TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level (without sub-levels): 1657.

A

Andreas, Nautsch (2019):
Speaker Recognition in Unconstrained Environments.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES),
[Conference or Workshop Item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Conference or Workshop Item]

Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015),
[Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis,
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Bachelor Thesis]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 430-454,
Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 673-701,
Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés (2015):
Blended Identity: Pervasive IdM for Continuous Authentication.
[Conference or Workshop Item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, 8712, In: Computer Security - ESORICS 2014, pp. 76-93, Springer International Publishing, ISBN 978-3-319-11202-2,
DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]

Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, pp. 288-298,
DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: ECOOP '14, pp. (Acceptance Rate: 26%), Proceedings of the 28th European Conference on Object-Oriented Programming, [Conference or Workshop Item]

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
p. 29, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, [Conference or Workshop Item]

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 21-26, 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, [Conference or Workshop Item]

Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
pp. 288-298, ICSE, Hyderabad, [Conference or Workshop Item]

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science, 8383, In: Public-Key Cryptography PKC 2014, pp. 556-573,
[Conference or Workshop Item]

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 9, San Rafael, Morgan & Claypool, ISBN 9781627050975,
DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013,
Seoul, Korea, [Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), pp. 535-548,
ACM, Berlin, November 04 - 08, 2013, DOI: 10.1145/2508859.2516738,
[Conference or Workshop Item]

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), pp. 364-381. Springer, [Article]

Arzt, Steven ; Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Report]

Alaoui, Sidi Mohamed El Yousfi ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013,
University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
pp. 432-440, Springer, 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2), pp. 209-232. [Article]

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Report]

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
In: GI Lecture Notes in Informatics, Gesellschaft für Informatik, 6. Arbeitstagung Programmiersprachen (ATPS 2013), [Conference or Workshop Item]

Ali, Karim ; Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: ECOOP '13, pp. (Acceptance Rate: 25%), Proceedings of the 27th European Conference on Object-Oriented Programming, [Conference or Workshop Item]

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Lecture Notes in Computer Science, 7483, In: Information Security, pp. 168-187,
15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, ISSN 0302-9743,
[Conference or Workshop Item]

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012), [Conference or Workshop Item]

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3,
[Article]

Ali, Karim ; Lhoták, Ondřej (2012):
Application-Only Call Graph Construction.
In: ECOOP '12, pp. (Acceptance Rate: 19%), Proceedings of the 26th European Conference on Object-Oriented Programming, [Conference or Workshop Item]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), pp. 234-251,
Springer, [Conference or Workshop Item]

Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef (2012):
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7), pp. 24-32. [Article]

Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf (2011):
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
In: Proceedings of the 19th European Conference on Information Systems (ECIS),
Helsinki, Finland, [Conference or Workshop Item]

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), pp. 397-412,
IEEE Computer Society, [Conference or Workshop Item]

Armknecht, Frederik ; Strufe, Thorsten (2011):
An Efficient Distributed Privacy-preserving Recommendation System.
In: Proceedings of the 10th IEEE/IFIP Med-Hoc-Net,
[Conference or Workshop Item]

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Alaoui, Sidi Mohamed El Yousfi ; Cayrel, Pierre-Louis ; Meziani, Mohammed
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science, 200, In: ISA, pp. 146-155,
Springer, [Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, pp. 39-63,
Springer, [Conference or Workshop Item]

Ackermann, Tobias ; Buxmann, Peter (2010):
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
In: Proceedings of the 16th Americas Conference on Information Systems (AMCIS) 2010, pp. Paper 284,
[Conference or Workshop Item]

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk (2010):
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, 5, UbiCC, ISSN 1994-4608,
[Article]

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) (2010):
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 63-77,
[Conference or Workshop Item]

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH),
Springer, [Conference or Workshop Item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), pp. 493-510,
Springer, [Conference or Workshop Item]

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), pp. 158-175,
Springer, [Conference or Workshop Item]

Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph (2010):
Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
pp. 95-101, Workshop on Program Semantics, Specification and Verification: Theory and Applications (PSSV 2010), Kazan, Russia, June 14-15, 2010, [Conference or Workshop Item]

Anderl, Reiner ; Henriques, Joselito Rodrigues (2010):
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2), pp. 16-22. [Article]

Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj (2010):
Data-based Agreement for Inter-Vehicle Coordination.
In: Proc. of the 11th International Conference on Mobile Data Management (MDM),
[Conference or Workshop Item]

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj (2010):
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
In: Proceedings of the 11th International Conference on Mobile Data Management (MDM),
[Conference or Workshop Item]

Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael (2010):
Ubiquitous Home Control based on SIP and Presence Service.
In: Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS'10),
[Conference or Workshop Item]

Acker, Robin ; Massoth, Michael (2010):
Secure Ubiquitous House and Facility Control Solution.
In: Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW'10), 2010,
[Conference or Workshop Item]

Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia (2010):
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
[Conference or Workshop Item]

Anderl, Reiner ; Henriques, Joselito (2009):
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
In: Proceedings of the 20th International Congress of Mechanical Engineering (COBEM 2009),
International Congress of Mechanical Engineering, Gramado, Brazil, [Conference or Workshop Item]

Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009):
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: GIIS '09, Global Information Infrastructure Symposium, [Conference or Workshop Item]

Ali, Karim ; Boutaba, Raouf (2009):
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: GIIS '09, Global Information Infrastructure Symposium, [Conference or Workshop Item]

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max (2009):
Shaping the Future Internet.
In: Proceedings of the 3rd International CompanionAble Workshop IoPTS,
3rd International CompanionAble Workshop IoPTS, Brussels, Belgium, 02.12.2009, [Conference or Workshop Item]

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina (2008):
Smart Products: Integration Challenges.
In: Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08),
[Conference or Workshop Item]

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008),
[Conference or Workshop Item]

Aciicmez, Onur ; Schindler, Werner
Malkin, T. (ed.) (2008):
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
In: LNCS, In: Topics in Cryptology, CT-RSA, pp. 256--273,
Springer, Berlin, [Conference or Workshop Item]

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008):
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6), pp. 329-336. [Article]

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, pp. 39-40,
[Conference or Workshop Item]

Alkassar, Ammar ; Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
7,603,317,
[Standards, patents]

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8, pp. 480-482. [Article]

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE,
ACM, [Conference or Workshop Item]

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
2003/0014654 A1,
[Standards, patents]

Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
2003/0004734 A1,
[Standards, patents]

B

Borges, Fábio ; Lara, Pedro ; Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292, pp. 406--416. DOI: 10.1016/j.amc.2016.07.036,
[Article]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Master Thesis]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, pp. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
pp. 16-19, ACM, 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), Bergamo, Italy, August 2015, ISBN 978-1-4503-3813-4,
[Conference or Workshop Item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20. [Article]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p. 20,
Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

Butin, Denis ; Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015),
IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015),
Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Conference or Workshop Item]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1415-1426,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, pp. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, pp. 67-80,
Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
Peterson, Gilbert ; Shenoi, Sujeet (eds.) (2014):
Using Approximate Matching to Reduce the Volume of Digital Data.
In: IFIP Advances in Information and Communication Technology, 433, In: Advances in Digital Forensics X, 10th IFIP WG 11.9 International Conference on Digital Forensics, Vienna, Austria, January 8–10, 2014, pp. 149–163,
Springer, Vienna, Austria, [Conference or Workshop Item]

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pp. 187-198,
ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, pp. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3), pp. 459-478. DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014). [Article]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, pp. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), pp. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop,
[Conference or Workshop Item]

Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Robust Hashing for 3D Models.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, Februar 2014,
[Conference or Workshop Item]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, pp. 168-171,
Bremen, [Conference or Workshop Item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]

Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (eds.) (2014):
Towards a Process Model for Hash Functions in Digital Forensics.
In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 132, In: Digital Forensics & Cyber Crime (ICDF2C 2013), 5th ICST International Conference, September 26–27, 2013, Moscow, Russia, pp. 170–186,
Springer, Moscow, Russia, ISBN 978-3-319-14288-3 (print) and 978-3-319-14289-0 (e-book),
DOI: 10.1007/978-3-319-14289-0_12,
[Conference or Workshop Item]

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2014):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4), pp. 267-297. [Article]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Buchmann, Johannes ; Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2), pp. 98-102. Springer Gabler Verlag, [Article]

Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 183-188,
DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, pp. 336-355,
Springer, Marrakesh, Morocco, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37, pp. 720 - 725. ISSN 11,
DOI: 10.1007/s11623-013-0300-1,
[Article]

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013):
Reducing human factors in software security architectures.
Future Security Conference 2013, [Conference or Workshop Item]

Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil (2013):
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013):
Security considerations on extending PACE to a biometric-based connection establishment.
In: 1, In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the, pp. 5-6,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, pp. 1971-1984,
Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, pp. 31-46,
Springer Berlin Heidelberg, RHUL, Egham, UK, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hildebrandt, Mireille (ed.) (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013, pp. 139-164, Amsterdam, Iso Press, ISBN 978-1-61499-294-3 (print) ; 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book Section]

Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013):
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13, [Article]

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
24, In: Applicable Algebra in Engineering, Communication and Computing, pp. 157 - 158, Springer, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13),
USENIX, [Conference or Workshop Item]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bansarkhani, Rachid El ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 48-67,
Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Beckerle, Matthias ; Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, pp. 1-11,
[Conference or Workshop Item]

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 752 - 766,
Koblenz, [Conference or Workshop Item]

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), pp. 291 - 296,
IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), pp. 198-207,
IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1), [Article]

Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), pp. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference or Workshop Item]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013),
[Conference or Workshop Item]

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013),
[Conference or Workshop Item]

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 347-359,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, pp. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013):
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF), [Article]

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science, 7779, In: RSA Conference Cryptographer's Track (CT-RSA 2013), pp. 189–206,
Springer, [Conference or Workshop Item]

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4), pp. 468-480. [Article]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242,
ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas (2013):
Video Game Watermarking.
In: Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013,
[Conference or Workshop Item]

Breitinger, Frank ; Petrov, Kaloyan (2013):
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), [Article]

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), pp. 4966-4976,
IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014). DOI: 10.1007/s10623-013-9840-5,
[Article]

Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. (2013):
Multi-Biometrische Gesichtserkennung.
In: the 13. Deutscher IT-Sicherheitskongress, pp. 361-373,
Bonn, Germany, [Conference or Workshop Item]

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 402-417,
Springer, Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science, In: Advances in Cryptology - ASIACRYPT 2013, pp. 154-173,
Springer, [Conference or Workshop Item]

Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2), pp. 22 -- 44. DOI: 10.4230/DagRep.3.2.22,
[Article]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1), pp. 84-96. [Article]

Braun, Johannes ; Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, pp. 600-605,
Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53, pp. 81-102. [Article]

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012):
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012):
Delta-oriented Monitor Specification.
Springer, 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012):
Challenges in defining a programming language for provably correct dynamic analyses.
Springer, 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]

Breitinger, Frank ; Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]

Breitinger, Frank ; Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4, [Article]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: LNCS, In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), pp. 259-276,
Springer, Hangzhou, China, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012,
Birmingham, UK, [Conference or Workshop Item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, pp. 53-68,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012):
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo), [Article]

Breitinger, Frank ; Baier, Harald (2012):
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA), [Article]

Baier, Harald ; Brand, Achim (2012):
On the Investigation of Application Specific Data within Digital Forensics.
In: Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), pp. 38-54,
ISBN 978-1-84102-316-8,
[Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, pp. 1-5,
IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Breitinger, Frank ; Baier, Harald (2012):
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL), pp. 89-101. [Article]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet (2012):
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, 11 (1), pp. 1-28. ISSN 1660-1769,
[Article]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
Petcu, Dana ; Vazquez-Poletti, Jose Luis (eds.) (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing, pp. 151-177, New Castle upon Tyne, Cambridge Scholars Publishing, ISBN 978-1-44383-550-3,
[Book Section]

Bulygin, Stanislav ; Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Bodden, Eric (2012):
Identifying meaningless parameterized linear-temporal-logic formulas.
[Report]

Bodden, Eric (2012):
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
[Report]

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012):
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS), [Article]

Bockisch, Christoph ; Sewe, Andreas (2012):
The ALIA4J Approach to Efficient Language Implementation.
In: Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, pp. 19-20,
Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA, [Conference or Workshop Item]

Bodden, Eric (2012):
MOPBox: A Library Approach to Runtime Verification.
In: Lecture notes in computer science , 7186, pp. 365-369, Springer, RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30, [Conference or Workshop Item]

Baier, Harald ; Dichtelmüller, Christian (2012):
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
In: DACH Security 2012,
[Conference or Workshop Item]

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science, In: Financial Cryptography, pp. 344-358,
Springer-Verlag, [Conference or Workshop Item]

Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. (2012):
Towards a more Secure Border Control with 3D Face Recognition.
In: the 5th Norsk Informasjons Sikkerhets Konferanse (NISK), pp. 49-60,
ISBN 978-82-321-0012-5,
[Conference or Workshop Item]

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen,
[Ph.D. Thesis]

Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin (2012):
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
[Standards, patents]

Berchtold, Waldemar ; Schäfer, Marcel (2012):
Rebound on Symmetric Tardos Codes.
In: Proceeding of The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012),
[Conference or Workshop Item]

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012):
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
(TUD-CS-2012-0106), [Report]

Bodden, Eric ; Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012),
[Conference or Workshop Item]

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1502-1507,
ACM, Trento, Italy, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013),
London, UK, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS, In: WISTP - Workshop in Information Security Theory and Practice 2012,
Springer, London, UK, [Conference or Workshop Item]

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science, 7092, In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), pp. 54-75,
Springer, Sanya, China, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security,
[Conference or Workshop Item]

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS, In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, pp. 117-129,
Springer Berlin / Heidelberg, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Breitinger, Frank ; Baier, Harald (2011):
Performance Issues about Context-Triggered Piecewise Hashing.
In: 3rd International ICST Conference on Digital Forensics & Cyber Crime,
Dublin, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM),
ACM Press, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC),
ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]

Bodden, Eric (2011):
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
pp. 492-495, ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Conference or Workshop Item]

Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS '11: Proceedings of the 5th International Conference on Network and System Security,
IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference or Workshop Item]

Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011):
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
In: DACH Security 2011, pp. 399-410,
ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
Schartner, Peter ; Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, pp. 32-43,
syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, pp. 479 - 484,
IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference or Workshop Item]

Bodden, Eric (2011):
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
pp. 24-28, ACM, WODA '11: International Workshop on Dynamic Analysis, [Conference or Workshop Item]

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (eds.) (2011):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: LNCS, 6522, In: Distributed Computing and Networking, pp. 77-82,
Springer, 12th International Conference on Distributed Computing and Networking (ICDCN 2011), Bangalore, India, 02.-05.01.2011, ISBN 978-3-642-17678-4,
DOI: 10.1007/978-3-642-17679-1_7,
[Conference or Workshop Item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS), In: Progress in Cryptology - AFRICACRYPT 2011, pp. 363-378,
Springer Berlin / Heidelberg, Dakar, Senegal, ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]

Bodden, Eric (2011):
Defining Access Control Policies as Tracematches.
(TUD-CS-2011-0149), [Report]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (eds.) (2011):
Interactive Access Rule Learning for Access Control: Concepts and Design.
4, In: International Journal On Advances in Intelligent Systems, pp. 234-244,
[Conference or Workshop Item]

Bodden, Eric (2011):
Closure Joinpoints: Block joinpoints without surprises.
pp. 117-128, ACM, AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development, [Conference or Workshop Item]

Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing (2011):
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD), [Article]

Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011,
Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference or Workshop Item]

Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin (2011):
Collusion-secure patchwork embedding for transaction watermarking.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII,
[Conference or Workshop Item]

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011):
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
In: Proceedings of the 33rd International Conference on Software Engineering, pp. 241-250,
New York, NY, USA, International Conference on Software Engineering, Waikiki, Honolulu, HI, USA, 21-28 May 2011, [Conference or Workshop Item]

Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin (2011):
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
In: SPLASH '11 Workshops, In: Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11 & VMIL'11, pp. 309-316,
New York, NY, USA, ACM, 5th workshop on Virtual Machines and Intermediate Languages, Portland, OR, USA, 24 Oct 2011, [Conference or Workshop Item]

Baier, Harald ; Breitinger, Frank (2011):
Security Aspects of Piecewise Hashing in Computer Forensics.
In: 6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011),
[Conference or Workshop Item]

Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin (2011):
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
In: The 7th International Symposium on Applied Reconfigurable Computing, Belfast, UK,
[Conference or Workshop Item]

Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), pp. 51-70,
Springer, [Conference or Workshop Item]

Biedermann, Sebastian ; Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), pp. 43-54,
Springer, [Conference or Workshop Item]

Bodden, Eric ; Hendren, Laurie (2011):
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer), [Article]

Berjani, Betim ; Strufe, Thorsten (2011):
A Recommendation System for Spots in Location-Based Online Social Networks.
In: Proceedings of the Eurosys Workshop on Social Network Systems,
[Conference or Workshop Item]

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian (2011):
Interactive Rule Learning for Access Control: Concepts and Design.
4, In: International Journal on Advances in Intelligent Systems, pp. 234-244, IARIA, [Book Section]

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
7,412,724,
[Standards, patents]

Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
Bishop, Judith ; Vallecillo, Antonio (eds.) (2011):
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
6705, In: Objects, Models, Components, Patterns, pp. 131-146, Springer, ISBN 978-3-642-21951-1,
DOI: 10.1007/978-3-642-21952-8_11,
[Book Section]

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science, 6498, In: Proceedings of IndoCrypt 2010, pp. 17–-32,
Springer, [Conference or Workshop Item]

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems,
[Conference or Workshop Item]

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010):
IDE 2.0: Collective Intelligence in Software Development.
pp. 53-58, ACM, FSE/SDP Workshop on the Future of Software Engineering, DOI: 10.1145/1882362.1882374?,
[Conference or Workshop Item]

Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian (2010):
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
In: ComputationWorld 2010, In: In Proceedings of the Second International Conference on Adaptive and Self-adaptive Systems and Applications (ADAPTIVE 2010), pp. 104 - 110,
Lisbon, Portugal, ISBN 978-1-61208-109-0,
[Conference or Workshop Item]

Bugiel, Sven ; Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010),
[Conference or Workshop Item]

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max (2010):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
[Report]

Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique (2010):
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Lecture Notes in Informatics, In: Sicherheit 2010,
Gesellschaft fuer Informatik (GI), [Conference or Workshop Item]

Bartsch, Steffen (2010):
A calculus for the qualitative risk assessment of policy override authorization.
In: SIN: Proceedings of the 3rd international conference on Security of information and networks, pp. 62--70,
ACM, Taganrog, Rostov-on-Don, Russian Federation, ISBN 978-1-4503-0234-0,
DOI: 10.1145/1854099.1854115,
[Conference or Workshop Item]

Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato (2010):
The uncertainty principle in the presence of quantum memory.
In: Nature Physics, [Article]

Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. (2010):
The PUF Promise.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 290-297,
Springer, [Conference or Workshop Item]

Bedner, Mark (2010):
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR), pp. 339-345. [Article]

Buchmann, Johannes ; Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17), pp. 21-23. [Article]

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2010):
Unlinkability of Sanitizable Signatures.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), pp. 444-461,
Springer-Verlag, [Conference or Workshop Item]

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
Bernstein, Daniel ; Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS, In: AFRICACRYPT, pp. 69-81,
Springer, Stellenbosch, South Africa, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan (2010):
Attribute-based Encryption with Break-Glass.
In: Lecture Notes in Computer Science, 6033, In: Workshop In Information Security Theory And Practice (WISTP'10), pp. 237-244,
Springer, ISBN 978-3-642-12367-2,
[Conference or Workshop Item]

Bulygin, Stanislav ; Brickenstein, Michael (2010):
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3), pp. 185-200. DOI: 10.1007/s11786-009-0020-y,
[Article]

Bulygin, Stanislav ; Pellikaan, Ruud
Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (eds.) (2010):
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory, pp. 585-622, World Scientific, ISBN 978-981-283-716-5,
[Book Section]

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira (2010):
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
(TUD-CS-2010-0066), [Report]

Bartsch, Steffen (2010):
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
In: SecSE: Fourth International Workshop on Secure Software Engineering,
IEEE Computer Society, Krakow, Poland, DOI: 10.1109/ARES.2010.19,
[Conference or Workshop Item]

Baier, Harald ; Busch, Christoph
Hochschule Darmstadt (3094) (Corporate Creator) (2010):
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
2010, In: Querschnitt - Beiträge aus Forschung und Entwicklung, [Book Section]

Backs, Christian (2010):
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas (2010):
Optimizing the evaluation of patterns in pointcuts.
In: Proceedings of the 4th workshop on Virtual Machines and Intermediate Languages, pp. 1-10,
New York, NY, USA, ACM, Workshop on Virtual Machines and Intermediate Languages, Reno, Nevada, USA, 17 Oct 2010, [Conference or Workshop Item]

Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010):
Quasi-dyadic CFS signatures.
In: LNCS, In: Inscrypt 2010,
Springer, [Conference or Workshop Item]

Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]

Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter (2010):
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2), pp. 23--32. [Article]

Bedner, Mark ; Ackermann, Tobias (2010):
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 323-328. DOI: 10.1007/s11623-010-0096-1,
[Article]

Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne (2010):
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
In: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010,
[Conference or Workshop Item]

Breitinger, Frank ; Nickel, Claudia (2010):
User Survey on Phone Security and Usage.
In: BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures,
[Conference or Workshop Item]

Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing (2010):
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
[Conference or Workshop Item]

Busch, Christoph ; Hartung, Daniel (2010):
Biometrische Nachrichten-Authentisierung.
[Conference or Workshop Item]

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, p. 4,
Darmstadt, [Conference or Workshop Item]

Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul (2009):
PUF-Based Authentication Protocols, Revisited.
In: International Workshop on Information Security Applications (WISA'09), pp. 296-308,
[Conference or Workshop Item]

Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan (2009):
Foundations of Non-Malleable Hash and One-Way Functions.
In: Lecture Notes in Computer Science, 5912, In: Asiacrypt 2009, pp. 524-541,
Springer, [Conference or Workshop Item]

Bras-Amoros, Maria ; Bulygin, Stanislav (2009):
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3), pp. 561-574. DOI: 10.1007/s00233-009-9175-8,
[Article]

Bulygin, Stanislav ; Pellikaan, Ruud (2009):
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12), pp. 1626-1643. DOI: 10.1016/j.jsc.2007.12.003,
[Article]

Braun, Johannes (2009):
Nutzung des elektronischen Personalausweises im eCommerce.
Darmstadt, Technische Universität, [Diploma Thesis or Magisterarbeit]

Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian (2009):
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
[Conference or Workshop Item]

Bedner, Mark (2009):
Rechtmäßigkeit der "Deep Packet Inspection".
[Other]

Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (eds.) (2009):
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
In: BIOSIG 2009,
ISBN ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Baier, Harald ; Straub, Tobias (2009):
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
In: Tagungsband Informatik 2009,
LNI, [Conference or Workshop Item]

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009):
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6), pp. 831-844. [Article]

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2009):
PSP : private and secure payment with RFID WPES 2009.
In: WPES 2009, Workshop on Privacy in the Electronic Society,
[Conference or Workshop Item]

Busch, Christoph (2009):
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications,
ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Busch, Christoph (2009):
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung, pp. 132-141. [Article]

Busch, Christoph (2009):
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]

Busch, Christoph ; Reimer, Helmut (2009):
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5), [Article]

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2009):
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Lecture Notes in Informatics, In: Biometrics and Electronic Signatures - Research and Applications (BIOSIG) 2009,
Gesellschaft fuer Informatik (GI), [Conference or Workshop Item]

Buchmann, Johannes ; Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9, pp. 543-548. [Article]

Baier, Harald ; Karatsiolis, Vangelis (2009):
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI,
Springer, [Conference or Workshop Item]

Baier, Harald ; Straub, Tobias (2009):
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009,
LNI, [Conference or Workshop Item]

Bulygin, Stanislav (2009):
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Saarbrücken, Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-0948-0,
[Book]

Bender, Jens ; Fischlin, Marc ; Kügler, Dennis (2009):
Security Analysis of the PACE Key-Agreement Protocol.
In: Lecture Notes in Computer Science, 5735, In: Information Security Conference (ISC) 2009, pp. 33-48,
Springer, [Conference or Workshop Item]

Buchmann, Johannes ; Karatsiolis, Vangelis (2009):
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5), pp. 378-384. DOI: 10.4236/ijcns.2009.25042,
[Article]

Bulygin, Stanislav (2009):
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern,
[Ph.D. Thesis]

Biere, Thomas ; Schindler, Werner
Horster, P. ; Schartner, P. (eds.) (2009):
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
In: D-A-CH Security 2009, pp. 462--469,
syssec, Klagenfurt, [Conference or Workshop Item]

Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi (2009):
Demonstration of first response communication sandbox.
In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference,
[Conference or Workshop Item]

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009):
Supporting Agile Development of Authorization Rules for SME Applications.
In: TrustCol: 3rd International Workshop on Trusted Collaboration, pp. 461-471,
Springer, Orlando, FL, USA, DOI: 10.1007/978-3-642-03354-4_35,
[Conference or Workshop Item]

Bodden, Eric ; Chen, Feng ; Rosu, Grigore (2009):
Dependent advice: A general approach to optimizing history-based aspects.
In: Proceedings of the ACM 2009, [Report]

Bulygin, Stanislav ; Pellikaan, Ruud
Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (eds.) (2009):
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography, pp. 361-365, Springer, ISBN 978-3-540-93805-7,
[Book Section]

Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin (2009):
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
In: 18th Intl. World Wide Web Conference (WWW'09), pp. 551 -- 560,
[Conference or Workshop Item]

Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten (2009):
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1), [Article]

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Bedner, Mark (2009):
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009, p. 372. [Article]

Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut (2009):
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
In: Proc. of International Conference on Formal Engineering Methods (ICFEM),
[Conference or Workshop Item]

Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph (2009):
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]

Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian (2009):
Security of Sanitizable Signatures Revisited.
In: Public Key Cryptography (PKC 2009), pp. 317-336,
[Conference or Workshop Item]

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009):
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99, [Article]

Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max (2008):
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
(3), [Report]

Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely (2008):
Incremental Pattern Matching in the VIATRA Model Transformation System.
In: Proc. of the 3rd International Workshop on Graph and Model Transformation,
[Conference or Workshop Item]

Brickenstein, Michael ; Bulygin, Stanislav
Faugere, J.-C. ; Wang, D. (eds.) (2008):
Attacking AES via Solving Systems in the Key Variables Only.
In: First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30, pp. 118-123,
[Conference or Workshop Item]

Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max (2008):
First Response Communication Sandbox.
In: Proceedings of the 11th communications and networking simulation symposium, pp. 115-122,
ACM, 11th communications and networking simulation symposium (CNS '08), Ottawa, Canada, 14.-17.04.2008, ISBN 978-1-56555-318-7,
DOI: 10.1145/1400713.1400733,
[Conference or Workshop Item]

Bartsch, Steffen ; Bormann, Carsten
Horster, Patrick (ed.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference or Workshop Item]

Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair (2008):
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008, [Article]

Bodden, Eric ; Havelund, Klaus (2008):
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008), pp. pages 155–165. [Article]

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
Buchmann, Johannes ; Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: LNCS, In: PQCrypto 2008, pp. 63-78,
Springer, [Conference or Workshop Item]

Bulygin, Stanislav ; Pellikaan, Ruud (2007):
Decoding error-correcting codes with Groebner bases.
In: Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25, pp. 3-10,
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12), pp. 1685--1720. [Article]

Backes, Michael ; Basin, David ; Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, 15 (6), p. 561. [Article]

Bulygin, Stanislav (2006):
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10), pp. 4664-4669. DOI: 10.1109/TIT.2006.881831,
[Article]

Bulygin, Stanislav (2006):
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern, [Master Thesis]

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006),
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
1,675,047,
[Standards, patents]

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
1,617,587,
[Standards, patents]

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3), pp. 135--154. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4), pp. 242--252. [Article]

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
11/317,396,
[Standards, patents]

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
11/178,722,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC),
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), pp. 336--354,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4), pp. 589--617. [Article]

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
7,617,393,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security,
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), pp. 168--183,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Bulygin, Stanislav (2003):
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2), pp. 24-28. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), pp. 84--95,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), pp. 160--174,
IEEE Computer Society Press, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), pp. 524--535,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4), pp. 611--627. [Article]

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00),
CA, Internet Society, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, pp. 89--106,
[Conference or Workshop Item]

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; de Rooij, Peter ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, pp. 217--230,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, pp. 441--445,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, pp. 285--295,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

C

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), pp. 749-762. [Article]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference or Workshop Item]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
Darmstadt, Technische Universität, [Bachelor Thesis]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference or Workshop Item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014),
Glasgow, UK, [Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, pp. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference or Workshop Item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014),
Paris, France, [Conference or Workshop Item]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
Darmstadt, Technische Universität, [Master Thesis]

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107. [Article]

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias (2013):
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5), pp. 695-707. [Article]

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164), pp. 1-20. International Association for Cryptologic Research (IACR), [Article]

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2013):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3), pp. 353-371. [Article]

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela (2013):
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3), pp. 105–116. [Article]

Christin, Delphine ; Büchner, C. ; Leibecke, N. (2013):
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
In: Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop),
[Conference or Workshop Item]

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, pp. 359-368,
ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Christin, Delphine ; Hollick, Matthias
Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (eds.) (2013):
European Data Protection: Coming of Age.
pp. 203–222, Springer Netherlands, [Book Section]

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias (2013):
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
In: Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN),
[Conference or Workshop Item]

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. (2012):
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
In: Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), pp. 14:1–14:10,
[Conference or Workshop Item]

Christin, Delphine ; Büttner, C. ; Repp, Nicolas (2012):
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
In: Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), pp. 977-985,
[Conference or Workshop Item]

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Véron, Pascal ; Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
In: Arithmetic of Finite Fields : 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings, pp. 45 - 63,
[Conference or Workshop Item]

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (eds.) (2012):
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: LNCS, 7322, In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP), pp. 71-86, Springer, ISBN 978-3-642-30954-0,
[Book Section]

Christin, Delphine ; Bentolila, A. ; Hollick, Matthias (2012):
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
In: Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU),
[Conference or Workshop Item]

Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York (2012):
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
(SIT-TR-2012-002), [Report]

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2012):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 135-143,
[Conference or Workshop Item]

Cuong, N. ; Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), pp. 3-15,
Springer, [Conference or Workshop Item]

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2011):
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11), pp. 1928-1946. DOI: 10.1016/j.jss.2011.06.073,
[Article]

Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil (2011):
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
In: Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), pp. 341--350,
[Conference or Workshop Item]

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
Recent Progress in Code-Based Cryptography.
In: LNCS, In: The 5th International Conference on Information Security and Assurance - ISA-2011, pp. 21-32,
Springer, Brno University, Czech Republic, [Conference or Workshop Item]

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011):
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011, [Article]

Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias (2011):
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
In: Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU),
[Conference or Workshop Item]

Cuong, N. ; Katzenbeisser, Stefan (2011):
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
In: International Workshop on Digital Forensics and Watermarking (IWDW 2011), pp. 387-397,
Springer, [Conference or Workshop Item]

Cuong, N. ; Katzenbeisser, Stefan (2011):
Security of Copy-Move Forgery Detection Techniques.
In: International Conference on Acoustics, Speech and Signal Processing (ICASSP'11), pp. 1864-1867,
IEEE Press, [Conference or Workshop Item]

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance,
Brno University, Czech Republic, [Conference or Workshop Item]

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: The 5th International Conference on Information Security and Assurance - ISA 2011,
Brno University, Czech Republic, [Conference or Workshop Item]

Canova, Gamze (2011):
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
Darmstadt, Technische Universität, [Bachelor Thesis]

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011):
Reducing access to sensitive information.
7,941,859,
[Standards, patents]

Christin, Delphine ; Hollick, Matthias (2011):
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
In: Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11),
[Conference or Workshop Item]

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010):
Improved Zero-knowledge Identification with Lattices.
In: LNCS, In: The Fourth International Conference on Provable Security (ProvSec 2010), pp. 1-17,
Springer, [Conference or Workshop Item]

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS '10, In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 559--572,
ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0245-6,
DOI: http://doi.acm.org/10.1145/1866307.1866370,
[Conference or Workshop Item]

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS, 6531, In: Information Security Conference (ISC), pp. 84-98,
Springer, [Conference or Workshop Item]

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2010):
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
In: Proceedings of 9th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Würzburg, Germany,
[Conference or Workshop Item]

Cayrel, Pierre-Louis ; Véron, Pascal ; Alaoui, Sidi Mohamed El Yousfi (2010):
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
In: Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010),
SAC2010, [Conference or Workshop Item]

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010):
A Lattice-Based Threshold Ring Signature Scheme.
In: LNCS, In: The first international conference on cryptology and Information security, LatinCrypt 2010, pp. 255-272,
Springer, [Conference or Workshop Item]

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
In: Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010),
[Conference or Workshop Item]

Cayrel, Pierre-Louis ; Meziani, Mohammed (2010):
Post-Quantum Cryptography: Code-based Signatures.
Lecture Notes in Computer, In: 4th International Conference on Information Security and Assurance ISA 2010, pp. 82 - 99,,
[Conference or Workshop Item]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]

Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias (2010):
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2, pp. 96-125. DOI: 10.3390/fi2020096,
[Article]

Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi (2010):
Dual Construction of Stern-based Signature Schemes.
63 March 2010, In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", pp. 369-374,
[Conference or Workshop Item]

Cayrel, Pierre-Louis ; Strenzke, Falko (2010):
Side channels attacks in code-based cryptography.
In: First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), pp. 24-28,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2010):
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
In: Proceedings of the 6th International IFIP AICT 320 Summer School, pp. 86 -- 101,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST),
Springer, [Conference or Workshop Item]

Charnes, Christopher
Atallah, Mikhail ; Blanton, Marina (eds.) (2009):
Algorithms and Theory of Computation Handbook.
In: Chapman & Hall/CRC Applied Algorithms and Data Structures series, 2, ISBN 978-1-58488-820-8,
[Book Section]

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
In: 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Leveraging social links for trust and privacy in networks.
In: INetSec 2009 Open Research Problems in Network Security,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Privacy preserving social networking through decentralization.
In: WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, pp. 145-152,
[Conference or Workshop Item]

Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira (2009):
A Plugin-Architecture for Self-Adaptive WS Compositions.
In: Proceedings of the IEEE 7th International Conference on Web Services (ICWS 2009), pp. 35-42,
IEEE, Los Angeles, CA, USA, ISBN 978-0-7695-3709-2,
DOI: 10.1109/ICWS.2009.125,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12), pp. 94 -- 101. [Article]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Leveraging Social Links for Trust and Privacy in Networks.
In: INetSec, Open Research Problems in Network Security,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Privacy Preserving Social Networking Through Decentralization.
In: 6th International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 145 -- 152,
[Conference or Workshop Item]

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
In: 3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications,
[Conference or Workshop Item]

Camenisch, Jan ; Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
10/874,431,
[Standards, patents]

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003):
Anonymous Access to a Service.
10/432,266,
[Standards, patents]

Camenisch, Jan ; Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

D

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Deckwerth, Frederik (2017):
Static Verification Techniques for Attributed Graph Transformations.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Bachelor Thesis]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76, pp. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Conference or Workshop Item]

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), pp. 2665-2670,
IEEE, First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
Darmstadt, Technische Universität, [Diploma Thesis or Magisterarbeit]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max (2014):
Twitterize: Anonymous Micro-Blogging.
In: Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), pp. 817-823,
IEEE Computer Society, International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA), DOI: 10.1109/AICCSA.2014.7073285,
[Conference or Workshop Item]

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, pp. 76-87,
Springer, Waterloo, Canada, [Conference or Workshop Item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS, In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, pp. 161-172,
Springer, Istanbul, Turkey, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
pp. 893-908, USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4), [Article]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

do Carmo, Rodrigo ; Hollick, Matthias (2014):
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
In: Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014),
IEEE/IFIP, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference,
[Conference or Workshop Item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014,
Marrakech, Morocco, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory,
Honolulu HI USA, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: LNCS, In: Asiacrypt 2013,
Springer, [Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Demmler, Daniel (2013):
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt, [Master Thesis]

Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (eds.) (2013):
Distributed and Anonymous Publish-Subscribe.
In: LNCS, 7873, In: Network and System Security : 7th International Conference, NSS 2013, pp. 685-691,
Springer, 7th International Conference on Network and System Security, Madrid, Spain, ISBN 978-3-642-38630-5,
DOI: 10.1007/978-3-642-38631-2_57,
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234), pp. 1-46. International Association for Cryptologic Research (IACR), [Article]

do Carmo, Rodrigo ; Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187,
[Article]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013,
Bangalore, India, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: LNCS, In: ESORICS 2013,
Springer, [Conference or Workshop Item]

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: LNCS, In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, pp. 156-175,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi,
[Conference or Workshop Item]

do Carmo, R. ; Werner, M. ; Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet),
[Conference or Workshop Item]

Demirel, Denise ; Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Article]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012),
[Conference or Workshop Item]

Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012,
Bellevue, WA, [Conference or Workshop Item]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238,
Springer, [Conference or Workshop Item]

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012):
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18, pp. 1-14. DOI: 10.1007/s11276-012-0505-5,
[Article]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC),
ACM Press, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
7187 2012, In: 3rd international conference on e-voting and identity (VoteID 2011), pp. 158-173,
Springer, Tallinn, Estonia, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011):
Readiness of various eVoting systems for complex elections.
[Report]

Demmler, Daniel (2011):
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt, [Bachelor Thesis]

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J ; Noella, Edelmann (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, pp. 287-300,
Edition Donau-Universität Krems, [Conference or Workshop Item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics,
Rome, Italy, [Conference or Workshop Item]

Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, pp. 126-129,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies,
[Conference or Workshop Item]

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2011):
Trust-based Content Distribution for Mobile Ad Hoc Networks.
In: 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2011) [to appear],
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10),
IEEE Press, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference,
Boca Raton, Florida, USA, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc (2010):
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science, In: 13th Information Security Conference,
Springer, Boca Raton, USA, [Conference or Workshop Item]

Demirel, Denise (2010):
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Darmstadt, Technische Universität, [Bachelor Thesis]

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]

Dagdelen, Özgür ; Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS, 6272, In: Euro-Par 2010, pp. 211-222,
Springer, [Conference or Workshop Item]

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), pp. 462-279,
Springer-Verlag, [Conference or Workshop Item]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]

Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph (2010):
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,
[Conference or Workshop Item]

Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011),
[Conference or Workshop Item]

Dahmen, Erik ; Krauß, Christoph
Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (eds.) (2009):
Short Hash-Based Signatures for Wireless Sensor Networks.
In: LNCS, In: CANS 2009, pp. 463-476,
Springer, Kanazawa, Japan, ISBN 978-3-540-89640-1,
[Conference or Workshop Item]

Deußer, Clemens ; Reubold, Jan (2009):
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt, [Master Thesis]

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 49--54,
ACM, Chicago, Illinois, USA, ISBN 978-1-60558-788-2,
DOI: http://doi.acm.org/10.1145/1655108.1655117,
[Conference or Workshop Item]

Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj (2009):
Efficient Robust Storage Using Secret Tokens.
In: 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS),
[Conference or Workshop Item]

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Buchmann, Johannes ; Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS, In: PQCrypto 2008, pp. 109-123,
Springer, Cincinnati, USA, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
Horster, Patrick (ed.) (2008):
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference or Workshop Item]

E

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

Eichberg, Michael ; Sewe, Andreas (2011):
Encoding the Java Virtual Machine's Instruction Set.
In: Electronic Notes in Theoretical Computer Science, 264, In: Proceedings of the Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation, pp. 35-50,
Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010), Paphos, Cyprus, 27 Mar 2010, ISSN 15710661,
[Conference or Workshop Item]

Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel (2010):
History-Free Aggregate Message Authentication Codes.
In: Lecture Notes in Computer Science, In: Security and Cryptography for Networks (SCN) 2010,
Springer, [Conference or Workshop Item]

Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (eds.) (2010):
A Task-based Messaging Approach To Facilitate Staff Work.
In: Proceedings of the 7th International Conference on Information Systems for Crisis Response and Management. International Conference on Information Systems for Crisis Response and Management (ISCRAM-2010), pp. digital publication,
[Conference or Workshop Item]

Ekberg, Jan-Erik ; Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009),
[Conference or Workshop Item]

Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas (2009):
Privacy-Preserving Face Recognition.
In: Privacy Enhancing Technologies Symposium (PETS 2009),
[Conference or Workshop Item]

Eu, Joy Boy Joy (2001):
Specification of Dependable Trusted Third Parties.
[Report]

F

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud,
[Conference or Workshop Item]

Falzon, Kevin ; Bodden, Eric
Lopez, Javier ; Mitchell, Chris J. (eds.) (2015):
Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Lecture Notes in Computer Science, 9290, In: Information Security, pp. 83-101,
Information Security Conference, Trondheim, [Conference or Workshop Item]

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28.-30. Sept. 2015, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Follner, Andreas ; Bodden, Eric (2015):
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
[Report]

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, pp. 191-205,
Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1401-1414,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
8409, In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, pp. 244-249,
[Conference or Workshop Item]

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
27, In: J. Cryptology, pp. 397-428,
DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013):
Distributed Finite-State Runtime Monitoring with Aggregated Events.
pp. 94-111, Springer, 4th International Conference on Runtime Verification (RV'13), Rennes, France, 24.-27.09., ISBN 978-3-642-40786-4,
DOI: 10.1007/978-3-642-40787-1_6,
[Conference or Workshop Item]

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013):
Highly Precise Taint Analysis for Android Applications.
[Report]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]

Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj (2013):
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS),
[Conference or Workshop Item]

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013,
Bergen (Norway), [Conference or Workshop Item]

Fischlin, Marc ; Onete, Cristina (2013):
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: LNCS, In: ACNS,
Springer, [Conference or Workshop Item]

Falzon, Kevin ; Pace, Gordon J.
Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (eds.) (2012):
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, Essen, Germany, September 04, 2012, [Conference or Workshop Item]

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2012):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1--9,
DOI: 10.1109/WoWMoM.2012.6263689,
[Conference or Workshop Item]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2011):
Curve-based Planar Graph Routing in Multihop Wireless Networks.
In: 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), pp. 149-151,
DOI: 10.1109/MASS.2011.127,
[Conference or Workshop Item]

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), pp. 37-46,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011),
Hong Kong, [Conference or Workshop Item]

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14. [Article]

Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin (2011):
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2011),
[Conference or Workshop Item]

Franz, M. ; Katzenbeisser, Stefan (2011):
Processing Encrypted Floating Point Signals.
In: Workshop on Multimedia and Security (MMSEC'11), pp. 103-108,
ACM Press, [Conference or Workshop Item]

Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas (2011):
Oblivious Outsourced Storage with Delegation.
In: Financial Cryptography and Data Security (FC 2011), pp. 127-140,
Springer, [Conference or Workshop Item]

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1), pp. 5--7. [Article]

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061,
Dagstuhl Reports, [Conference or Workshop Item]

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2), pp. 1--15. [Article]

Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano (2010):
Random Oracles With(out) Programmability.
In: Lecture Notes in Computer Science, In: Asiacrypt 2010,
Springer, [Conference or Workshop Item]

Feller, Thomas ; Demirezen, Aziz (2010):
Hardware Trojans: Data Leakage Using General Purpose LEDs.
[Report]

Fischlin, Marc ; Schröder, Dominique (2010):
On the Impossibility of Three-Move Blind Signature Schemes.
In: Lecture Notes in Computer Science, 6110, In: Advances in Cryptology - Eurocrypt,
Springer-Verlag, [Conference or Workshop Item]

Fischlin, Marc ; Lehmann, Anja (2010):
Hash Function Combiners in SSL and TLS.
In: Lecture Notes in Computer Science, In: CT-RSA,
Springer-Verlag, [Conference or Workshop Item]

Fischlin, Marc ; Lehmann, Anja (2010):
Delayed-Key Message Authentication for Streams.
In: Lecture Notes in Computer Science, In: Theory of Cryptography Conference (TCC),
Springer-Verlag, [Conference or Workshop Item]

Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto (2010):
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
In: Proceeding of the Seventh IASTED International Conference on Signal Processing, Pattern Recognition and Applications (SPPRA 2010), Innsbruck, Austria,
ACTA Press, [Conference or Workshop Item]

Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
Clavier, C. ; Gaj, K. (eds.) (2009):
A New Side-Channel Attack on RSA Prime Generation.
In: LNCS, pp. 141--155, Springer, Berlin, [Conference or Workshop Item]

Freiling, Felix ; Heinson, Dennis (2009):
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9), pp. 547-552. [Article]

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, pp. 186-190,
IEEE, [Conference or Workshop Item]

Fischlin, Marc ; Schröder, Dominique (2009):
Security of Blind Signatures under Aborts.
In: Public Key Cryptography (PKC 2009), pp. 297-316,
[Conference or Workshop Item]

Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia (2008):
Measuring Unlinkability Revisited.
In: WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, pp. 105-110,
ACM, Alexandria, Virginia, USA, ISBN 978-1-60558-289-4,
DOI: http://doi.acm.org/10.1145/1456403.1456421,
[Conference or Workshop Item]

Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas (2008):
Designing Context-Aware HCI for Collaborative Emergency Management.
In: Int'l Workshop on HCI for Emergencies in conjunction with CHI 2008 (electronic proceedings),
[Conference or Workshop Item]

Field, Simon ; Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, 32 (6), pp. 667--668. [Article]

G

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 317 - 324,
IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max (2015):
ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems.
pp. 739 - 740, IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy, 28.-30. Sept., ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Conference or Workshop Item]

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal,
[Conference or Workshop Item]

Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil (2015):
A Survey of Technologies for the Internet of Things.
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, pp. 1090 - 1095,
IEEE, Dubrovnik, Croatia, ISBN 978-1-4799-5343-1,
DOI: 10.1109/IWCMC.2015.7289234,
[Conference or Workshop Item]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,
[Article]

Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2), pp. 108 - 113. DOI: 10.1007/s11623-015-0375-y,
[Article]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC,
Las Vegas, NV, [Conference or Workshop Item]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Conference or Workshop Item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Community-based Collaborative Intrusion Detection.
164, In: International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 665-681,
Springer International Publishing, ISBN 978-3-319-28865-9,
DOI: 10.1007/978-3-319-28865-9_44,
[Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien,
[Conference or Workshop Item]

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS, In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, pp. 48-63,
Springer, Florianópolis, Brazil, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy, San Jose, California, 18.5.2014, [Conference or Workshop Item]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]

Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
In: Computer Security Symposium 2013, pp. 518-525,
Tokyo, Jōhō Shori Gakkai, Computer Security Symposium 2013, Kagawa, Japan, 21-23 October, 2013, [Conference or Workshop Item]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
Darmstadt, Technische Universität, [Bachelor Thesis]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Grimm, Marco ; Anderl, Reiner (2013):
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Procedia Computer Science, In: Proceedings of the 11th Annual Conference on Systems Engineering Research (CSER 2013), pp. 571-580,
Elsevier, [Conference or Workshop Item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012):
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5), pp. 631-645. [Article]

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), pp. 512-529,
Springer, Leuven, Belgium, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012):
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In: In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM),
Lucca, Italy, [Conference or Workshop Item]

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Darmstadt, Technische Universität, [Bachelor Thesis]

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011):
Key Management in Distributed Online Social Networks.
In: Proceedings of WoWMoM/DSPAN,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011):
Cryptographic Treatment of Private User Profiles.
In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS,
[Conference or Workshop Item]

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010):
Service Automata for Secure Distributed Systems.
[Other]

Geibig, Joanna ; Bradler, Dirk (2010):
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10), [Article]

Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. (2010):
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
In: Proceedings of IEEE LCN 2010,
Denver, Colorado, USA, [Conference or Workshop Item]

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science, 6055, In: Africacrypt 2010, pp. 333-350,
Springer, [Conference or Workshop Item]

Gharadaghy, Rojan (2010):
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Darmstadt, Technische Universität, [Bachelor Thesis]

Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj (2010):
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
In: Proc. International Symposium on Architecting Critical Systems (ISARCS),
[Conference or Workshop Item]

Gharadaghy, Rojan ; Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 151-162,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 89-107,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf (2009):
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
In: Proceedings of IFIP Wireless Days 2009,
[Conference or Workshop Item]

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]

Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2009):
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
In: Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI, pp. 489--503,
SecuMedia, Ingelheim, [Conference or Workshop Item]

Ghiglieri, Marco ; Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]

Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj (2009):
Threat Modeling and Dynamic Profiling.
In: Annals of Emerging Research in Information Assurance, Security and Privacy Services, Elsevier, [Book Section]

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI, 1, In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI),
[Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie
Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Band 1, In: GI Jahrestagung, pp. 429-436,
München, [Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI, 131, In: Electronic Voting - 3rd International Conference, pp. 185-196,
Gesellschaft für Informatik, [Conference or Workshop Item]

Gebhardt, Max ; Illies, Georg ; Schindler, Werner
Alkassar, A. ; Siekmann, J. (eds.) (2008):
On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
In: Lecture Notes in Informatics, In: Sicherheit 2008, Gesellschaft für Informatik, pp. 111-125,
Köllen, Bonn, [Conference or Workshop Item]

Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2008):
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
In: Cryptology ePrint Archive, 2008 (022), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]

Grimm, Rüdiger ; Volkamer, Melanie
Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (eds.) (2008):
Trust Models for Remote Electronic Voting.
27, In: Electronic Government 7th International Conference EGOV 2008, pp. 197-204,
Koblenz, [Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI, 86, In: Electronic Voting 2006 - $2^{nd}$ International Conference, pp. 97-106,
[Conference or Workshop Item]

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
Krimmer, Robert (ed.) LNI, GI (Corporate Creators) (2006):
Security Requirements for Non-political Internet Voting.
86, In: Electronic Voting (EVOTE) 2006, pp. 203-212, Bonn, Gesellschaft für Informatik, ISBN 978-3-88579-180-5,
[Book Section]

H

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy,
Melbourne, Australia, [Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Heuser, Stephan (2016):
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

Halvani, Oren ; Winter, Christian ; Pflug, Anika (2016):
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement), pp. S33–S43. DOI: 10.1016/j.diin.2016.01.006,
[Article]

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO,
[Conference or Workshop Item]

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES),
Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Halvani, Oren ; Winter, Christian
Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (eds.) (2015):
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
In: CEUR Workshop Proceedings, Vol-1391, In: CLEF2015 Working Notes, Working Notes of CLEF 2015 – Conference and Labs of the Evaluation forum, Toulouse, France, September 8–11, 2015,
Sun SITE Central Europe, Toulouse, France, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, pp. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), pp. 1-10,
ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj (2014):
Event pattern discovery on IDS traces of Cloud Services.
In: IEEE International Conference on Big Data and Cloud Computing (BDCloud),
[Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11), pp. 2185-2200. DOI: 10.1002/sec.748,
[Article]

Halvani, Oren ; Steinebach, Martin (2014):
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014), pp. 33-43. [Article]

Hiemenz, Benedikt (2014):
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt, [Bachelor Thesis]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (eds.) (2014):
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Lecture Notes in Informatics, In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 229-241, ISBN 978-3-88579-622-0,
[Book Section]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Halvani, Oren ; Steinebach, Martin
Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (eds.) (2014):
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
In: Working Notes for CLEF 2014 Conference, Sheffield, UK, September 15-18, 2014., pp. 1049-1062,
Sheffield, UK, [Conference or Workshop Item]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158. [Article]

Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (eds.) (2013):
Authorship Verification via k-Nearest Neighbor Estimation.
In: CEUR - Workshop Proceedings, In: Working Notes for CLEF 2013 Conference , Valencia, Spain, September 23-26, 2013.,
CEUR-WS.org, [Conference or Workshop Item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik (2013):
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
In: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2013, pp. 525 - 534,
IEEE, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16.-18.07.2013, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.5,
[Conference or Workshop Item]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 459-468,
IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]

Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf (2013):
Natural Language Watermarking for German Texts.
In: IH&MMSec '13, In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, pp. 193-202,
Montpellier, France, ISBN 978-1-4503-2081-8,
DOI: 10.1145/2482513.2482522,
[Conference or Workshop Item]

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 391-403,
SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Henecka, Wilko ; Schneider, Thomas (2013):
Faster Secure Two-Party Computation with Less Memory.
In: ASIA CCS '13 : Proceedings, pp. 437-446,
New York, ACM, 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), Hangzhou, China, May 08 - 10, 2013, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484369,
[Conference or Workshop Item]

Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 565-576,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
pp. 1963-1965, ACM, Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13), Coimbra, Portugal, March 2013, ISBN 978-1-4503-1656-9,
DOI: 10.1145/2480362.2480727,
[Conference or Workshop Item]

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: LNCS, In: MoCrySEn 2013, pp. 194-208, Springer, [Book Section]

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, pp. 151-165,
[Conference or Workshop Item]

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), pp. 772-783,
ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
Darmstadt, Technische Universität, [Bachelor Thesis]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Halvani, Oren (2012):
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Darmstadt, Technische Universität, [Bachelor Thesis]

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: LNCS, In: SAC2012 - Conference on Selected Areas in Cryptography, pp. 66-80,
Springer Berlin Heidelberg, Windsor, Canada, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
pp. 109-118, IEEE, 11th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012), Liverpool, UK, 25.-27.06., ISBN 978-1-4673-2172-3,
DOI: 10.1109/TrustCom.2012.165,
[Conference or Workshop Item]

Heuser, Annelie ; Zohner, Michael (2012):
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
pp. 249-264, Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph (2012):
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1), pp. 25-36. DOI: 10.1049/iet-bmt.2011.0013,
[Article]

Hartung, Daniel ; Pflug, Anika ; Busch, Christoph (2012):
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: LNI, In: Sicherheit 2012 - Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI),
Gesellschaft für Informatik e.V., [Conference or Workshop Item]

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Henriques, Joselito ; von Lukas, Uwe ; Mesing, Benjamin (2012):
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2, pp. 84-86. Göller, Baden-Baden, ISSN 1866-5004,
[Article]

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389,
Springer, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict — Trust Assessment for Cloud Marketplaces (Full version).
In: Technical Report / CASED, Darmstadt, Technische Universität Darmstadt, TUD-CS-2012-0027, [Report]

Halvani, Oren ; Steinebach, Martin
Schartner, Peter ; Taeger, Jürgen (eds.) (2012):
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, pp. 174-185, Prof. Dr. Patrick Horster, ISBN 978-3000392214,
[Book Section]

Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner (2012):
Data Exchange Processes based on Trust and Rights Management.
In: TMCE 2012: Tools and Methods of Competitive Engineering,
Karlsruhe, ISBN 978-90-5155-082-5,
[Conference or Workshop Item]

Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten (2012):
Friendship in German Online Social Networks.
In: SOUPS,
[Conference or Workshop Item]

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), pp. 213-220,
Salzburg, Austria, [Conference or Workshop Item]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Darmstadt, Technische Universität, [Master Thesis]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September,
[Conference or Workshop Item]

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit,
Darmstadt, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011):
Towards a Trust Management System for Cloud Computing.
In: Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933-939,
IEEE, 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16.-18.11.2011, ISBN 978-1-4577-2135-9,
DOI: 10.1109/TrustCom.2011.129,
[Conference or Workshop Item]

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2011):
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011), [Article]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011):
Mobile eID application for the German identity card.
[Report]

Hoffmann, Gerhard (2011):
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt, [Master Thesis]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
(27 pages), [Report]

Horsch, Moritz ; Stopczynski, Martin (2011):
The German eCard-Strategy.
[Report]

Hamacher, Kay ; Katzenbeisser, Stefan (2011):
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011), pp. 115-124, ACM Press, [Book Section]

Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2011):
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
In: 14th EUROMICRO Conference on Digital System Design (DSD2011),
[Conference or Workshop Item]

Horsch, Moritz (2011):
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Darmstadt, Technische Universität, [Bachelor Thesis]

Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco (2010):
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
In: Proceeding of ASME 2010 International Mechanical Engineering Congress & Exposition,
Vancouver, British Columbia, Canada, ISBN 978-0-7918-3891-4,
[Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2010):
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 410-415,
IEEE Computer Society, Xi'an, China, ISBN 978-0-7695-4272-0,
DOI: http://doi.ieeecomputersociety.org/10.1109/UIC-ATC.2010.48,
[Conference or Workshop Item]

Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro (2010):
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2), pp. 56-59. [Article]

Heinson, Dennis ; Schmidt, Bernd (2010):
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8), pp. 540-547. [Article]

Halvani, Oren ; Steinebach, Martin (2010):
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 61 (5), pp. 285-291. [Article]

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS, 6055, In: Africacrypt 2010, pp. 52-68,
Springer, Stellenbpsch, South Africa, [Conference or Workshop Item]

Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus (2010):
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2), pp. 75–79. DOI: 10.1007/s11623-010-0039-x,
[Article]

Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
Freiling, Felix (ed.) (2010):
Quantifying the Attack Surface of a Web Application.
In: Lecture Notes in Informatics (LNI), P-170, In: Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit., pp. 305-316,
Bonner Köllen Verlag, Bonn, ISBN 978-3-88579-264-2,
[Conference or Workshop Item]

Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph (2010):
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
[Conference or Workshop Item]

Hartmann, Frank (2010):
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Darmstadt, Technische Universität, [Bachelor Thesis]

Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009):
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5,
IEEE Press, DOI: 10.1109/NTMS.2009.5384830,
[Conference or Workshop Item]

Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas (2009):
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10), pp. 968-975. DOI: 10.4304/jnw.4.10.968-975,
[Article]

Horsch, Moritz (2009):
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Darmstadt, Technische Universität, [Bachelor Thesis]

Hornung, Gerrit ; Schnabel, Christoph (2009):
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2), pp. 115-122. [Article]

Hornung, Gerrit ; Schnabel, Christoph (2009):
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1), pp. 84-88. [Article]

Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max (2009):
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1), pp. 90-111. [Article]

Hartung, Daniel (2009):
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
12/393,242,
[Standards, patents]

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
12/393,242,
[Standards, patents]

Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel (2008):
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR, pp. 723-728. [Article]

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6), pp. 434-440. [Article]

Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf (2007):
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
In: Proceedings of the 15th IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA, pp. 126--134,
[Conference or Workshop Item]

Hutter, Dieter ; Volkamer, Melanie
Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (eds.) (2006):
Information Flow Control to Secure Dynamic Web Service Composition.
In: Security in Pervasive Computing, pp. 196-210,
York, UK, [Conference or Workshop Item]

Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (eds.) (2006):
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
91, In: Proceedings of the ECEH'06, pp. 59-70,
Freiburg (Schweiz), [Conference or Workshop Item]

Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf (2005):
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
In: Proceedings of 30th Annual IEEE Conference on Local Computer Networks (LCN2005), Sydney, Australia, pp. 366--373,
[Conference or Workshop Item]

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1), pp. 35--44. [Article]

Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. (2004):
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
In: Proceedings of the 30th EUROMICRO Conference (EUROMICRO 2004), Rennes, France, pp. 495--502,
IEEE Computer Society Press, Los Alamitos, [Conference or Workshop Item]

Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf (2004):
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
In: Proceedings of Second International Conference on Wired/Wireless Internet Communications (WWIC 2004), Frankfurt (Oder), Germany, pp. 201--212,
Springer-Verlag Berlin/Heidelberg/New York, [Conference or Workshop Item]

Hollick, Matthias ; Krop, T. ; Schmitt, J. (2003):
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.
(TR-KOM-2003-02), [Report]

Hollick, Matthias ; Steinmetz, Ralf (2002):
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
In: Enterprise Security, pp. 163--176,
IT Verlag fr Informationstechnik GmbH, Höhenkirchen, [Conference or Workshop Item]

Hollick, Matthias ; Schmitt, J. (2002):
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
(TR-KOM-2002-11), [Report]

Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf (2001):
A Security Model for Multicast Group Integrity Management.
In: Poster Session of Third International Workshop on Networked Group Communication, UCL, London, UK, Organised by UCL and COST 264 in cooperation with ACM SIGCOMM,
London, Third International Workshop on Networked Group Communication, London, UK, November 7–9, 2001, [Conference or Workshop Item]

Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf (2001):
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
In: Innovative Anwendungen in Kommunikationsnetzen, Proceedings der 15. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Germany, pp. 101--111,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Hollick, Matthias ; Steinmetz, Ralf (2001):
Security Goals for Service Discovery in Ad-hoc Environments.
In: Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2001), Split, Croatia, pp. 1025--1032,
FESB-Split, [Conference or Workshop Item]

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, pp. 67--82,
[Conference or Workshop Item]

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor Thesis]

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011):
Modular Reasoning with Join Point Interfaces.
[Report]

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011):
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
pp. 508-511, ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Conference or Workshop Item]

Ivanova, Vanya (2010):
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt, [Master Thesis]

Israr, Adeel ; Shoufan, Abdulhadi ; Huss, Sorin (2009):
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
In: IEEE Int. Symposium on Quality Electronic Design, ISQED'09.,
[Conference or Workshop Item]

J

Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim (2015):
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
pp. 1-8, IEEE Computer Society, International Conference on Networked Systems (NetSys), [Conference or Workshop Item]

Jamison, Emily ; Gurevych, Iryna
Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (eds.) (2014):
Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
In: Proceedings of the The 28th Pacific Asia Conference on Language, Information and Computing, pp. 479-488,
Department of Linguistics, Chulalongkorn University, Phuket, Thailand, [Conference or Workshop Item]

Jamison, Emily ; Gurevych, Iryna
Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (eds.) (2014):
Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
In: Proceedings of the 28th Pacific Asia Conference on Language, Information and Computing, pp. 244-253,
Department of Linguistics, Chulalongkorn University, Phuket, Thailand, [Conference or Workshop Item]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012):
Unsafe Exposure Analysis of Mobile In-App Advertisements.
In: to appear at WiSec,
ACM, [Conference or Workshop Item]

Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010):
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1), [Article]

Jonker, Hugo ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID'07, 4896, In: Proceedings of the 1st international conference on E-voting and identity, pp. 50--61,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4), pp. 495-509. [Article]

Janson, Phil ; Waidner, Michael (1996):
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6), pp. 10--15. [Article]

K

Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd (2017):
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
In: IEEE Conference on Local Computer Networks (LCN),
IEEE, Singapore, [Conference or Workshop Item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569,
IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292, In: International Conference on Human-Computer Interaction (HCII), pp. 675-690,
Springer, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), pp. 24-29. DOI: 10.1109/MSP.2017.70,
[Article]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, pp. 419-433,
Springer, [Conference or Workshop Item]

Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd (2017):
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios. (Postprint)
In: 2017 IEEE 42nd Conference on Local Computer Networks : LCN workshops 2017 : proceedings, pp. 195-198,
Piscataway, NJ, IEEE, IEEE International Workshop on Practical Issues in Building Sensor Network Applications, Singapur, 9.-12.10.2017, ISBN 978-1-5090-6523-3,
DOI: 10.25534/tuprints-00013329,
[Conference or Workshop Item]

Kolb, Nina
Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (eds.) (2016):
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
In: Mensch und Computer 2016 - Tagungsband,
Gesellschaft für Informatik e.V., Aachen, DOI: 10.18420/muc2016-mci-0075,
[Conference or Workshop Item]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, pp. 98 - 106,
IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, pp. 509--518,
Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, pp. 3-16,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, pp. 1-7,
IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference or Workshop Item]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, pp. 209-233,
Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), pp. 181-196,
Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Kolb, Nina ; Diefenbach, Sarah ; Niklas, Susanne
Endmann, Anja ; Fischer, Holger ; Krökel, Malte (eds.) (2015):
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
In: Mensch und Computer 2015 – Usability Professionals, pp. 113-122,
De Gruyter Oldenbourg, Stuttgart, [Conference or Workshop Item]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, pp. 57-73,
Springer, Bern, Switzerland, [Conference or Workshop Item]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), pp. 181-190,
Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, pp. 224-229,
IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558), pp. 1-19. International Association for Cryptologic Research (IACR), [Article]

Karuppayah, Shankar ; Roos, Stefanie ; Rossow, Christian ; Fischer, Mathias ; Mühlhäuser, Max (2015):
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: International Conference in Distributed Computing Systems, pp. 619-629,
IEEE, Columbus, Ohio, ISBN 978-1-4673-7214-5,
[Conference or Workshop Item]

Kulcsar, Geza ; Deckwerth, Frederik ; Lochau, Malte ; Varró, Gergely ; Schürr, Andy
Rensink, Arend ; Zambon, Eduardo (eds.) (2015):
Improved Conflict Detection for Graph Transformation with Attributes.
In: Electronic Proceedings in Theoretical Computer Science, 181, In: Graphs as Models, pp. 97-112,
Graphs as Models, GaM 2015, [Conference or Workshop Item]

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, pp. 1-10,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
8533, In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science,
Springer, Cham, Heraklion, Greece, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, pp. 1-6,
ACM Press, [Conference or Workshop Item]

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2014):
Automatic protocol selection in secure two-party computations.
pp. 566-584, 12. International Conference on Applied Cryptography and Network Security (ACNS'14), DOI: 10.1007/978-3-319-07536-5_33,
[Conference or Workshop Item]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys),
ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference or Workshop Item]

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8), pp. 512-516. DOI: 10.1007/s11623-013-0209-8,
[Article]

Klose, Robin ; Loch, Adrian ; Hollick, Matthias (2013):
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
In: Proceedings of the 2nd Workshop of Software Radio Implementation Forum (SRIF 2013), co-located with ACM Sigcomm 2013,
[Conference or Workshop Item]

Klose, Robin ; Loch, Adrian ; Hollick, Matthias (2013):
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
In: Proceedings of the 2013 IEEE International Conference on Sensing, Communication, and Networking (SECON 2013),
[Conference or Workshop Item]

Kühne, Alexander ; Loch, Adrian ; Hollick, Matthias ; Klein, Anja (2013):
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
In: Wireless Communications and Networking Conference (WCNC'13), pp. 2040--2045,
DOI: 10.1109/WCNC.2013.6554877,
[Conference or Workshop Item]

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE),
Interactive Presentation, [Conference or Workshop Item]

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
Marinos, Louis ; Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Lecture Notes in Computer Science, 8030, In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, pp. 100-109,
Springer, First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, ISBN ISBN 978-3-642-39345-7,
[Conference or Workshop Item]

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
20. Network and Distributed System Security Symposium (NDSS'13), San Diego, CA, 24-27 February, 2013, [Conference or Workshop Item]

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2), pp. 283-315. IOS Press, DOI: 10.3233/JCS-130464,
[Article]

Kauer, M. ; Franz, B. ; Pfeiffer, T. ; Heine, M. ; Christin, Delphine (2013):
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
In: Proceedings of the 31st ACM SIGCHI Conference on Human Factors in Computing Systems (CHI Works-in-Progress),
[Conference or Workshop Item]

Katzenbeisser, Stefan ; Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, pp. 881-885. [Article]

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4), pp. 305-308. [Article]

Knauer, Julian ; Baier, Harald (2012):
Zur Sicherheit von ATA-Festplattenpasswörtern.
In: DACH Security 2012,
[Conference or Workshop Item]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), pp. 189-279, Springer Verlag Heidelberg, ISBN 978-3-642-31942-6,
[Book Section]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS), 7428, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 283-301,
Springer, [Conference or Workshop Item]

Kononenko, Kirill (2012):
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
In: International Conference on Mobile Computing and Networking,
[Conference or Workshop Item]

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12),
Las Vegas, USA, [Conference or Workshop Item]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012):
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
In: Lecture notes in computer science, 7344, Berlin, Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI, 195, In: Sicherheit, pp. 187-198,
GI, Darmstadt, Germany, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Kalabis, Lukas ; Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9), pp. 670--675. DOI: 10.1007/s11623-012-0224-1,
[Article]

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von (eds.) Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
18, In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, pp. 215-220, Berlin, Duncker & Humblot, ISBN 978-3-428-13887-6,
[Book Section]

Kocabaş, Ünal ; Schulz, Steffen (2011):
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
In: ACM Conference on Computer and Communications Security (CCS), pp. 797-800,
ACM Press, [Conference or Workshop Item]

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, pp. 176-191,
Springer, [Conference or Workshop Item]

Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. (2011):
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal, [Article]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011):
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS), 6917, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 374-389,
Springer, [Conference or Workshop Item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011):
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3), pp. 177-186. [Article]

Karuppayah, Shankar ; Samad, Fahad (2011):
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
In: Lecture Notes in Informatics (LNI) - Seminars, S-10, In: Informatiktage 2011 : Fachwissenschaftlicher Informatik-Kongress ; 25. und 26. März 2011, B-IT Bonn-Aachen International Center for Information Technology in Bonn, pp. 279-282,
ISSN 1614-3213, ISBN 978-3-88579-444-8,
[Conference or Workshop Item]

Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. (2010):
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing, [Article]

Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2010):
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implementations.
In: Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010,
[Conference or Workshop Item]

Kasper, Michael ; Schindler, Werner ; Stöttinger, Marc (2010):
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implemenations.
In: Proceedings of the 2010 International Conference on Field-Programmable Technology - FPT 2010,
[Conference or Workshop Item]

Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten (2010):
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: IEEE Globecom, pp. 1 - 5,
DOI: 10.1109/GLOCOM.2010.5683139,
[Conference or Workshop Item]

Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten (2010):
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom, pp. to appear. [Article]

Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz (2010):
Reducing Configurations to Monitor in a Software Product Line.
In: LNCS, 6418, pp. 285-299, Springer, 1st International Conference on Runtime Verification (RV), [Conference or Workshop Item]

Kinder, Johannes ; Veith, Helmut
Bloem, Roderick ; Sharygina, Natasha (eds.) (2010):
Precise Static Analysis of Untrusted Driver Binaries.
In: Proceedings of the 10th International Conference on Formal Methods in Computer-Aided Design (FMCAD 2010), pp. 43-50,
IEEE Computer Society, [Conference or Workshop Item]

Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Li, Chang-Tsun (ed.) (2010):
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
In: Handbook of Research, pp. 155-175, Idea Group Reference, ISBN 1605668362,
[Book Section]

Kiefer, Franziskus (2010):
Effiziente Implementierung des PACE - und EAC-Protokolls für mobile Geräte.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kern, Oliver ; Ranade, Kedar S. ; Seyfarth, Ulrich (2010):
Complete sets of cyclic mutually unbiased bases in even prime-power dimensions.
In: Journal of Physics A: Mathematical and Theoretical, 43 (27), IOP Publishing, ISSN 1751-8113,
DOI: 10.1088/1751-8113/43/27/275305,
[Article]

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, p. 30,
Berlin, [Conference or Workshop Item]

Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]

Khelil, Abdelmajid ; Germanus, Daniel ; Suri, Neeraj (2010):
Protection of SCADA Communication Channels.
In: Advances in Critical Infrastructure Protection, Springer, [Book Section]

Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. (2010):
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
In: IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2010, pp. 60-63,
[Conference or Workshop Item]

Khelil, Abdelmajid ; Jeckel, Sebastian ; Germanus, Daniel ; Suri, Neeraj (2010):
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
In: Proc. of The 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT),
[Conference or Workshop Item]

Khalilbeigi, Mohammadreza ; Bradler, Dirk ; Schweizer, Immanuel ; Probst, Florian ; Steimle, Jürgen (2010):
Towards Computer Support of Paper Workflows in Emergency Management.
In: 7th International Conference on Information Systems for Crisis Response and Management, pp. 1-9,
Seattle, Washington, USA, [Conference or Workshop Item]

Kemetmüller, Christoph ; Seeger, Mark ; Baier, Harald ; Busch, Christoph (2010):
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
In: Eighth International Network Conference (INC 2010),
[Conference or Workshop Item]

Kevenaar, Tom ; Korte, Ulrike ; Merkle, Johannes ; Niesing, Matthias ; Ihmor, Heinrich ; Busch, Christoph ; Zhou, Xuebing (2010):
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.
[Conference or Workshop Item]

Krumov, Lachezar ; Andreeva, Adriana ; Strufe, Thorsten (2010):
Resilient Peer-to-Peer Live-Streaming using Motifs.
In: 11th IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1 -- 8,
[Conference or Workshop Item]

König, André ; Seither, Daniel ; Hollick, Matthias ; Steinmetz, Ralf (2009):
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
In: Proceedings of IEEE GLOBECOM 2009,
[Conference or Workshop Item]

Katzenbeisser, Stefan ; Kursawe, Klaus ; Stumpf, Frederic (2009):
Revocation of TPM Keys.
In: Second International Conference on Trusted Computing (TRUST 2009), pp. 120-132,
[Conference or Workshop Item]

Kallel, Slim ; Charfi, Anis ; Mezini, Mira ; Klose, Karl ; Jmaiel, Mohamed (2009):
From Formal Access Control Policies to Runtime Enforcement Aspects.
In: Proc. of the International Symposium on Engineering Secure Software and Systems (ESSOS), pp. 16--31,
Springer Verlag, Leuven, Belgium, ISBN 978-3-642-00198-7,
DOI: 10.1007/978-3-642-00199-4_2,
[Conference or Workshop Item]

Kinder, Johannes ; Veith, Helmut ; Zuleger, Florian (2009):
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
In: Lecture Notes in Computer Science, 5403, In: Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2009), pp. 214-228,
Springer, DOI: 10.1007/978-3-540-93900-9_19,
[Conference or Workshop Item]

Kern, Oliver (2009):
Randomized Dynamical Decoupling Strategies and Improved One-Way Key Rates for Quantum Cryptography.
TU-Darmstadt,
[Ph.D. Thesis]

König, A. ; Hollick, Matthias ; Steinmetz, R. (2009):
An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract).
In: Proceedings of the 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop Visions of Future Generation Networks (EuroView2009), Würzburg, Germany,
[Conference or Workshop Item]

König, A. ; Hollick, Matthias ; Steinmetz, R. (2009):
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
In: Procedings of the IEEE International Conference on Communications (IEEE ICC 2009), Dresden, Germany, pp. 1--5,
IEEE Computer Society Press, [Conference or Workshop Item]

König, André ; Gottron, Christian ; Hollick, Matthias ; Steinmetz, Ralf (2008):
Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes.
In: Procedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2008), Atlanta, USA,
IEEE Computer Society Press, [Conference or Workshop Item]

Killmann, Wolfgang ; Schindler, Werner
Oswald, E. ; Rohatgi, P. (eds.) (2008):
A Design for a Physical RNG with Robust Entropy Estimators.
In: LNCS, In: Cryptographic Hardware and Embedded Systems, CHES 2008, pp. 146--163,
Springer, Berlin, [Conference or Workshop Item]

König, André ; Hollick, Matthias ; Steinmetz, Ralf (2008):
Security for Future Wireless and Decentralized Communication Networks - Harnessing Cooperation, Space, and Time.
In: Proceedings of the 8th Wuerzburg Workshop on IP: Joint EuroNF, ITC, and ITG Workshop "Visions of Future Generation Networks" (EuroView2008),
[Conference or Workshop Item]

Kinder, Johannes ; Veith, Helmut (2008):
Jakstab: A Static Analysis Platform for Binaries.
5123, In: Proceedings of the 20th International Conference on Computer Aided Verification (CAV 2008), pp. 423--427,
Springer, [Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimmer, Robert ; Volkamer, Melanie
Krishna, Jaya ; Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press, In: E-Voting - Perspectives and Experiences,
[Conference or Workshop Item]

Krimm, Rüdiger ; Volkamer, Melanie (2008):
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008, pp. 145-156,
Boorberg Verlag, [Conference or Workshop Item]

König, A. ; Hollick, Matthias ; Krop, T. ; Steinmetz, R. (2008):
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
In: Security and Communication Networks (SCN), 2, pp. 271--288. Wiley, [Article]

Krop, T. ; Bredel, M. ; Hollick, Matthias ; Steinmetz, Ralf (2007):
JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks.
In: Proceedings of the 2nd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2007) co-located with ACM MobiCom 2007, Montreal, Canada, pp. 27--34,
[Conference or Workshop Item]

König, André ; Hollick, Matthias ; Ackermann, R. ; Steinmetz, R. (2007):
Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach.
In: Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security, pp. 45--59,
Nova Science Publishers, [Conference or Workshop Item]

Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007):
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4), p. 225. DOI: 10.1108/10650740710834626,
[Article]

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID'07, 4896, In: E-Voting and Identity, First International Conference, VOTE-ID 2007, pp. 1-15,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, pp. 13--24,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Krop, T. ; Widmer, J. ; Hollick, Matthias ; Prehofer, C. ; Steinmetz, Ralf (2006):
Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post).
In: Proceedings of Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Montreal, Canada,
[Conference or Workshop Item]

König, A. ; Hollick, Matthias ; Schmitt, J. ; Steinmetz, R. (2006):
Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract).
In: Proceedings of 2. Essener Workshop zu Neuen Herausforderungen in der Netzsicherheit (EWNS 2006), Essen, Germany,
[Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie
Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (eds.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag, In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, pp. 256-262,
[Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie (2005):
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
13, In: Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005, pp. 225-232,
Kopenhagen, [Conference or Workshop Item]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Krop, T. ; Kappes, M. ; Hollick, Matthias (2005):
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
In: Proceedings of Kommunikation in Verteilten Systemen (KiVS 2005), Workshop Peer-to-Peer-Systeme und -Anwendungen, Kaiserslautern, Germany, pp. 207-210,
[Conference or Workshop Item]

Krop, T. ; Hollick, Matthias ; Krist, F. ; Mogre, Parag S. ; Steinmetz, R. (2005):
Modeling Static and Dynamic Behavior of Routes in Mobile Ad hoc Networks (Extended Abstract and Poster).
In: Proceedings of ACM MobiCom 2005, Köln, Germany,
[Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, 27 (1), pp. 3--9. [Article]

Karjoth, Günter ; Waidner, Michael (2004):
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1), pp. 18--21. [Article]

Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)),
[Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, pp. 14--15,
[Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), pp. 2--6,
Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001,
Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael (1994):
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.
[Report]

L

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Conference or Workshop Item]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Lilien, Leszek ; Othmane, Lotfi Ben ; Angin, Pelin ; Bhargava, Bharat ; Salih, Raed ; DeCarlo, Andrew (2015):
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
In: Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW),
[Conference or Workshop Item]

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York,
[Conference or Workshop Item]

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Darmstadt, Technische Universität, [Master Thesis]

Loch, Adrian ; Quesada, Pablo ; Hollick, Matthias ; Kühne, Alexander ; Klein, Anja (2014):
Building Cross-Layer Corridors in Wireless Multihop Networks.
In: 11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2014), pp. 425--433,
DOI: 10.1109/MASS.2014.19,
[Conference or Workshop Item]

Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. (2014):
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
In: Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN 2014),
[Conference or Workshop Item]

Loch, Adrian ; Hong, Wei-Chih ; Hollick, Matthias (2014):
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
In: 39th IEEE Conference on Local Computer Networks (LCN), pp. 37--45,
DOI: 10.1109/LCN.2014.6925754,
[Conference or Workshop Item]

Loch, Adrian ; Schulz, Matthias ; Hollick, Matthias (2014):
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
In: Proceedings of the 3rd Workshop of Software Radio Implementation Forum (SRIF 2014), co-located with ACM Sigcomm 2014,
[Conference or Workshop Item]

Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, J. ; Kühne, A. ; Klein, A. (2014):
Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), pp. 1--9,
DOI: 10.1109/WoWMoM.2014.6918922,
[Conference or Workshop Item]

Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. (2014):
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
In: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), pp. 1--3,
DOI: 10.1109/WoWMoM.2014.6919011,
[Conference or Workshop Item]

Loch, Adrian ; Meier, David ; Hollick, Matthias (2014):
How did you get here? PHY-Layer Path Signatures.
In: Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014),
[Conference or Workshop Item]

Liu, Huajian ; Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Watermarking Textures in Video Games.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014,
[Conference or Workshop Item]

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick (2014):
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Report]

Loch, Adrian ; Klose, Robin ; Hollick, Matthias ; Kuehne, Alexander ; Klein, Anja (2013):
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013, Demo Session),
[Conference or Workshop Item]

Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, Jörg ; Kuehne, Alexander ; Klein, Anja (2013):
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013),
[Conference or Workshop Item]

Loch, Adrian ; Frey, Hannes ; Hollick, Matthias (2013):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing, DOI: 10.1016/j.pmcj.2013.03.004,
[Article]

Loch, Adrian ; Hollick, Matthias (2013):
Face the Enemy: Attack Detection for Planar Graph Routing.
In: Proceedings of the 2013 Conference on Networked Systems (NetSys 2013),
[Conference or Workshop Item]

Liu, H. ; Li, Y. ; Steinebach, M. (2013):
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
In: Lecture Notes in Computer Science, In: Proceeding of 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security -- CMS'2013,
Springer, [Conference or Workshop Item]

Luna, Jesus ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj ; Rak, Massimiliano ; Liccardo, Loredana (2013):
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
In: Proc. of the International Conference on Cloud Computing and Services Science (CLOSER),
[Conference or Workshop Item]

Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin (2012):
Privacy Risks in Named Data Networking: What is the Cost of Performance?
In: ACM SIGCOMM Computer Communication Review (CCR), 42 (5), pp. 54-57. Association for Computing Machinery (ACM), ISSN 0146-4833,
DOI: 10.1145/2378956.2378966,
[Article]

Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin (2012):
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.
(0812-001), [Report]

Liu, Huajian ; Steinebach, Martin (2012):
Improved Fourier domain template and patchwork embedding using spatial masking.
In: Proceedings of SPIE, In: Proceedings of Electronic Imaging 2012 - Media Watermarking, Security, and Forensics 2012,
[Conference or Workshop Item]

Luna, Jesus ; Langenberg, Robert ; Suri, Neeraj (2012):
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees.
In: Proc. of the ACM Cloud Computing Security Workshop,
[Conference or Workshop Item]

Luna, Jesus ; Suri, Neeraj ; Krontiris, Ioannis (2012):
Privacy-by-Design Based on Quantitative Threat Modeling.
In: Proc. of 7th Intl Conference on Risks and Security of Internet and Systems (CRISIS),
[Conference or Workshop Item]

Luna, Jesus ; Ghani, Hamza ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj (2012):
Quantitative Assessment of Cloud Security Level Agreements: A Case Study.
In: Proc. of International Conference on Security and Cryptography (SECRYPT),
[Conference or Workshop Item]

Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie (2011):
The Soot framework for Java program analysis: a retrospective.
Cetus Users and Compiler Infastructure Workshop (CETUS 2011), [Conference or Workshop Item]

Lux, Alexander ; Starostin, Artem (2011):
A Tool for Static Detection of Timing Channels in Java.
In: 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design,
[Conference or Workshop Item]

Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011):
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
In: 15th International Conference on Financial Cryptography and Data Security (FC),
St. Lucia, [Conference or Workshop Item]

Likavec, Lena (2011):
Application of Lattice Basis Reduction.
Darmstadt, Technische Universität, [Bachelor Thesis]

Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes (2011):
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, (7), pp. 14-15. [Article]

Lindner, Richard ; Peikert, Chris (2011):
Better Key Sizes (and Attacks) for LWE-Based Encryption.
In: CT-RSA 2011,
[Conference or Workshop Item]

Lux, Alexander ; Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Other]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Securing the E-Health Cloud.
In: 1st ACM International Health Informatics Symposium (IHI 2010),
[Conference or Workshop Item]

Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel (2010):
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010),
[Conference or Workshop Item]

Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem (2010):
Side Channel Finder (Version 1.0).
[Report]

Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding (IH 2010), pp. 193-207,
Springer, [Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2010):
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
[Report]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Patterns for Secure Boot and Secure Storage in Computer Systems.
In: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),,
[Conference or Workshop Item]

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), pp. 475-480,
IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference or Workshop Item]

Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter (2010):
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
In: ICICS,
Barcelona, Spain, [Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: ESORICS, pp. 120-135,
[Conference or Workshop Item]

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), pp. 203-210,
ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
322, In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, pp. 203-210,
Bogota, [Conference or Workshop Item]

Lodrova, Dana ; Busch, Christoph ; Tabassi, Elham ; Krodel, Wolfgang ; Drahansky, Martin (2009):
Semantic Conformance Testing Methodology for Finger Minutiae Data.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications,
ISBN 978-3-88579-249-1,
[Conference or Workshop Item]

Langer, Lucie ; Wiesmaier, Alexander (2009):
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
In: 8th European Conference on Digital Archiving (ECA2010),
Geneva, Switzerland, [Conference or Workshop Item]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009):
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS, In: European Symposium on Research in Computer Security (ESORICS), pp. 120-135,
Springer, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), pp. 1837-1846,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4, [Article]

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 61-68,
Atlanta, GA, USA, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Langer, Lucie ; Wiesmaier, Alexander (2009):
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
[Report]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009):
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
In: LNCS, 5471, In: Proceedings of the 2nd International Conference on Trusted Computing, pp. 45-62,
Springer, [Conference or Workshop Item]

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009):
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
In: LNCS, 5451, In: 5th Information Security Practice and Experience Conference (ISPEC'09), pp. 396-407,
Springer, [Conference or Workshop Item]

Liu, Huajian ; Steinebach, Martin ; Schneider, Marcel (2009):
Efficient watermark embedding for web images.
In: Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009):
From Student Smartcard Applications to the German Electronic Identity Card.
In: ECEG09, pp. 430-435,
ACI, ISBN 978-1-906638-34-4,
[Conference or Workshop Item]

Langer, Lucie ; Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
In: IRIS 2009,
[Conference or Workshop Item]

Langer, Lucie ; Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9, [Article]

Langer, Lucie (2009):
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement, Practical studies in e-Governement, [Book Section]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, pp. 243-253,
OCG Verlag, [Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Lacoste, Gérard ; Waidner, Michael (2000):
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press, pp. 147--157. [Article]

Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael (1991):
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2), pp. 71--75. [Article]

M

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
pp. 213-230, Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1817-1819,
ACM, Vienna, Austria, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Mohan, Vaishnavi ; Othmane, Lotfi Ben (2016):
SecDevOps: Is It a Marketing Buzzword?
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES),
[Conference or Workshop Item]

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016),
Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 67-77,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, pp. 46-48,
CEUR Workshop Proceedings, [Conference or Workshop Item]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Article]

Mayer, Peter ; Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015, In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 431-440,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Maass, Max ; Müller, Uwe ; Schons, Tom ; Wegemer, Daniel ; Schulz, Matthias (2015):
NFCGate: An NFC Relay Application for Android.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks,
ACM, 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'15), New York City, USA, 24.-26.06.2015, ISBN 978-1-4503-3623-9,
[Conference or Workshop Item]

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, pp. 505-516,
SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Mannes, Elisa ; Maziero, Carlos A. ; Lassance, Luiz Carlos ; Borges, Fábio (2015):
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks.
In: ISCC 2015 - The Twentieth IEEE Symposium on Computers and Communications,
IEEE, Larnaca, Cyprus, [Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Lecture notes in computer science, 8880, In: Information Systems Security : International Conference on Information Systems Security (ICISS), pp. 204-225,
Berlin, Cham, Springer International Publishing, International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
Darmstadt, Technische Universität, [Master Thesis]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014),
Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Mannes, Elisa ; Maziero, Carlos ; Lassance, Luiz Carlos ; Borges, Fábio (2014):
Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação.
In: XIV Brazilian Symposium on Information Security and Computer Systems (SBSeg), pp. 2-15,
Belo Horizonte - Brazil, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer,
[Conference or Workshop Item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Moecke, Cristian Thiago ; Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21, pp. 41-52. DOI: 10.1108/09685221311314419,
[Article]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science, In: Applied Cryptography and Network Security, pp. 136-153,
Springer, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156. [Article]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 146 - 151,
IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Moecke, Cristian Thiago ; Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85. DOI: 10.1108/09685221311314419,
[Article]

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: LNCS, In: AfricaCrypt 2012,
Springer, Al Akhawayn University, Ifran, Morocco, [Conference or Workshop Item]

Mittelbach, Arno (2012):
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Lecture Notes in Computer Science, In: Security and Cryptography for Networks, pp. 522-539,
Springer, [Conference or Workshop Item]

Martucci, Leonardo ; Zuccato, Albin ; Smeets, Ben ; Habib, Sheikh Mahbub ; Johansson, Thomas ; Shahmehri, Nahid (2012):
Privacy, Security and Trust in Cloud Computing-- The Perspective of the Telecommunication Industry.
In: 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012, pp. 627-632,
IEEE, Fukuoka, ISBN 978-1-4673-3084-8,
DOI: 10.1109/UIC-ATC.2012.166,
[Conference or Workshop Item]

Meziani, Mohammed ; Bansarkhani, Rachid El (2012):
An Efficient and Secure Coding-based Authenticated Encryption.
In: LNCS, In: 7th DPM International Workshop on Data Privacy Management (DPM 2012),
Springer, Pisa, Italy, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Communications in Computer and Information Science, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, pp. 123-131,
Springer, Brno University, Czech Republic, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Communications in Computer and Information Science, 200, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, pp. 62-71,
Springer, Brno, Czech Republic, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Martucci, Leonardo ; Fischer-Hübner, Simone
Poblet, Marta (ed.) (2011):
Privacy for Reporters of Human Rights Abuses [to appear].
In: Law, Governance and Technology Series, In: Mobile Technologies for Conflict Management. New Avenues for Online Dispute Resolution, Springer, [Book Section]

Meziani, M. ; Alaoui, Sidi Mohamed El Yousfi ; Cayrel, Pierre-Louis (2011):
Hash Functions Based on Coding Theory.
In: 2nd Workshop on Codes, Cryptography and Communication Systems (WCCCS 2011), pp. 32-37,
[Conference or Workshop Item]

Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max (2011):
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services.
In: Journal of Information Processing, 19, pp. 317-331. [Article]

McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011):
Interactive decryption of DECT phone calls.
In: Fourth ACM Conference on Wireless Network Security (WiSec '11),
Hamburg, [Conference or Workshop Item]

Mönkehues, Stephan (2011):
SWIFFT-Modifikationen, Korrektur von Operm5.
Darmstadt, Technische Universität, [Bachelor Thesis]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, pp. 147-158,
Darmstadt, [Conference or Workshop Item]

Mühlbach, Sascha ; Koch, Andreas (2011):
A Novel Network Platform for Secure and Efficient Malware Collection based on Reconfigurable Hardware Logic.
In: World Congress on Internet Security (WorldCIS 2011),
[Conference or Workshop Item]

Mitschke, Ralf ; Sewe, Andreas ; Mezini, Mira (2011):
Magic for the Masses: Safer High-level Low-level Programming through Customizable Static Analyses.
In: ACM Digital Library, In: Proceedings of the 1st workshop on Modularity in Systems Software, pp. 13-17,
First workshop on Modularity in Systems Software, Porto de Galinhas, Brazil, 22 Mar 2011, [Conference or Workshop Item]

Mühlbach, Sascha ; Koch, Andreas (2011):
NetStage/DPR: A Self-Adaptable FPGA Platform for Application-Level Network Security.
In: 7th International Symposium on Applied Reconfigurable Computing (ARC 2011),
[Conference or Workshop Item]

Milde, Benjamin ; Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011,
[Conference or Workshop Item]

Mühlbach, Sascha ; Koch, Andreas (2011):
A Scalable Multi-FPGA Platform for Complex Networking Applications.
In: 19th Annual IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM 2011),
[Conference or Workshop Item]

Malipatlolla, Sunil ; Huss, Sorin (2011):
A Novel Method for Secure Intellectual Property Deployment in Embedded Systems.
In: VII Southern IEEE International Conference on Prgrammable Logic,
[Conference or Workshop Item]

Molter, Gregor ; Stoettinger, Marc ; Shoufan, Abdulhadi ; Strenzke, Falko (2011):
A Simple Power Analysis Attack on a McEliece Cryptoprocessor.
In: Journal of Cryptographic Engineering, [Article]

Müller, S. ; Katzenbeisser, Stefan (2011):
Hiding the Policy in Cryptographic Access Control.
In: International Workshop on Security and Trust Management (STM 2011), pp. 90-105,
Springer, [Conference or Workshop Item]

Molter, Gregor ; Seffrin, André ; Huss, Sorin (2011):
State Space Optimization within the DEVS Model of Computation for Timing Efficiency.
In: 19th IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC'11),
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36. [Article]

Mantel, Heiko ; Sands, David ; Sudbrock, Henning (2011):
Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp. 218-232,
[Conference or Workshop Item]

Meziani, Mohammed ; Cayrel, Pierre-Louis ; Alaoui, Sidi Mohamed El Yousfi
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
2SC: An Efficient Code-Based Stream Cipher.
200, In: ISA, pp. 111-122,
Springer, [Conference or Workshop Item]

Milman, Ivan ; Wolfson, Charles ; Schunter, Matthias ; Hinton, Heather ; Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
12/648,876,
[Standards, patents]

Mühlbach, Sascha ; Koch, Andreas (2010):
An FPGA-based Scalable Platform for High-Speed Malware Collection in Large IP Networks.
In: 2010 International Conference on Field Programmable Technology (FPT 2010),
[Conference or Workshop Item]

Mühlbach, Sascha ; Koch, Andreas (2010):
A Dynamically Reconfigured Network Platform for High-Speed Malware Collection.
In: 2010 International Conference on ReConFigurable Computing and FPGAs (ReConFig 2010),
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
Lee, Donghoon ; Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Lecture Notes in Computer, In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, pp. 87-100,
Springer, Seoul, Korea, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Lecture Notes in Computer Science, In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), pp. 140–-155,
Springer, Kuala Lumpur, Malaysia, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Müller, Jürgen ; Massoth, Michael (2010):
Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony.
In: International Journal on Advances in Telecommunications, 3 (3&4), pp. 193--202. [Article]

Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Kohler, Jonathan ; Carlos, Marcelo Carlomagno (2010):
Uma ICP baseada em certificados digitais autoassinados.
In: X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 91-104,
[Conference or Workshop Item]

Madlener, Felix ; Weingart, Julia ; Huss, Sorin (2010):
Verification of Dynamically Reconfigurable Embedded Systems by Model Transformation Rules.
In: 4th IEEE/ACM International Conference on Hardware-Software Codesign and System Synthesis (CODES+ISSS 2010), part of the Embedded Systems Week,
[Conference or Workshop Item]

Mink, Martin ; Greifeneder, Rainer
Rannenberg, Kai ; Varadharajan, Vijay ; Weber, Christian (eds.) (2010):
Evaluation of the Offensive Approach in Information Security Education.
In: Proceedings of the 25th IFIP TC11 International Information Security Conference, SEC 2010, pp. 203-214,
Springer, [Conference or Workshop Item]

Malipatlolla, Sunil ; Huss, Sorin (2010):
A Novel Technique for FPGA IP Protection.
In: Systems and Network Security Doctoral Workshop, 55th International Scientific Colloquium (IWK 2010), TU Ilmenau,
[Conference or Workshop Item]

Mühlbach, Sascha ; Brunner, Martin ; Roblee, Christopher ; Koch, Andreas (2010):
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot using Reconfigurable Technology.
In: 20th International Conference on Field Programmable Logic and Applications (FPL 2010),
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), pp. 89-100,
[Conference or Workshop Item]

Meziani, Mohammed ; Cayrel, Pierre-Louis (2010):
Multi-Signature Scheme based on Coding Theory.
63 March 2010, In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", pp. 186-192,
[Conference or Workshop Item]

Müller, Sascha ; Katzenbeisser, Stefan (2010):
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Press, [Book Section]

Miede, André ; Ackermann, Tobias ; Repp, Nicolas ; Abawi, Daniel ; Steinmetz, Ralf ; Buxmann, Peter
Schumann, Matthias ; Kolbe, Lutz ; Breitner, Michael ; Frerichs, Arne (eds.) (2010):
Attacks on the Internet of Services – The Security Impact of Cross-organizational Service-based Collaboration.
In: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI) 2010, pp. 2151–2162,
Göttingen, Germany, [Conference or Workshop Item]

Massoth, Michael ; Acker, Robin ; Moore, Ronald (2010):
Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen.
In: Querschnitt, [Article]

Mogre, Parag S. ; d'Heureuse, N. ; Hollick, Matthias ; Steinmetz, R. (2010):
CORE: Centrally Optimized Routing Extensions for Efficient Bandwidth Management and Network Coding in the IEEE 802.16 MeSH Mode.
In: Wireless Communications and Mobile Computing, [Article]

Müller, Jürgen ; Massoth, Michael (2010):
Defense Against Direct Spam Over Internet Telephony by Caller Pre-Validation.
In: Proceedings of the 6th Advanced International Conference on Telecommunications (AICT'10), pp. 172-177,
IEEE, DOI: 10.1109/AICT.2010.40,
[Conference or Workshop Item]

Mantel, Heiko ; Sudbrock, Henning (2010):
Flexible Scheduler-independent Security.
In: LNCS 6345, In: European Symposium on Research in Computer Security (ESORICS), pp. 116-133,
Springer, [Conference or Workshop Item]

Mahmudimanesh, Mohammadreza ; Khelil, Abdelmajid ; Suri, Neeraj (2010):
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks.
In: The Third IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC),
[Conference or Workshop Item]

Müller, Jürgen ; Massoth, Michael (2010):
Abwehr von Direct Spam over Internet Telephony mittels Anrufer Pre-Validierung.
In: Technologien und Anwendungen - Vorträge der 15. ITG-Fachtagung,
[Conference or Workshop Item]

Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max (2010):
Identifiers, Privacy and Trust in the Internet of Services.
In: Proceedings {o}f the 4th {IFIP} {I}nternational {C}onference on {T}rust {M}anagement ({IFIPTM} 2010),
[Conference or Workshop Item]

Mogre, Parag S. ; Graffi, K. ; Hollick, Matthias ; Steinmetz, R. (2010):
A Security Framework for Wireless Mesh Networks.
In: Wireless Communications and Mobile Computing, [Article]

Madlener, Felix ; Stoettinger, Marc ; Huss, Sorin (2009):
Novel Hardening Techniques against Differential Power Analysis for Multiplication in GF(2^n).
In: IEEE International Conference on Field-Programmable Technology (ICFPT'09),
DOI: 10.1109/FPT.2009.5377676,
[Conference or Workshop Item]

Molter, Gregor ; Madlener, Felix ; Huss, Sorin (2009):
A System Level Design Flow for Embedded Systems based on Model of Computation Mappings.
In: 4th IFAC Workshop on Discrete-Event System Design (DESDes'09),
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: LNCS, In: Cryptology and Network Security, 8th International Conference, CANS 2009, pp. 392-401,
Springer, Kanazawa, Japan, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Madlener, Felix ; Huss, Sorin ; Biedermann, Alexander (2009):
RecDEVS: A Comprehensive Model of Computation for Dynamically Reconfigurable Hardware Systems.
In: 4th IFAC Workshop on Discrete-Event System Design (DESDes'09),
[Conference or Workshop Item]

Molter, Gregor ; Seffrin, André ; Huss, Sorin (2009):
DEVS2VHDL: Automatic Transformation of XML-specified DEVS Model of Computation into Synthesizable VHDL Code.
In: 12th IEEE Forum on Specification and Design Languages (FDL 2009),
[Conference or Workshop Item]

Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), pp. 82-86,
IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference or Workshop Item]

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4), pp. 803-819. [Article]

Madlener, Felix ; Molter, Gregor ; Huss, Sorin (2009):
SC-DEVS: An efficient SystemC Extension for the DEVS Model of Computation.
In: ACM/IEEE Design Automation and Test in Europe (DATE'09),
https://www.date-conference.com/proceedings-archive/PAPERS/2009/DATE09/PDFFILES/11.6_4.PDF, [Conference or Workshop Item]

Myhr, Geir Ove ; Renes, Joseph ; Doherty, Andrew ; Lütkenhaus, Norbert (2009):
Symmetric extension in two-way quantum key distribution.
In: Phys. Rev. A 79, 042329, [Article]

Mogre, Parag S. ; Hollick, Matthias ; Dimitrov, S. ; Steinmetz, R. (2009):
Incorporating Spatial Reuse into Algorithms for Bandwidth Management and Scheduling in IEEE 802.16j Relay Networks.
In: Proceedings of the 34th IEEE Conference on Local Computer Networks (IEEE LCN 2009), Zurich, Switzerland,
IEEE Communications Society, [Conference or Workshop Item]

Mogre, Parag S. ; Hollick, Matthias ; Schwingenschlögl, C. ; Ziller, A. ; Steinmetz, R.
Katz, Marcos ; Fitzek, Frank (eds.) (2009):
WiMAX Mesh Architectures and Network Coding.
In: WiMAX Evolution: Emerging Technologies and Applications, pp. 145--162, Wiley, [Book Section]

Mogre, Parag S. ; Hollick, Matthias ; Steinmetz, R. ; Dadia, V. ; Sengupta, S. (2009):
Distributed Bandwidth Reservation Strategies to Support Efficient Bandwidth Utilization and QoS on a Per-Link Basis in IEEE 802.16 Mesh Networks.
In: Proceedings of the 34th IEEE Conference on Local Computer Networks (IEEE LCN 2009), Zurich, Switzerland,
IEEE Communications Society, [Conference or Workshop Item]

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: International Conference on lnformation Security and Cryptology (ICISC 2008), pp. 20-36,
[Conference or Workshop Item]

Mogre, Parag S. ; Hollick, Matthias ; Kropff, M. ; Steinmetz, R. ; Schwingenschlögl, C. (2008):
A Note on Practical Deployment editions for Network Coding in the IEEE 802.16 MeSH Mode.
In: Proceedings of the 1st IEEE International Workshop on Wireless Network Coding (IEEE WiNC 2008) co-located with IEEE SECON 2008, San Francisco, USA, pp. online,
[Conference or Workshop Item]

Mogre, Parag S. ; Graffi, K. ; Hollick, Matthias ; Steinmetz, R. (2007):
AntSec, WatchAnt and AntRep:Innovative Security Mechanisms for Wireless Mesh Networks.
In: Proceedings of the 32nd IEEE Conference on Local Computer Networks (IEEE LCN 2007), Dublin, Ireland, pp. 539--547,
[Conference or Workshop Item]

Mogre, Parag S. ; Hollick, Matthias ; Steinmetz, R. (2007):
QoS in Wireless Mesh Networks: Challenges, Pitfalls and Roadmap to its Realization (Keynote Paper).
In: Proceedings of the 17th International Workshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV 2007), Urbana-Champaign, IL, USA, pp. online,
[Conference or Workshop Item]

Mogre, Parag S. ; d'Heureuse, N. ; Hollick, Matthias ; Steinmetz, R. (2007):
A Case for Joint Routing and Scheduling and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach (Extended Abstract and Poster).
In: Proceedings of IEEE MASS 2007, Pisa, Italy,
[Conference or Workshop Item]

Masip-Bruin, X. ; Yannuzzi, M. ; Domingo-Pascual, J. ; Fonte, A. ; Curado, M. ; Monteiro, E. ; Kuipers, F. ; Mieghem, P. van ; Avallone, S. ; Ventre, G. ; Aranda-Gutierrez, P. ; Hollick, Matthias ; Steinmetz, R. ; Iannone, L. ; Salamatian, K. (2006):
QoS Routing Open Agenda.
In: Computer Communications, 29, p. 563. Elsevier Science B.V., [Article]

Mogre, Parag S. ; Hollick, Matthias (2006):
The IEEE 802.16-2004 MESH Mode Explained.
(TR-KOM-2006-08), [Report]

Meissner, Andreas ; Wolf, Lars ; Hollick, Matthias ; Steinmetz, Ralf (2001):
Security Issues in Group Integrity Management for Multimedia Multicasting.
In: Proceedings of Third International Conference on Information, Communications & Signal Processing (ICICS 2001), Singapore, pp. n.a.,
Nanyang Technological University, Singapore, [Conference or Workshop Item]

N

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502, In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, pp. 371-382,
Springer, Rome, Italy, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16. DOI: 10.1007/s12243-016-0520-0,
[Article]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering,
ACM, Austin, Texas, USA, [Conference or Workshop Item]

Nadi, Sarah ; Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, [Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11), pp. 747-752. DOI: 10.1007/s11623-015-0512-7,
[Article]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015,
[Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 69 - 72,
TUT Press, Lochau, [Conference or Workshop Item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science, 8650, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, pp. 246-260,
Springer, München, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, pp. 198-207,
IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Nautsch, Andreas ; Rathgeb, Christian ; Busch, Christoph ; Reininger, Herbert ; Kasper, Klaus (2014):
Towards Duration Invariance of i-Vector-based Adaptive Score Normalization.
In: Odyssey: The Speaker and Language Recognition Workshop,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 76-91, IGI Global, [Book Section]

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 27-61, IGI Global, [Book Section]

Noisternig, M. ; Hollick, Matthias (2014):
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
In: Proc. 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'14), pp. 177–185,
Montreal, Canada, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 804-818,
Koblenz, [Conference or Workshop Item]

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013),
New Orleans, Loouisiana, USA, [Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science, 8075, In: 5th International Conference on eParticipation (ePart 2013), pp. 49-56,
Springer, Koblenz, Germany, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464), pp. 1-12. International Association for Cryptologic Research (IACR), [Article]

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13),
[Conference or Workshop Item]

Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Conference or Workshop Item]

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
pp. 1-2, Menlo Park, California, [Conference or Workshop Item]

Nitsche, Thomas ; Widmer, Jörg ; Loch, Adrian ; Hollick, Matthias (2013):
EVM and RSSI Link Quality Measurements in Frequency Selective Fading Channels.
In: Proceedings of the 14th IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC 2013),
[Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), pp. 277-284,
Salzburg, Austria, [Conference or Workshop Item]

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, pp. 155-164,
Springer, Limoges, France, [Conference or Workshop Item]

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS, In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, pp. 91-104,
Regensburg, Germany, [Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), pp. 180-185,
IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3), pp. 137-147. [Article]

Neumann, Stephan ; Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
ICIMP 2012, The Seventh I, In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 30-39,
ThinkMind Digital Library, Stuttgart. Germany, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Nogueira, Hendri ; Custódio, Ricardo Felipe ; Moecke, Cristian Thiago ; Wangham, Michelle (2011):
Using Notary Based Public Key Infrastructure in Shibboleth Federation.
In: Workshop de Gestão de Identidades - WGID/SBSeg, pp. 405-414,
[Conference or Workshop Item]

Nazar, Assem ; Seeger, Mark ; Baier, Harald (2011):
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
In: Lecture Notes in Computer Science, In: 16th Nordic Conference in Secure IT Systems (NordSec 2011),
Springer-Verlag, Tallinn, Estonia, [Conference or Workshop Item]

Niebuhr, Robert ; Cayrel, Pierre-Louis (2011):
Broadcast Attacks against Code-Based Schemes.
In: LNCS, In: 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, pp. 1-17,
Springer, Weimar, Germany, ISBN 978-3-642-34158-8,
[Conference or Workshop Item]

Nickel, Claudia ; Busch, Christoph ; Rangarajan, Sathyanarayanan ; Möbius, Manuel (2011):
Using Hidden Markov Models for Accelerometer-Based Biometric Gait Recognition.
[Conference or Workshop Item]

Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha (2011):
Re-synchronizing audio watermarking after nonlinear time stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII,
[Conference or Workshop Item]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Buchmann, Johannes (2011):
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
In: The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011),
[Conference or Workshop Item]

Nickel, Claudia ; Derawi, Mohammad ; Bours, Patrick ; Busch, Christoph (2011):
Scenario Test for Accelerometer-Based Biometric Gait Recognition.
In: 3rd International Workshop on Security and Communication Networks (IWSCN 2011),
[Conference or Workshop Item]

Nickel, Claudia ; Busch, Christoph (2011):
Classifying Accelerometer Data via Hidden Markov Models to Authenticate People by the Way they Walk.
In: 45th IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY,
[Conference or Workshop Item]

Nickel, Claudia ; Brandt, Holger ; Busch, Christoph (2011):
Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices.
In: BIOSIG 2011,
[Conference or Workshop Item]

Nickel, Claudia ; Brandt, Holger ; Busch, Christoph (2011):
Benchmarking the Performance of SVMs and HMMs for Accelerometer-Based Biometric Gait Recognition.
In: Proceedings of the 11th IEEE International Symposium on Signal Processing and Information Technology,
[Conference or Workshop Item]

Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin (2010):
RAY - A Secure Microkernel Architecture.
In: IEEE Privacy Security and Trust 2010 (PST2010),
[Conference or Workshop Item]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), pp. 143-157,
[Conference or Workshop Item]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010,
China Press, [Conference or Workshop Item]

Nickel, Claudia ; Zhou, Xuebing ; Busch, Christoph (2010):
Template Protection for Biometric Gait Data.
[Conference or Workshop Item]

Nickel, Claudia ; Zhou, Xuebing ; Busch, Christoph (2009):
Template Protection via Piecewise Hashing.
In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009),
[Conference or Workshop Item]

Nickel, Claudia (2009):
Authentisierung an mobilen Geräten mittels Gangerkennung.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 280-283. [Article]

Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2009):
Random unitary dynamics of quantum networks.
In: eprint, [Article]

Novotny, J. ; Alber, G. ; Jex, I. (2009):
Random unitary dynamics of quantum networks.
In: J. Phys. A 42, 282003, [Article]

O

Othmane, Lotfi Ben ; Chehrazi, Golriz ; Bodden, Eric ; Tsalovski, Petar ; Brucker, Achim (2015):
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
[Report]

Othmane, Lotfi Ben ; Chehrazi, Golriz ; Bodden, Eric ; Tsalovski, Petar ; Brucker, Achim ; Miseldine, Philip (2015):
Factors Impacting the Effort Required to Fix Security Vulnerabilities.
In: Proc. of the 18th Information Security Conference (ISC 2015),
[Conference or Workshop Item]

Othmane, Lotfi Ben ; Ranchal, Rohit ; Fernando, Ruchith ; Bhargava, Bharat ; Bodden, Eric (2015):
Incorporating Attacker Capabilities in Risk Estimation and Mitigation.
In: Computers & Security, 51, pp. 41–61. DOI: 10.1016/j.cose.2015.03.001,
[Article]

Ossenbühl, Sven ; Steinberger, Jessica ; Baier, Harald (2015):
Towards automated incident handling: How to select an appropriate response against a network-based attack?
In: 2015 Ninth International Conference on IT Security Incident Management & IT Forensics,
Magdeburg (Germany), [Conference or Workshop Item]

Othmane, Lotfi Ben ; Weffers, Harold ; Mohamad, Mohd Murtadha ; Wolf, Marko
Benhaddou, Driss ; Al-Fuqaha, Ala (eds.) (2015):
Wireless Sensor and Mobile Ad-Hoc Networks.
pp. 217-247, Springer New York, [Book Section]

Othmane, Lotfi Ben ; Cerqueus, Thomas ; Thiery, Adrien ; Salehie, Mazeiar ; Noel, Nicolas ; Labaere, Anthony ; Domingues, Remi ; Cordier, Arnaud ; Ventresque, Anthony ; Pasquale, Liliana ; Perry, Philip ; Nuseibeh, Bashar (2015):
Response to Emergency Situations in a Traffic Management System.
In: Proc. International Conference on Computer Information Systems,
[Conference or Workshop Item]

Oueslati, Hela ; Rahman, Mohammad Masudur ; Othmane, Lotfi Ben (2015):
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
In: Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015),
Toulouse, France, [Conference or Workshop Item]

Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat (2014):
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 11 (6), pp. 497-509. [Article]

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master Thesis]

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Othmane, Lotfi Ben ; Angin, Pelin ; Bhargava, Bharat (2014):
Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
In: Proc. of the 9th International Conference on Availability, Reliability and Security (ARES),
Fribourg, Switzerland, [Conference or Workshop Item]

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: SEC'13, In: Proceedings of the 22nd USENIX Conference on Security, pp. 543-558, Berkeley, Calif, USENIX Association, ISBN 978-1-931971-03-4,
[Book Section]

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS), 8068, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 107-125,
Springer, [Conference or Workshop Item]

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 142 - 155,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
pp. 172 - 201, IGI Global, ISBN 978-1-4666-3640-8,
DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Olembo, Maina ; Stockhardt, Simon ;