TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 29.

Baumann, Peter and Katzenbeisser, Stefan and Stopczynski, Martin and Tews, Erik :
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society ACM
[Conference or Workshop Item] , (2016)

Senftleben, Marius and Barroso, Ana and Bucicoiu, Mihai and Hollick, Matthias and Katzenbeisser, Stefan and Tews, Erik :
On the Privacy and Performance of Mobile Anonymous Microblogging.
In: IEEE Transactions on Information Forensics and Security, 11 (7) 1578 - 1591.
[Article] , (2016)

Schulz, Matthias and Klapper, Patrick and Hollick, Matthias and Tews, Erik :
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016) ACM
[Conference or Workshop Item] , (2016)

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Conference or Workshop Item] , (2014)

Meyer, Christopher and Somorovsky, Juraj and Weiss, Eugen and Schwenk, Jörg and Schinzel, Sebastian and Tews, Erik :
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14 . USENIX Association
[Conference or Workshop Item] , (2014)

Senftleben, Marius and Bucicoiu, Mihai and Tews, Erik and Armknecht, Frederik and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
Financial Cryptography and Data Security (FC'14) Springer
[Conference or Workshop Item] , (2014)

Ghiglieri, Marco and Tews, Erik :
A Privacy Protection System for HbbTV in Smart TVs.
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) IEEE
[Conference or Workshop Item] , (2014)

Tews, Erik and Weiner, M. and Massar, M. and Giese, D. and Wieser, W. :
Security analysis of a widely deployed locking system.
In:
[Article] , (2013)

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) :

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Conference or Workshop Item] , (2013)

Tews, Erik :
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.

[Report] , (2013)

Ghiglieri, Marco and Oswald, Florian and Tews, Erik :
HbbTV - I Know What You Are Watching.
13. Deutschen IT-Sicherheitskongresses SecuMedia Verlags-GmbH
[Conference or Workshop Item] , (2013)

Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Article] , (2013)

Tews, Erik :
DECT Security Analysis.
[Online-Edition: urn:nbn:de:tuda-tuprints-29328]
TU Darmstadt , Darmstadt
[Ph.D. Thesis], (2011)

McHardy, Patrick and Schuler, Andreas and Tews, Erik :
Interactive decryption of DECT phone calls.
Fourth ACM Conference on Wireless Network Security (WiSec '11)
[Conference or Workshop Item] , (2011)

Tews, Erik and Wälde, Julian and Weiner, Michael :
Breaking DVB-CSA.
Western European Workshop on Research in Cryptology - WEWoRC 2011
[Conference or Workshop Item] , (2011)

Weiner, Michael and Tews, Erik and Heinz, Benedikt and Heyszl, Johann :
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
In: LNCS . Springer
[Conference or Workshop Item] , (2010)

Nohl, Karsten and Tews, Erik :
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 2010 (11)
[Article] , (2010)

Karatsiolis, Vangelis and Langer, Lucie and Schmidt, Axel and Tews, Erik and Wiesmaier, Alexander :
Cryptographic Application Scenarios.

[Report] , (2010)

Nohl, Karsten and Tews, Erik and Weinmann, Ralf-Philipp :
Cryptanalysis of the DECT Standard Cipher.
Fast Software Encryption 2010
[Conference or Workshop Item] , (2010)

Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp :
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009) IEEE Computer Society
[Conference or Workshop Item] , (2009)

Lucks, Stefan and Schuler, Andreas and Tews, Erik and Weinmann, Ralf-Philipp and Wenzel, Matthias
Fischlin, Marc (ed.) :

Attacks on the DECT authentication mechanisms.
In: LNCS (5473). Springer
[Conference or Workshop Item] , (2009)

Beck, Martin and Tews, Erik :
Practical attacks against WEP and WPA.
Second ACM Conference on Wireless Network Security - WISEC 2009
[Conference or Workshop Item] , (2009)

Strenzke, Falko and Tews, Erik and Molter, Gregor and Overbeck, Raphael and Shoufan, Abdulhadi :
Side Channels in the McEliece PKC.
In: Lecture Notes in Computer Science (5299/2008).
[Conference or Workshop Item] , (2008)

Kühn, Ulrich and Pyshkin, Andrei and Tews, Erik and Weinmann, Ralf-Philipp :
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit
[Conference or Workshop Item] , (2008)

Hartle, Michael and Schumann, Daniel and Botchak, Arsene and Tews, Erik and Mühlhäuser, Max :
Describing Data Format Exploits using Bitstream Segment Graphs <b> (best paper award)</b>.
Proceedings of the Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008) IEEE Press, New York, NY
[Conference or Workshop Item] , (2008)

Tews, Erik :
Attacks on the WEP protocol.
Technische Universit&auml;t Darmstadt
[Master Thesis] , (2007)

Tews, Erik and Weinmann, Ralf-Philipp and Pyshkin, Andrei :
Breaking 104 Bit WEP in Less Than 60 Seconds.
WISA
[Conference or Workshop Item] , (2007)

Bär, Henning Cornelius and Tews, Erik and Rößling, Guido :
Improving feedback and classroom interaction using mobile phones.
In: Proceedings of mobile learning, 2005.- IADIS Pr.- S. 55-62 .
[Conference or Workshop Item] , (2005)

Bär, Henning Cornelius and Mühlhäuser, Max and Tews, Erik and Rößling, Guido :
Interaction during lectures using mobile phones.
In: Proceedings of ED-Media 2005, World Conference on Educational Multimedia, Hypermedia & Telecommunications : June 27 - July 2, 2005 Montréal, Canada / AACE, Association for the Advancement of Computing in Education. Ed. by Piet Kommers ...- Norfolk, Va. : . AACE , Norfolk, Va.
[Conference or Workshop Item] , (2005)

This list was generated on Tue May 21 01:09:14 2019 CEST.