Items in division
- TU Darmstadt (101947)
- DFG-Graduiertenkollegs (467)
- Research Training Group 2050 Privacy and Trust for Mobile Users (158)
- DFG-Graduiertenkollegs (467)
A
Avramidis, Mario ; Kellner, Christiane ; Staudt, Josefine ; Zimmermann, Verena ; Gerber, Nina
Wienrich, Carolin ; Wintersberger, Philipp ; Weyers, Benjamin (eds.) (2021):
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance.
In: Mensch und Computer 2021 - Workshopband,
Bonn, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2021-mci-ws10-351,
[Conference or Workshop Item]
Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]
Aragon, Santiago ; Tiloca, Marco ; Maass, Max ; Hollick, Matthias ; Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: IEEE Conference on Communications and Network Security,
IEEE, 6th IEEE Conference on Communications and Network Security (CNS 2018), Beijing, China, 30.05.-01.06.2018, ISBN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Conference or Workshop Item]
B
Brüggemann, Andreas ; Hundt, Robin ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023):
FLUTE: Fast and Secure Lookup Table Evaluations.
In: Cryptographic Protocols, (Preprint), Cryptology ePrint Archive, 2023/499, [Report]
Brüggemann, Andreas ; Breuer, Malte ; Klinger, Andreas ; Schneider, Thomas ; Meyer, Ulrike (2022):
Secure Maximum Weight Matching Approximation on General Graphs.
In: WPES'22: Proceedings of the 21st Workshop on Privacy in the Electronic Society, pp. 83-87,
New York, NY, ACM, CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, USA, 07.11.2022, ISBN 978-1-4503-9873-2,
DOI: 10.1145/3559613.3563209,
[Conference or Workshop Item]
Brüggemann, Andreas ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2022):
POSTER: Efficient three-party shuffling using precomputation.
In: CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 3331-3333,
ACM, CCS '22: ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, USA, 07.-11.11.2022, ISBN 978-1-4503-9450-5,
DOI: 10.1145/3548606.3563511,
[Conference or Workshop Item]
Buhleier, Laura ; Linsner, Sebastian ; Steinbrink, Enno ; Reuter, Christian (2022):
Eine Klassifikation sicherheitskritischer UX-Design-Patterns.
In: Mensch und Computer 2022 - Workshopband,
Gesellschaft für Informatik e.V., Mensch und Computer 2022: Facing Realities, Darmstadt, Germany, 04.-07.09.2022, DOI: 10.18420/muc2022-mci-ws10-275,
[Conference or Workshop Item]
Balthasar, Mandy ; Gerber, Nina ; Schmitt, Hartmut
Ludewig, Elske ; Jackstädt, Thomas (eds.) (2022):
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen.
In: Mensch und Computer 2021 - Usability Professionals,
Bonn, Gesellschaft für Informatik e.V. und German UPA e.V., DOI: 10.18420/muc2021-up-448,
[Conference or Workshop Item]
Biselli, Tom ; Steinbrink, Enno ; Herbert, Franziska ; Schmidbauer-Wolf, Gina M. ; Reuter, Christian (2022):
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas.
In: Proceedings on Privacy Enhancing Technologies, 4, pp. 645-669, 22nd Privacy Enhancing Technologies Symposium (PETS 2022), Sydney, Australia, 11.-15.07.2022, ISSN 2299-0984,
DOI: 10.56553/popets-2022-0126,
[Conference or Workshop Item]
Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021):
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), virtual Conference, 07.-11.06.2021, [Conference or Workshop Item]
Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil
Moriai, Shiho ; Wang, Huaxiong (eds.) (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: Lecture Notes in Computer Science, 12491, In: Advances in Cryptology - ASIACRYPT 2020, pp. 221-252,
Springer, 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), Daejeon, Korea, 07.-11.12.2020, DOI: 10.1007/978-3-030-64837-4_8,
[Conference or Workshop Item]
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]
Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference or Workshop Item]
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]
Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00009642,
[Ph.D. Thesis]
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]
Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]
Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), pp. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]
Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]
Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, pp. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book Section]
Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Book]
Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, pp. 118–134,
De Gruyter, Minneapolis, USA, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]
Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
pp. 15:1-15:8, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Conference or Workshop Item]
Brendel, J. ; Demirel, D. (2016):
Efficient proactive secret sharing.
pp. 543-550, 2016 14th Annual Conference on Privacy, Security and Trust (PST), DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]
C
Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: Cryptography and Security, (Preprint), Version 1, arXiv, 2008.04449, [Report]
D
Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Conference or Workshop Item]
Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]
Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]
Daubert, Jörg (2017):
GRK 2050: D.4 AlterEgo.
Schloß Dagstuhl, Germany, Schloß Dagstuhl, [Report]
Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76, pp. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]
Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]
Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]
F
Fecho, Mariska ; Wiefel, Jennifer (2022):
Trust Transfer towards Autonomous Vehicles: The Role of Vendor’s Innovativeness.
Taipei (virtuell), Pacific Asia Conference on Information Systems 2022, Taipei-Sydney, 5. - 9. July 2022, [Conference or Workshop Item]
Fischlin, Marc ; Sanina, Olga
Tibouchi, Mehdi ; Wang, Huaxiong (eds.) (2021):
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
In: Lecture Notes in Computer Science, 13091, In: Advances in Cryptology - ASIACRYPT 2021, pp. 696-725,
Springer, 27th International Conference on the Theory and Application of Cryptology and Information Security, virtual Conference, 06.-10.12.2021, ISBN 978-3-030-92074-6,
DOI: 10.1007/978-3-030-92075-3_24,
[Conference or Workshop Item]
Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Conference or Workshop Item]
Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2021):
Zero-Interaction Security-Towards Sound Experimental Validation. (Postprint)
In: GetMobile: Mobile Computing and Communications, 23 (2), Association for Computing Machinery (ACM), ISSN 2375-0529, e-ISSN 2375-0537,
DOI: 10.26083/tuprints-00018518,
[Article]
Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]
Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), pp. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Article]
Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]
Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1), ACM, DOI: 10.1145/3314397,
[Article]
Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]
Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]
Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]
G
Gerber, Nina ; Marky, Karola
USENIX Association (ed.) (2022):
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior.
In: Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pp. 57-76,
USENIX Association, 18th Symposium on Usable Privacy and Security, Boston, USA, 07.-09.08.2022, ISBN 978-1-939133-30-4,
[Conference or Workshop Item]
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2022):
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack. (Postprint)
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4), ACM, e-ISSN 2474-9567,
DOI: 10.26083/tuprints-00020660,
[Article]
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2021):
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4), ACM, e-ISSN 2474-9567,
DOI: 10.1145/3494986,
[Article]
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Wainakh, Aidmar ; Mühlhäuser, Max ; Nadjm-Tehrani, Simin (2021):
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection.
In: ACM Transactions on Privacy and Security, 24 (2), ACM, ISSN 2471-2566,
DOI: 10.1145/3424155,
[Article]
Gerber, Paul ; Heidinger, Marvin ; Stiegelmayer, Julia ; Gerber, Nina (2021):
LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing.
In: Mensch und Computer 2021, pp. 578-581,
New York, NY, United States, DOI: 10.1145/3473856.3474094,
[Conference or Workshop Item]
Grube, Tim ; Heinrich, Alexander ; Stroscher, Jan-Philipp ; Schomberg, Sabrina (2020):
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8), pp. 501-505. Springer Nature, ISSN 1862-2607,
DOI: 10.1007/s11623-020-1314-0,
[Article]
Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]
Gedeon, Julien ; Brandherm, Florian ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max (2019):
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges.
In: IEEE Access, 7, pp. 152847-152878. IEEE, ISSN 2169-3536,
DOI: 10.1109/ACCESS.2019.2948399,
[Article]
Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Conference or Workshop Item]
Gerber, Nina ; Reinheimer, Benjamin ; Volkamer, Melanie (2019):
Investigating People’s Privacy Risk Perception.
In: Proceedings on Privacy Enhancing Technologies, 2019 (3), pp. 267-288. ISSN 2299-0984,
DOI: 10.2478/popets-2019-0047,
[Article]
Grube, Tim (2018):
Efficient Anonymous Group Communication.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Ghiglieri, Marco ; Henhapl, Birgit ; Gerber, Nina
Dachselt, Raimund ; Weber, Gerhard (eds.) (2018):
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
In: Mensch und Computer 2018 - Workshopband,
Bonn, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2018-ws08-0542,
[Conference or Workshop Item]
Gerber, Nina ; Gerber, Paul ; Volkamer, Melanie (2018):
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior.
In: Computers & Security, 77 (1), pp. 226-261. ISSN 01674048,
DOI: 10.1016/j.cose.2018.04.002,
[Article]
Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]
Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]
H
Hamacher, Kay ; Kussel, Tobias ; Schneider, Thomas ; Tkachenko, Oleksandr (2022):
PEA: Practical private epistasis analysis using MPC.
In: Lecture Notes in Computer Science, 13556, In: Computer Security - ESORICS 2022, pp. 320-339,
Springer, 27th European Symposium on Research in Computer Security (ESORICS 2022), Copenhagen, Denmark, 26.-30.09.2022, ISBN 978-3-031-17142-0,
DOI: 10.1007/978-3-031-17143-7_16,
[Conference or Workshop Item]
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2022):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. (Publisher's Version)
In: Proceedings of the 30th USENIX Security Symposium, pp. 3577-3594,
Darmstadt, USENIX Association, 30th USENIX Security Symposium (USENIX Security 21), Virtual event, 11.-13.08.2021, ISBN 978-1-939133-24-3,
DOI: 10.26083/tuprints-00020599,
[Conference or Workshop Item]
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium, virtual Conference, 11.-13.08.2021, [Conference or Workshop Item]
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
In: WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 371-373,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468252,
[Conference or Workshop Item]
Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, pp. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Conference or Workshop Item]
Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]
Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021), virtual Conference, 12.-16.07.2021, [Conference or Workshop Item]
Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Conference or Workshop Item]
J
Jöntgen, Hendrik (2022):
Appreciating Support - Antecedents of Subscription-Based Crowdfunding Campaign Success.
In: Proccedings of the 55th Hawaii International Conference on System Sciences,
University of Hawai'i at Manoa, 55th Hawaii International Conference on System Sciences (HICSS 2022), virtual Conference, 03.-07.01.2022, ISBN 978-0-9981331-5-7,
DOI: 10.24251/HICSS.2022.101,
[Conference or Workshop Item]
Jöntgen, Hendrik (2020):
Fueling the Firestorm: Effects of Social Capital on Users' Persuasiveness during Online Firestorms.
In: Proceedings of the 28th European Conference on Information Systems,
AIS eLibrary, 28th European Conference on Information Systems (ECIS 2020), virtual Conference, 15.-17.06.2020, ISBN 978-1-7336325-1-5,
[Conference or Workshop Item]
Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]
K
Kuntke, Franz ; Romanenko, Vladimir ; Linsner, Sebastian ; Steinbrink, Enno ; Reuter, Christian (2022):
LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios.
In: Transactions on Emerging Telecommunications Technologies, 33 (5), Wiley & Sons Ltd., ISSN 1124-318X,
DOI: 10.1002/ett.4452,
[Article]
Kuntke, Franz ; Linsner, Sebastian ; Steinbrink, Enno ; Franken, Jonas ; Reuter, Christian (2022):
Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers.
In: International Journal of Disaster Risk Science, 13 (2), pp. 214-229. Springer, ISSN 2095-0055,
DOI: 10.1007/s13753-022-00404-7,
[Article]
Kamara, Seny ; Kat, Abdelkarim ; Moataz, Tarik ; Schneider, Thomas ; Treiber, Amos ; Yonli, Michael (2022):
SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data.
7th IEEE European Symposium on Security and Privacy (EuroS&P'22), Genoa, Italy, 06.-10.06.2022, [Conference or Workshop Item]
Kamara, Seny ; Kati, Abdelkarim ; Moataz, Tarik ; Schneider, Thomas ; Treiber, Amos ; Yonli, Michael (2021):
Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data.
(Preprint), Cryptology ePrint Archive, 2021/1035, [Report]
Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08.07.2021, [Conference or Workshop Item]
Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Privacy - Preserving Clustering.
In: crypto day matters : Beiträge vom 32. Kryptotag,
Gesellschaft für Informatik e.V. / FG KRYPTO, 32. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik, virtual Conference, 15.01.2021, DOI: 10.18420/cdm-2021-32-42,
[Conference or Workshop Item]
Kröger, Jacob Leon ; Lutz, Otto Hans-Martin ; Müller, Florian
Friedewald, Michael ; Önen, Melek ; Lievens, Eva ; Krenn, Stephan ; Fricker, Samue (eds.) (2020):
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking.
In: IFIP Advances in Information and Communication Technology, 576, In: Privacy and Identity Management. Data for Better Living: AI and Privacy, pp. 226-241,
Springer, 14th Annual IFIP Summer School on Privacy and Identity Management, Windisch, Switzerland, 19.-23.08.2019, ISBN 978-3-030-42503-6,
DOI: 10.1007/978-3-030-42504-3_15,
[Conference or Workshop Item]
Kulyk, Oksana ; Reinheimer, Benjamin ; Aldag, Lukas ; Mayer, Peter ; Gerber, Nina ; Volkamer, Melanie (2020):
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation.
12063, In: Financial Cryptography and Data Security, pp. 84-101,
Basel, Schweiz, ISSN 0302-9743,
DOI: 10.1007/978-3-030-54455-3_7,
[Conference or Workshop Item]
Keller, Katharina ; Carl, Kim Valerie ; Jöntgen, Hendrik ; Hinz, Oliver ; Mühlhäuser, Max ; Abdel-Karim, Benjamin M. (2019):
“K.I.T.T., where are you?” : Why smart assistance systems in cars enrich people's lives.
In: UbiComp/ISWC ’19 Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, pp. 1120-1132,
ACM, 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'19), London, United Kingdom, 09.-13.09.2019, ISBN 978-1-4503-6869-8,
DOI: 10.1145/3341162.3350844,
[Conference or Workshop Item]
Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Conference or Workshop Item]
Kulyk, Oksana ; Gerber, Nina ; Volkamer, Melanie ; Hilt, Annika (2019):
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen.
In: Datenschutz und Datensicherheit - DuD, 43 (2), pp. 81-85. ISSN 1614-0702,
DOI: 10.1007/s11623-019-1068-8,
[Article]
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: crypto day matters: Beiträge vom 29. Kryptotag,
Gesellschaft für Informatik e.V., Kryptotag29: 29. Krypto-Tag @ Bosch, Renningen, Germany, 06.-07.09.2018, DOI: 10.18420/cdm-2018-29-24,
[Conference or Workshop Item]
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, pp. 66-70,
ACM, CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 15.10.2018, ISBN 978-1-4503-5989-4,
DOI: 10.1145/3267323.3268963,
[Conference or Workshop Item]
Karegar, Farzaneh ; Gerber, Nina ; Volkamer, Melanie ; Fischer-Hübner, Simone (2018):
Helping john to make informed decisions on using social login.
In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, pp. 1165-1174,
New York, NY, United States, DOI: 10.1145/3167132.3167259,
[Conference or Workshop Item]
Kulyk, Oksana ; Hilt, Annika ; Gerber, Nina ; Volkamer, Melanie (2018):
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer.
In: 3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018,
Reston, Virginia, Vereinigte Staaten, Internet Society, ISBN 1-891562-54-1 (falsch),
[Conference or Workshop Item]
L
Linsner, Sebastian ; Steinbrink, Enno ; Kuntke, Franz ; Franken, Jonas ; Reuter, Christian (2022):
Supporting users in data disclosure scenarios in agriculture through transparency.
41, In: Behaviour & Information Technology, (10), pp. 2151-2173. ISSN 0144-929X,
DOI: 10.1080/0144929X.2022.2068070,
[Article]
Linsner, Sebastian ; Kuntke, Franz ; Steinbrink, Enno ; Franken, Jonas ; Reuter, Christian (2022):
The Role of Privacy in Digitalization – Analyzing Perspectives of German Farmers. (Publisher's Version)
In: Proceedings on Privacy Enhancing Technologies, 2021 (3), pp. 334-350. Sciendo, ISSN 2299-0984,
DOI: 10.26083/tuprints-00022162,
[Article]
Linsner, Sebastian ; Kuntke, Franz ; Steinbrink, Enno ; Franken, Jonas ; Reuter, Christian (2021):
The Role of Privacy in Digitalization - Analysing the German Farmers' Perspective.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3), pp. 334-350. De Gruyter Open, e-ISSN 2299-0984,
DOI: 10.2478/popets-2021-0050,
[Article]
M
Maass, Max ; Stöver, Alina ; Pridöhl, Henning ; Bretthauer, Sebastian ; Herrmann, Dominik ; Hollick, Matthias ; Spiecker, Indra (2022):
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support. (Publisher's Version)
In: Proceedings of the 30th USENIX Security Symposium, pp. 2489-2506,
Darmstadt, USENIX Association, 30th USENIX Security Symposium (USENIX Security 21), Virtual event, 11.-13.08.2021, ISBN 978-1-939133-24-3,
DOI: 10.26083/tuprints-00020574,
[Conference or Workshop Item]
Maass, Max ; Stöver, Alina ; Pridöhl, Henning ; Bretthauer, Sebastian ; Herrmann, Dominik ; Hollick, Matthias ; Spiecker gen. Döhmann, Indra (2021):
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support.
In: Proceedings of the 30th USENIX Security Symposium,
USENIX Association, 30th USENIX Security Symposium (USENIX Security 21), virtual Conference, 11.-13.08.2021, ISBN 978-1-939133-24-3,
[Conference or Workshop Item]
Meurisch, Christian ; Mühlhäuser, Max (2021):
Data Protection in AI Services: A Survey.
In: ACM Computing Surveys, 54 (2), ACM, ISSN 0360-0300,
DOI: 10.1145/3440754,
[Article]
Maass, Max ; Wichmann, Pascal ; Pridöhl, Henning ; Herrmann, Dominik (2021):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites. (Postprint)
In: Lecture Notes in Computer Science, 10518, In: Privacy Technologies and Policy, pp. 178-191,
Cham, Springer, 5th Annual Privacy Forum (APF 2017), Wien, 07.-08.06.2017, ISBN 978-3-319-67279-3,
DOI: 10.26083/tuprints-00017854,
[Conference or Workshop Item]
Maass, Max Jakob (2021):
Improving Online Privacy and Security Through Crowdsourced Transparency Platforms and Operator Notifications. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00019190,
[Ph.D. Thesis]
Marky, Karola ; Voit, Alexandra ; Stöver, Alina ; Kunze, Kai ; Schröder, Svenja ; Mühlhäuser, Max (2020):
”I Don’t Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments.
In: NordiCHI '20: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society,
ACM, 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (NordiCHI '20), virtual Conference, 25.-29.10.2020, ISBN 978-1-4503-7579-5,
DOI: 10.1145/3419249.3420164,
[Conference or Workshop Item]
Müllmann, Dirk ; Ebert, Andreas ; Reissner, Loïc (2020):
IT-Sicherheitsgesetz 2.0 und das Vorbild USA: Ein Rechtsvergleich.
In: Computer und Recht, 36 (9), pp. 584-592. Verlag Dr. Otto Schmidt, ISSN 2194-4172,
DOI: 10.9785/cr-2020-360910,
[Article]
Marky, Karola ; Zimmermann, Verena ; Stöver, Alina ; Hoffmann, Philipp ; Kunze, Kai ; Mühlhäuser, Max (2020):
All in One! User Perceptions on Centralized IoT Privacy Settings.
In: CHI'20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems,
ACM, 38th CHI Conference on Human Factors in Computing Systems, virtual Conference, 25.-30.04.2020, ISBN 978-1-4503-6819-3,
DOI: 10.1145/3334480.3383016,
[Conference or Workshop Item]
Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference or Workshop Item]
Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]
Maass, Max ; Schwär, Stephan ; Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: LNCS, 11498, In: Privacy Technologies and Policy, pp. 18-27,
Springer, 7th Annual Privacy Forum (APF 2019), Rome, Italy, 13.-14.06.2019, DOI: 10.1007/978-3-030-21752-5_2,
[Conference or Workshop Item]
Mayer, Peter ; Gerber, Nina ; Reinheimer, Benjamin ; Rack, Philipp ; Braun, Kristoffer ; Volkamer, Melanie (2019):
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads.
In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1-12,
New York, NY, United States, DOI: 10.1145/3290605.3300779,
[Conference or Workshop Item]
Maass, Max (2017):
Web-Privacy: Lustwandeln im Trackergarten.
MetaRheinMainChaosDays - Bundesdatenschau (MRMCD 2017), Darmstadt, Germany, 01.-03.09.2017, [Conference or Workshop Item]
Maass, Max ; Laubach, Anne ; Herrmann, Dominik (2017):
PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
In: INFORMATIK 2017, pp. 1049-1060,
Gesellschaft für Informatik e.V., 47. Jahrestagung der Gesellschaft für Informatik (INFORMATIK 2017), Chemnitz, Germany, 25.-29.09.2017, ISBN 978-3-88579-669-5,
DOI: 10.18420/in2017_107,
[Conference or Workshop Item]
Maass, Max ; Wichmann, Pascal ; Pridöhl, Henning ; Herrmann, Dominik (2017):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
In: Proceedings of the Annual Privacy Forum 2017,
Springer, Annual Privacy Forum 2017, Vienna, ISBN 978-3-319-67280-9,
DOI: 10.1007/978-3-319-67280-9_10,
[Conference or Workshop Item]
Maass, Max ; Laubach, Anne ; Herrman, Dominik (2017):
PrivacyScore : Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme : Konzept und rechtliche Zulässigkeit. (Publisher's Version)
In: Lecture Notes in Informatics (LNI) - Proceedings, P-275, In: INFORMATIK 2017, pp. 1049-1060,
Bonn, Gesellschaft für Informatik, INFORMATIK 2017 - Jahrestagung der Gesellschaft für Informatik, Chemnitz, Deutschland, 25.-29.09.2017, ISSN 1617-5468, ISBN 978-3-88579-669-5,
DOI: 10.25534/tuprints-00014292,
[Conference or Workshop Item]
Maass, Max (2017):
Web-Privacy : Lustwandeln im Trackergarten. (Publisher's Version)
Darmstadt, MRMCD 2017, Bundesdatenschau, Darmstadt, 01.-03.09.2017, DOI: 10.25534/tuprints-00013367,
[Conference or Workshop Item]
N
Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58, pp. 441-480. Elsevier, ISSN 0885-2308,
DOI: 10.1016/j.csl.2019.06.001,
[Article]
Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Conference or Workshop Item]
P
Pumplun, Luisa ; Fecho, Mariska ; Wahl, Nihal ; Peters, Felix ; Buxmann, Peter (2021):
Adoption of Machine Learning Systems for Medical Diagnostics in Clinics: A Qualitative Interview Study.
In: Journal of Medical Internet Research, 23 (10), JMIR Publications, ISSN 1438-8871,
DOI: 10.2196/29301,
[Article]
Pumplun, Luisa ; Fecho, Mariska ; Islam, Nihal ; Buxmann, Peter (2021):
Machine Learning Systems in Clinics – How Mature Is the Adoption Process in Medical Diagnostics?
In: Proceedings of the 54th Hawaii International Conference on System Sciences, pp. 6317-6326,
54th Hawaii International Conference on System Sciences, virtual Conference, 05. - 08.01.2021, [Conference or Workshop Item]
Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08.2021, [Conference or Workshop Item]
R
Renaud, Karen ; Zimmermann, Verena ; Schürmann, Tim ; Böhm, Carlos (2021):
Exploring cybersecurity-related emotions and finding that they are challenging to measure.
In: Humanities and Social Sciences Communications, 8, Springer Nature, e-ISSN 2662-9992,
DOI: 10.1057/s41599-021-00746-5,
[Article]
Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Conference or Workshop Item]
Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Conference or Workshop Item]
S
Stöver, Alina ; Gerber, Nina ; Pridöhl, Henning ; Maass, Max ; Bretthauer, Sebastian ; Spiecker gen. Döhmann, Indra ; Hollick, Matthias ; Herrmann, Dominik (2023):
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2023 (2), pp. 251-264. De Gruyter Open, e-ISSN 2299-0984,
DOI: 10.56553/popets-2023-0051,
[Article]
Stöver, Alina ; Hahn, Sara ; Kretschmer, Felix ; Gerber, Nina (2023):
Investigating how Users Imagine their Personal Privacy Assistant.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2023 (2), pp. 384-402. De Gruyter Open, e-ISSN 2299-0984,
DOI: 10.56553/popets-2023-0059,
[Article]
Stöver, Alina ; Gerber, Nina ; Cornel, Christin ; Henz, Mona ; Marky, Karola ; Zimmermann, Verena ; Vogt, Joachim (2022):
Website operators are not the enemy either-Analyzing options for creating cookie consent notices without dark patterns.
In: Mensch und Computer 2022-Workshopband,
Gesellschaft für Informatik e.V., Mensch und Computer 2022: Facing Realities, Darmstadt, Germany, 04.-07.09.2022, DOI: 10.18420/muc2022-mci-ws01-458,
[Conference or Workshop Item]
Schmitt, Martin (2022):
Ethik der Digitalstadt - Herausforderung der Datensouveränität.
Ethik der Digitalstadt - Herausforderung der Datensouveränität, virtual Conference, 03.12.2021, [Conference or Workshop Item]
Steinbrink, Enno ; Reichert, Lilian ; Mende, Michelle ; Reuter, Christian (2021):
Digital Privacy Perceptions of Asylum Seekers in Germany - An Empirical Study about Smartphone Usage during the Flight.
In: Proceedings of the ACM on Human-Computer Interaction, 5 (CSCW2), ACM, e-ISSN 2573-0142,
DOI: 10.1145/3479526,
[Article]
Stöver, Alina ; Gerber, Nina ; Kaushik, Sushma ; Mühlhäuser, Max ; Marky, Karola (2021):
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps.
In: CHI EA'21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems,
ACM, CHI '21: CHI Conference on Human Factors in Computing Systems, virtual Conference, 08.-13.05.2021, ISBN 978-1-4503-8095-9,
DOI: 10.1145/3411763.3451791,
[Conference or Workshop Item]
Sturm, Timo ; Fecho, Mariska ; Buxmann, Peter (2021):
To Use or Not to Use Artificial Intelligence? A Framework for the Ideation and Evaluation of Problems to Be Solved with Artificial Intelligence.
In: Proceedings of the 54th Hawaii International Conference on System Sciences, pp. 206-215,
54th Hawaii International Conference on System Sciences, virtual Conference, 05. - 08.01. 2021, [Conference or Workshop Item]
Sridaran, Kris Shrishak (2021):
Practical Secure Computation for Internet Infrastructure. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00018504,
[Ph.D. Thesis]
Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Conference or Workshop Item]
Stöver, Alina ; Kretschmer, Felix ; Cornel, Christin ; Marky, Karola (2020):
Work in Progress: How I met my Privacy Assistant - A User-Centric Workshop.
In: Mensch und Computer 2020 : Workshopband / ed. by C. Hansen ; A. Nürnberger ; B. Preim,
Magdeburg, Gesellschaft für Informatik e.V., Mensch und Computer 2020, Magdeburg, Germany, 06. - 09.09.2020, DOI: 10.18420/muc2020-ws119-005,
[Conference or Workshop Item]
Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Conference or Workshop Item]
Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Article]
Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Conference or Workshop Item]
Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor Thesis]
Stöver, Alina (2019):
Ongoing Research: Trust in Automation in the Context of Privacy.
15th Symposium on Usable Privacy and Security, Santa Clara, USA, 11.-13.08.2019, [Conference or Workshop Item]
Schürmann, Tim (2019):
Evaluation bayesianischer kognitiver Modelle in der Vorhersage menschlichen Verhaltens.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
pp. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Conference or Workshop Item]
Stute, Milan ; Maass, Max ; Schons, Tom ; Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems,
2. updated version, ACM, 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, USA, 21.-25.11.2017, DOI: 10.1145/3127540.3127542,
[Conference or Workshop Item]
Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario
Curry, Edward ; Wahlster, Wolfgang (eds.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, pp. 119-141, Springer, ISBN 978-3-319-21568-6,
DOI: 10.1007/978-3-319-21569-3,
[Book Section]
T
Treiber, Amos ; Müllmann, Dirk ; Schneider, Thomas ; Spiecker genannt Döhmann, Indra (2022):
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies.
In: WPES'22: Proceedings of the 21st Workshop on Privacy in the Electronic Society, pp. 69-82,
ACM, CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, USA, 07.11.2022, ISBN 978-1-4503-9873-2,
DOI: 10.1145/3559613.3563192,
[Conference or Workshop Item]
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Conference or Workshop Item]
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving machine learning beyond neural networks.
Theory and Practice of Multi-Party Computation Workshop (TPMPC'20), virtual Conference, 25.05.-04.06.2020, DOI: 10.48550/arXiv.2002.00801,
[Conference or Workshop Item]
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Conference or Workshop Item]
Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]
U
Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]
W
Wainakh, Aidmar ; Zimmer, Ephraim ; Subedi, Sandeep ; Keim, Jens ; Grube, Tim ; Karuppayah, Shankar ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2023):
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups.
In: Sensors, 23 (1), MDPI, ISSN 1424-8220,
DOI: 10.3390/s23010031,
[Article]
Weiler, Michael (2018):
Measuring Real-World Tie Strength with Digital Footprint Data: An Assessment of Convergent Validity.
San Francisco, CA, USA, December 13-16, 2018, [Conference or Workshop Item]
Weiler, Michael ; Hinz, Oliver (2018):
Without each other, we have nothing: a state-of-the-art analysis on how to operationalize social capital.
In: Review of Managerial Science, ISSN 1863-6691,
DOI: 10.1007/s11846-018-0280-5,
[Article]
Z
Zimmermann, Verena ; Gerber, Paul ; Stöver, Alina (2022):
That Depends -- Assessing User Perceptions of Authentication Schemes across Contexts of Use.
In: Human-Computer Interaction, (Preprint), arXiv, 2209.13958, DOI: 10.48550/arXiv.2209.13958,
[Report]
Zimmermann, Verena ; Haunschild, Jasmin ; Unden, Marita ; Gerber, Paul ; Gerber, Nina (2022):
Sicherheitsherausforderungen für Smart-City-Infrastrukturen.
In: Wirtschaftsinformatik & Management, 14 (2), pp. 119-126. ISSN 1867-5905,
DOI: 10.1365/s35764-022-00396-5,
[Article]
Zimmer, Ephraim ; Burkert, Christian ; Federrath, Hannes (2021):
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders.
In: Digital Threats: Research and Practice, 3 (1), ACM, ISSN 2692-1626,
DOI: 10.1145/3473674,
[Article]
Zimmer, Ephraim (2021):
Datenschutzfreundliche Erkennung und Abwehr von Insiderbedrohungen.
Hamburg, Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky, Fachbereich Informatik,
[Ph.D. Thesis]
Zimmermann, Verena ; Renaud, Karen (2021):
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions.
In: ACM Transactions on Computer-Human Interaction, 28 (1), pp. 7:1-7:45. ACM, DOI: 10.1145/3429888,
[Article]
Zimmermann, Sina ; Gerber, Nina (2019):
Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment.
In: i-com, 18 (3), pp. 271-285. ISSN 1618-162X,
DOI: 10.1515/icom-2018-0041,
[Article]