 42, 425302, [Article]

Roßnagel, Alexander (2009):
Der elektronische Personalausweis als sichere Signaturerstellungseinheit - Können Signaturkarten kontaktlos genutzt werden?
In: Datenschutz und Datensicherheit (DuD), pp. 403-408, 07/2009, [Article]

Ries, Sebastian and Aitenbichler, Erwin (2009):
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA Environments.
In: The First International Symposium on Cyber-Physical Intelligence (CPI-09), Brisbane, Australia, [Conference or Workshop Item]

Roßnagel, Alexander and Bedner, Mark and Knopp, Michael (2009):
Schriftliche Stellungnahme zu Fragen des Bundesverfassungsgerichts im Zusammenhang mit den Verfassungsbeschwerden zur Vorratsdatenspeicherung.
[Other]

Roßnagel, Alexander
Eifert, Martin and Hoffmann-Riem, Wolfgang (eds.) (2009):
Technikneutrale Regulierung: Möglichkeiten und Grenzen.
In: Innovationsfördernde Regulierung, [Conference or Workshop Item]

Ráth, Istvan and Varró, Gergely and Varro, Daniel (2009):
Change-Driven Model Transformations Derivation and Processing of Change Histories.
In: Model Driven Engineering Languages and Systems, Springer, In: Lecture Notes in Computer Science, 5795/2009, DOI: 10.1007/978-3-642-04425-0_26,
[Conference or Workshop Item]

Roßnagel, Alexander (2009):
Digitale Rechteverwaltung – Eine gelungene Allianz von Recht und Technik?
In: Schriftenreihe des Instituts für Europäisches Medienrecht (EMR), [Article]

Rückert, Markus and Schröder, Dominique (2009):
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
In: ISA 2009, Springer, Seoul, In: LNCS, ISBN 978-3-642-02616-4,
[Conference or Workshop Item]

Roßnagel, Alexander and Bedner, Mark and Knopp, Michael (2009):
Rechtliche Anforderungen an die Aufbewahrung von Vorratsdaten.
In: Datenschutz und Datensicherheit (DuD), pp. 536-541, September 2009, [Article]