Einträge mit Organisationseinheit "Profilbereiche"
- TU Darmstadt (106899)
- Profilbereiche (2349)
- Cybersicherheit (CYSEC) (1484)
- Profilbereiche (2349)
Schneider, Thomas ; Ehrler, Patrick ; Kati, Abdelkarim ; Treiber, Amos (2024)
Evaluating leakage attacks against relational encrypted search.
CCS '24: ACM SIGSAC Conference on Computer and Communications Security. Salt Lake City, USA (14.10.2024 - 18.10.2024)
Konferenzveröffentlichung, Bibliographie
Eliseev, Andrew ; Steinke, Florian (2024)
Conceptual framework for determining the treewidth of distribution grids.
In: Electric Power Systems Research, 234
doi: 10.1016/j.epsr.2024.110756
Artikel, Bibliographie
Stenglein, Hans ; Faulwasser, Timm ; Steinke, Florian (2024)
Robust and Chance-Constrained Dispatch Policies for Linear Power Systems.
The 12th IFAC Symposium on Control of Power & Energy Systems. Rabat, Marokko (10.07.2024 - 12.07.2024)
doi: 10.1016/j.ifacol.2024.07.463
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; Stöver, Alina ; Mayer, Peter (2024)
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field.
Symposium on Usable Privacy and Security (SOUPS 2024). Philadelphia (08/2024)
Konferenzveröffentlichung, Bibliographie
Degabriele, Jean Paul ; Gilcher, Jan ; Govinden, Jérôme ; Paterson, Kenneth G. (2024)
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024-23.05.2024)
doi: https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00132
Konferenzveröffentlichung, Bibliographie
Koisser, David ; Mitev, Richard ; Chilese, Marco ; Sadeghi, Ahmad-Reza (2024)
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Konferenzveröffentlichung, Bibliographie
Chilese, Marco ; Mitev, Richard ; Orenbach, Meni ; Thorburn, Robert ; Atamli, Ahmad ; Sadeghi, Ahmad-Reza (2024)
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Konferenzveröffentlichung, Bibliographie
Schulze, Kai ; Misic, Mile ; Radojicic, Nikola ; Serin, Berkin (2024)
Evaluating Partners for Renewable Energy Trading: A Multidimensional Framework and Tool.
In: Sustainability, 16 (9)
doi: 10.3390/su16093632
Artikel, Bibliographie
Rieger, Phillip ; Krauß, Torsten ; Miettinen, Mark ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
CrowdGuard: Federated Backdoor Detection in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.24-01.03.24)
doi: 10.14722/ndss.2024.23233
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Pegoraro, Alessandro ; Rieger, Phillip ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.2024 - 01.03.2024)
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Günther, Felix ; Janson, Christian (2024)
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
In: Journal of Cryptology, 37 (2)
doi: 10.1007/s00145-023-09489-9
Artikel, Bibliographie
Böck, Leon (2024)
On IP-Based Botnet Measurements.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024761
Dissertation, Erstveröffentlichung, Verlagsversion
Bhaumik, Ritam ; Chakraborty, Bishwajit ; Choi, Wonseok ; Dutta, Avijit ; Govinden, Jérôme ; Shen, Yaobin (2024)
The Committing Security of MACs with Applications to Generic Composition.
44th Annual International Cryptology Conference (CRYPTO 2024). Santa Barbara, USA (18.-22.08.2024)
Konferenzveröffentlichung, Bibliographie
Marky, Karola ; Gerber, Nina ; Krumb, Henry John ; Khamis, Mohamed ; Mühlhäuser, Max (2024)
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting.
2024 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA (19.5.2024-23.5.2024)
doi: 10.1109/SP54263.2024.00136
Konferenzveröffentlichung, Bibliographie
Grassl, Paul ; Gerber, Nina ; Max, von Grafenstein (2024)
Practitioners’ Corner ∙ How Effectively Do Consent Notices Inform Users About the Risks to Their Fundamental Rights?
In: European Data Protection Law Review, 10 (1)
doi: 10.21552/edpl/2024/1/14
Artikel, Bibliographie
Degabriele, Jean Paul ; Karadžić, Vukašin
Hrsg.: Guo, Jian ; Steinfeld, Ron (2023)
Populating the Zoo of Rugged Pseudorandom Permutations.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.12.2023-08.12.2023)
doi: 10.1007/978-981-99-8742-9_9
Konferenzveröffentlichung, Bibliographie
Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme (2023)
The Indifferentiability of the Duplex and Its Practical Applications.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.12.2023-08.12.2023)
doi: 10.1007/978-981-99-8742-9_8
Konferenzveröffentlichung, Bibliographie
Pütz, Philipp ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Annual Computer Security Applications Conference (ACSAC 2023). Austin, USA (04.12.2023-08.12.2023)
Konferenzveröffentlichung, Bibliographie
Castillo, Jorge ; Rieger, Phillip ; Fereidooni, Hossein ; Chen, Qian ; Sadeghi, Ahmad-Reza (2023)
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
39th Annual Computer Security Applications Conference (ACSAC'23). Austin, USA (04.12.2023 - 08.12.2023)
doi: 10.1145/3627106.3627194
Konferenzveröffentlichung, Bibliographie
Schulze, Kai ; Schoenefeld, Jonas J. ; Hildén, Mikael (2023)
Adapting to climate change: promises and pitfalls in the diffusion of solutions.
In: Regional Environmental Change, 24 (1)
doi: 10.1007/s10113-023-02165-5
Artikel, Bibliographie
Fischlin, Marc ; Rohrbach, Felix
Hrsg.: Rothblum, Guy N. ; Wee, Hoeteck (2023)
Searching for ELFs in the Cryptographic Forest.
21st Theory of Cryptography Conference (TCC 2023). Taipei, Taiwan (29.11.-02.12.2023)
doi: 10.1007/978-3-031-48621-0_8
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc
Hrsg.: Meng, Weizhi ; Jensen, Christian Damsgaard ; Cremers, Cas ; Kirda, Engin (2023)
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3.
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023). Copenhagen, Denmark (26.-30.11.2023)
doi: 10.1145/3576915.3623099
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Günther, Felix
Hrsg.: Meng, Weizhi ; Jensen, Christian Damsgaard ; Cremers, Cas ; Kirda, Engin (2023)
Verifiable Verification in Cryptographic Protocols.
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023). Copenhagen, Denmark (26.-30.11.2023)
doi: 10.1145/3576915.3623151
Konferenzveröffentlichung, Bibliographie
Li, Huimin ; Rieger, Phillip ; Zeitouni, Shaza ; Picek, Stjepan ; Sadeghi, Ahmad-Reza (2023)
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
33rd International Conference on Field-Programmable Logic and Applications. Gothenburg, Sweden (04.09.2023-08.09.2023)
doi: htps://doi.org/10.1109/FPL60245.2023.00046
Konferenzveröffentlichung, Bibliographie
Kuroptev, Kirill ; Steinke, Florian (2023)
Coordinated cyber attacks on smart grids considering software supply chains.
2023 IEEE PES Innovative Smart Grid Technologies Europe. Grenoble, France (23.10.2023 - 26.10.2023)
doi: 10.1109/ISGTEUROPE56780.2023.10407630
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena ; Haunschild, Jasmin ; Stöver, Alina ; Gerber, Nina
Hrsg.: Fröhlich, P. ; Cobus, V. (2023)
Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains.
Mensch und Computer 2023. Rapperswil, Switzerland (03.09.2023-06.09.2023)
doi: 10.18420/muc2023-mci-ws01-225
Konferenzveröffentlichung, Bibliographie
Hrsg.: Gerber, Nina ; Stöver, Alina ; Marky, Karola (2023)
Human Factors in Privacy Research.
doi: 10.1007/978-3-031-28643-8
Buch, Bibliographie
Saß, Marvin ; Mitev, Richard ; Sadeghi, Ahmad-Reza (2023)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
32nd USENIX Security Symposium. Anaheim, USA (09.08.2023-11.08.2023)
Konferenzveröffentlichung, Bibliographie
Rieger, Phillip ; Chilese, Marco ; Mohamed, Reham ; Miettinen, Markus ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2023)
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
32nd USENIX Security Symposium. Anaheim, USA (09.08.2023-11.08.2023)
Konferenzveröffentlichung, Bibliographie
Nieminen, Raine ; Schneider, Thomas
Hrsg.: Springer (2023)
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires.
In: Journal of Cryptology, 36 (34)
doi: 10.1007/s00145-023-09472-4
Artikel, Bibliographie
Kumari, Kavita ; Rieger, Phillip ; Fereidooni, Hossein ; Jadliwala, Murtuza ; Sadeghi, Ahmad-Reza (2023)
BayBFed: Bayesian Backdoor Defense for Federated Learning.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023-25.05.2023)
doi: 10.1109/SP46215.2023.10179362
Konferenzveröffentlichung, Bibliographie
Schneider, Thomas ; Yalame, Hossein ; Yonli, Michael (2023)
Griffin: Towards mixed multi-key homomorphic encryption.
20th International Conference on Security and Cryptography (SECRYPT'23). Rome, Italy (10.07.2023-12.07.2023)
doi: 10.5220/0012090200003555
Konferenzveröffentlichung, Bibliographie
Reinhold, Thomas ; Kühn, Philipp ; Günther, Daniel ; Schneider, Thomas ; Reuter, Christian (2023)
ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships.
In: IEEE Transactions on Technology and Society, 4 (2)
doi: 10.1109/TTS.2023.3280356
Artikel, Bibliographie
Brüggemann, Andreas ; Hundt, Robin ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
FLUTE: Fast and Secure Lookup Table Evaluations.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023-25.05.2023)
doi: 10.1109/SP46215.2023.10179345
Konferenzveröffentlichung, Bibliographie
Gehlhar, Till ; Marx, Felix ; Schneider, Thomas ; Suresh, Ajith ; Wehrle, Tobias ; Yalame, Hossein (2023)
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning.
6th Deep Learning Security and Privacy Workshop (DLSP 2023). San Francisco, USA (25.05.2023-25.05.2023)
Konferenzveröffentlichung, Bibliographie
Düzlü, Samed ; Krämer, Juliane ; Pöppelmann, Thomas ; Struck, Patrick (2023)
A Lightweight Identification Protocol Based on Lattices.
26th IACR International Conference on Practice and Theory of Public-Key Cryptography. Atlanta, USA (07.05.2023-10.05.2023)
doi: 10.1007/978-3-031-31368-4_4
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Heyden, Jonas von der ; Margraf, Marian ; Morgner, Frank ; Wallner, Andreas ; Bock, Holger (2023)
Post-quantum Security for the Extended Access Control Protocol.
8th International Conference Security Standardisation Research (SSR 2023). Lyon, France (22.04.2023-23.04.2023)
doi: 10.1007/978-3-031-30731-7_2
Konferenzveröffentlichung, Bibliographie
Banegas, Gustavo ; Krämer, Juliane ; Lange, Tanja ; Meyer, Michael ; Panny, Lorenz ; Reijnders, Krijn ; Sotáková, Jana ; Trimoska, Monika (2023)
Disorientation Faults in CSIDH.
42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Lyon, France (23.04.2023-27.04.2023)
doi: 10.1007/978-3-031-30589-4_11
Konferenzveröffentlichung, Bibliographie
Schoenefeld, Jonas J. ; Hildén, Mikael ; Schulze, Kai ; Sorvali, Jaana (2023)
What motivates and hinders municipal adaptation policy? Exploring vertical and horizontal diffusion in Hessen and Finland.
In: Regional Environmental Change, 23 (2)
doi: 10.1007/s10113-023-02048-9
Artikel, Bibliographie
Koisser, David ; Brasser, Ferdinand ; Jauernig, Patrick ; Stapf, Emmanuel ; Wallum, Marcus ; Fischer, Daniel ; Sadeghi, Ahmad-Reza (2023)
Hardware-Based Isolation for Advanced Safety and Security in Spacecraft.
17th International Conference on Space Operations (SpaceOps 2023). Dubai, UAE (06.03.2023-10.03.2023)
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; Stöver, Alina
Hrsg.: Gerber, Nina ; Stöver, Alina ; Marky, Karola (2023)
From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior.
In: Human Factors in Privacy Research
doi: 10.1007/978-3-031-28643-8_2
Buchkapitel, Bibliographie
Jauernig, Patrick ; Jakobovic, Domagoj ; Picek, Stjepan ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza (2023)
DARWIN: Survival of the Fittest Fuzzing Mutators.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23159
Konferenzveröffentlichung, Bibliographie
Vogt, Joachim ; Keil, Udo ; Cornel, Christin ; Gerber, Nina ; Ferreira, Yvonne (2023)
Psychotechnik, human factors, engineering psychology, Technikpsychologie—100 years of interdisciplinary cooperation between engineering and human sciences.
In: Zeitschrift für Arbeitswissenschaft, 77 (1)
doi: 10.1007/s41449-023-00353-x
Artikel, Bibliographie
Fereidooni, Hossein ; König, Jan ; Rieger, Phillip ; Chilese, Marco ; Goekbakan, Bora ; Finke, Moritz ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2023)
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23194
Konferenzveröffentlichung, Bibliographie
Böck, Leon ; Levin, Dave ; Padmanabhan, Ramakrishna ; Doerr, Christian ; Mühlhäuser, Max (2023)
How to Count Bots in Longitudinal Datasets of IP Addresses.
Konferenzveröffentlichung, Bibliographie
Sendner, Christoph ; Chen, Huili ; Fereidooni, Hossein ; Petzi, Lukas ; König, Jan ; Stang, Jasper ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2023)
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
doi: 10.14722/ndss.2023.23263
Konferenzveröffentlichung, Bibliographie
Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”.
In: IEEE Transactions on Information Forensics and Security, 18
doi: 10.1109/TIFS.2023.3238544
Artikel, Bibliographie
Ganghof, Steffen ; Schulze, Kai (2023)
Vetospieler und Institutionen.
In: Handbuch Policy-Forschung, Auflage: 2. Auflage
doi: 10.1007/978-3-658-05678-0_4-1
Buchkapitel, Bibliographie
Stöver, Alina ; Gerber, Nina ; Pridöhl, Henning ; Maass, Max ; Bretthauer, Sebastian ; Spiecker gen. Döhmann, Indra ; Hollick, Matthias ; Herrmann, Dominik (2023)
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2023 (2)
doi: 10.56553/popets-2023-0051
Artikel, Bibliographie
Stöver, Alina ; Hahn, Sara ; Kretschmer, Felix ; Gerber, Nina (2023)
Investigating how Users Imagine their Personal Privacy Assistant.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2023 (2)
doi: 10.56553/popets-2023-0059
Artikel, Bibliographie
Schulze, Kai ; Schoenefeld, Jonas J. (2023)
Measuring climate change adaptation policy output: Toward a two-dimensional approach.
In: Review of Policy Research, 40 (6)
doi: 10.1111/ropr.12553
Artikel, Bibliographie
Gerber, Nina ; Stöver, Alina ; Peschke, Justin ; Zimmermann, Verena (2023)
Don’t accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices.
In: ACM Transactions on Computer-Human Interaction
doi: 10.1145/3617363
Artikel, Bibliographie
Marky, Karola ; Gerber, Nina ; Pelzer, Michelle Gabriela ; Khamis, Mohamed ; Mühlhäuser, Max (2022)
You offer privacy like you offer tea: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (4)
doi: 10.56553/popets-2022-0115
Artikel, Bibliographie
Benedikt, Barbara Jiabao ; Fischlin, Marc ; Huppert, Moritz (2022)
Nostradamus Goes Quantum.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.12.2022-09.12.2022)
doi: 10.1007/978-3-031-22969-5_20
Konferenzveröffentlichung, Bibliographie
Kotila, Nishat ; Patil, Shravani ; Patra, Arpita ; Suresh, Ajith (2022)
POSTER: MPClan: Protocol suite for privacy-conscious computations.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563496
Konferenzveröffentlichung, Bibliographie
Brüggemann, Andreas ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2022)
Poster: Efficient Three-Party Shuffling Using Precomputation.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563511
Konferenzveröffentlichung, Bibliographie
Günther, Daniel ; Holz, Marco ; Judkewitz, Benjamin ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith (2022)
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563497
Konferenzveröffentlichung, Bibliographie
Degabriele, Jean Paul ; Karadžić, Vukašin (2022)
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.
42nd Annual International Cryptology Conference. Santa Barbara, USA (15.08.2022-18.08.2022)
doi: 10.1007/978-3-031-15985-5_10
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Rohrbach, Felix ; Schmalz, Tobias (2022)
A Random Oracle for All of Us.
13th International Conference on Cryptology in Africa (AFRICACRYPT 2022). Fes, Morocco (18.07.2022-20.07.2022)
doi: 10.1007/978-3-031-17433-9_20
Konferenzveröffentlichung, Bibliographie
Hamacher, Kay ; Kussel, Tobias ; Schneider, Thomas ; Tkachenko, Oleksandr (2022)
PEA: Practical private epistasis analysis using MPC.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17143-7_16
Konferenzveröffentlichung, Bibliographie
Krämer, Juliane ; Struck, Patrick (2022)
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP.
13th International Conference on Post-Quantum Cryptography. virtual Conference (28.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17234-2_14
Konferenzveröffentlichung, Bibliographie
Pasnicu, Otilia ; Zmmermann, Verena ; Gerber, Nina ; Cardoso, Sarah (2022)
Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces.
Mensch und Computer 2022. Darmstadt, Germany (04.09.2022-07.09.2022)
doi: 10.1145/3543758.3547573
Konferenzveröffentlichung, Bibliographie
Stöver, Alina ; Gerber, Nina ; Cornel, Christin ; Henz, Mona ; Marky, Karola ; Zimmermann, Verena ; Vogt, Joachim (2022)
Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns.
Mensch und Computer 2022. Darmstadt, Germany (04.09.2022-07.09.2022)
doi: 10.18420/muc2022-mci-ws01-458
Konferenzveröffentlichung, Bibliographie
Chen, Chen ; Kande, Rahul ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Rajendran, JV (2022)
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.07.2022-14.07.2022)
doi: 10.1145/3489517.3530638
Konferenzveröffentlichung, Bibliographie
Wang, Jianqiang ; Mahmoody, Pouya ; Brasser, Ferdinand ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Yu, Donghui ; Pan, Dahan ; Zhang, Yuanyuan (2022)
VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.07.2022-14.07.2022)
doi: 10.1145/3489517.3530436
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Brack, Manuel ; Wagner, Jan Philipp ; Grube, Tim ; Mühlhäuser, Max (2022)
How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Mitev, Richard ; Saß, Marvin (2022)
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
25th Black Hat USA. Las Vegas, USA (06.08.2022-11.08.2022)
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; Marky, Karola
Hrsg.: USENIX Association (2022)
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior.
18th Symposium on Usable Privacy and Security. Boston, USA (07.08.2022-09.08.2022)
Konferenzveröffentlichung, Bibliographie
Wang, Kai ; Mitev, Richard ; Yan, Chen ; Ji, Xiaoyu ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan
Hrsg.: USENIX Association (2022)
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie
Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai ; Yan, Chen ; Mitev, Richard ; Sadeghi, Ahmad-Reza ; Xu, Wenyuan (2022)
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
43rd IEEE Symposium on Security and Privacy. San Francisco, USA (23.05.2022-26.05.2022)
doi: 10.1109/SP46214.2022.9833740
Konferenzveröffentlichung, Bibliographie
Schoenefeld, Jonas J. ; Hildén, Mikael ; Schulze, Kai
Hrsg.: Russel, Duncan ; Kirsop-Taylor, Nick (2022)
Policy innovation for sustainable development.
In: Handbook on the Governance of Sustainable Development
Buchkapitel, Bibliographie
Böck, Leon ; Fejrskov, Martin ; Demetzou, Katerina ; Karuppayah, Shankar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2022)
Processing of botnet tracking data under the GDPR.
In: Computer law & security review, 45
doi: 10.1016/j.clsr.2021.105652
Artikel, Bibliographie
Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias (2022)
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. San Antonio, USA (16.05.2022-19.05.2022)
doi: 10.1145/3507657.3528546
Konferenzveröffentlichung, Bibliographie
Bell, Alena K. ; Kind, Jonas ; Hartmann, Maximilian ; Kresse, Benjamin ; Höfler, Mark V. ; Straub, Benedikt B. ; Auernhammer, Günter K. ; Vogel, Michael ; Thiele, Christina M. ; Stark, Robert W. (2022)
Concentration gradients in evaporating binary droplets probed by spatially resolved Raman and NMR spectroscopy.
In: Proceedings of the National Academy of Sciences, 119 (15)
doi: 10.1073/pnas.2111989119
Artikel, Bibliographie
Bothe, Dieter ; Niethammer, Matthias ; Pilz, Christian ; Brenn, Günter (2022)
On the molecular mechanism behind the bubble rise velocity jump discontinuity in viscoelastic liquids.
In: Journal of Non-Newtonian Fluid Mechanics, 302
doi: 10.1016/j.jnnfm.2022.104748
Artikel, Bibliographie
Krapp, Max-Christopher ; Vaché, Martin ; Egner, Björn ; Schulze, Kai ; Thomas, Samantha
Hrsg.: Federal Institute for Research on Building, Urban Affairs and Spatial Development (BBSR) (2022)
Housing Policies in the European Union.
Report, Bibliographie
Zimmermann, Verena ; Marky, Karola ; Renaud, Karen (2022)
Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information.
In: Behaviour & Information Technology
doi: 10.1080/0144929X.2022.2042384
Artikel, Bibliographie
Böhler, Heike ; Hanegraaff, Marcel ; Schulze, Kai (2022)
Does climate advocacy matter? The importance of competing interest groups for national climate policies.
In: Climate Policy
doi: 10.1080/14693062.2022.2036089
Artikel, Bibliographie
Fitzke, Erik ; Krebs, Robin ; Haase, Thorsten ; Mengler, Max ; Alber, Gernot ; Walther, Thomas (2022)
Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization.
In: New Journal of Physics, 24 (2)
doi: 10.1088/1367-2630/ac5004
Artikel, Bibliographie
Roth, Tobias ; Helm, Dominik ; Reif, Michael ; Mezini, Mira (2022)
CiFi: Versatile Analysis of Class and Field Immutability.
Software Engineering 2022. virtual Conference (21.02.2022-25.02.2022)
doi: 10.18420/se2022-ws-027
Konferenzveröffentlichung, Bibliographie
Schulze, Kai ; Schoenefeld, Jonas J. (2022)
Parteiendifferenz in der lokalen Klimapolitik? Eine empirische Analyse der hessischen Klima-Kommunen.
In: Zeitschrift für Vergleichende Politikwissenschaft
doi: 10.1007/s12286-021-00510-8
Artikel, Bibliographie
Hrsg.: Kaufhold, Marc-André ; Reuter, Christian ; Comes, Tina ; Mirbabaie, Milad ; Stieglitz, Stefan ; Technische Universität Darmstadt, Delft University of Technology, Maastricht University, Universität Paderborn, Universität Duisburg-Essen (2022)
Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response.
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response. (27.09.2021-27.09.2021)
doi: 10.26083/tuprints-00020092
Konferenzveröffentlichung, Erstveröffentlichung, Verlagsversion
Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022)
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022)
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022. virtual Conference (08.03.2022-11.03.2022)
doi: 10.1007/978-3-030-97131-1_4
Konferenzveröffentlichung, Bibliographie
Rieger, Phillip ; Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2022)
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
doi: 10.14722/ndss.2022.23156
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Dmitrienko, Alexandra ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Madlener, Felix (2022)
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.04.2022-28.04.2022)
doi: 10.14722/ndss.2022.23153
Konferenzveröffentlichung, Bibliographie
Kamara, Seny ; Kat, Abdelkarim ; Moataz, Tarik ; Schneider, Thomas ; Treiber, Amos ; Yonli, Michael (2022)
SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data.
7th IEEE European Symposium on Security and Privacy (EuroS&P'22). Genoa, Italy (06.06.2022-10.06.2022)
Konferenzveröffentlichung, Bibliographie
Olt, Christian M. (2022)
Information Security and Privacy in a Digital World: A Human Challenge.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021138
Dissertation, Erstveröffentlichung, Verlagsversion
Zimmermann, Verena ; Haunschild, Jasmin ; Unden, Marita ; Gerber, Paul ; Gerber, Nina (2022)
Sicherheitsherausforderungen für Smart-City-Infrastrukturen.
In: Wirtschaftsinformatik & Management, 14 (2)
doi: 10.1365/s35764-022-00396-5
Artikel, Bibliographie
Balthasar, Mandy ; Gerber, Nina ; Schmitt, Hartmut
Hrsg.: Ludewig, Elske ; Jackstädt, Thomas (2022)
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen.
doi: 10.18420/muc2021-up-448
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Rieger, Phillip ; Chen, Huili ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Zeitouni, Shaza ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2022)
FLAME: Taming Backdoors in Federated Learning.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie
Schulze, Kai ; Bruch, Nils ; Meyer, Monica ; Schönefeld, Jonas (2022)
Die Verbreitung kommunaler Klimaanpassungspolitik in Hessen: Bestandsaufnahme und Perspektiven.
doi: 10.26083/tuprints-00022826
Report, Erstveröffentlichung, Verlagsversion
Bekaert, Paul ; Alotaibi, Norah ; Mathis, Florian ; Gerber, Nina ; Rafferty, Aidan Christopher ; Khamis, Mohamed ; Marky, Karola (2022)
Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives.
Nordic Human-Computer Interaction Conference (NordiCHI '22). Aarhus, Denmark (08.10.2022-12.10.2022)
doi: 10.1145/3546155.3546706
Konferenzveröffentlichung, Bibliographie
Materzok, Tobias ; De Boer, Danna ; Gorb, Stanislav ; Müller‐Plathe, Florian (2022)
Gecko adhesion on flat and rough surfaces: simulations with a multi‐scale molecular model.
In: Small : nano micro, 18 (35)
doi: 10.1002/smll.202201674
Artikel, Bibliographie
Kley, Sani van der ; Goet, Gabriele ; Schmidt, Anna ; Einspieler, Valentina ; Wagner, Steven (2022)
Multiparameter Determination of Thin Liquid Urea-Water Films.
In: Applied Sciences, 11 (19)
doi: 10.3390/app11198925
Artikel, Bibliographie
Olt, Christian M. ; große Deters, Fenne (2021)
On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy.
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Sanina, Olga
Hrsg.: Tibouchi, Mehdi ; Wang, Huaxiong (2021)
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
27th International Conference on the Theory and Application of Cryptology and Information Security. virtual Conference (06.12.2021-10.12.2021)
doi: 10.1007/978-3-030-92075-3_24
Konferenzveröffentlichung, Bibliographie
Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
14th IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21). virtual Conference (13.12.2021-14.12.2021)
Konferenzveröffentlichung, Bibliographie
Braun, Lennart ; Cammarota, Rosario ; Schneider, Thomas (2021)
A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract).
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems. virtual Conference (06.12.2021-14.12.2021)
Konferenzveröffentlichung, Bibliographie
Surminski, Sebastian ; Niesler, Christian ; Brasser, Ferdinand ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2021)
RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints.
2021 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484788
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021)
The Exact Security of BIP32 Wallets.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484807
Konferenzveröffentlichung, Bibliographie
Günther, Daniel ; Schneider, Thomas ; Wiegand, Felix (2021)
Revisiting Hybrid Private Information Retrieval.
27th ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3485346
Konferenzveröffentlichung, Bibliographie
Degabriele, Jean Paul ; Govinden, Jérôme ; Günther, Felix ; Paterson, Kenneth G. (2021)
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484814
Konferenzveröffentlichung, Bibliographie
Brzuska, Christina ; Couteau, Geoffrey ; Karanko, Phila ; Rohrbach, Felix (2021)
On Derandomizing Yao’s Weak-to-Strong OWF Construction.
19th International Conference on Theory of Cryptography (TCC 2021). Raleigh, USA (08.11.2021-11.11.2021)
doi: 10.1007/978-3-030-90453-1_15
Konferenzveröffentlichung, Bibliographie
Sarno, Luca ; Tai, Y.-C. ; Wang, Yongqi ; Oberlack, Martin (2021)
A well-posed multilayer model for granular avalanches with μ(I) rheology.
In: Physics of Fluids, 33 (10)
doi: 10.1063/5.0065697
Artikel, Bibliographie
Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021)
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21). virtual conference (11.10.2021 - 15.10.2021)
doi: 10.1145/3475716.3475783
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Müller, Sven-Andre ; Münch, Jean-Pierre ; Porth, Lars
Hrsg.: Bertino, Elisa ; Shulman, Haya ; Waidner, Michael (2021)
Multipath TLS 1.3.
26th European Symposium on Research in Computer Security. Darmstadt, Germany (04.10.2021-08.10.2021)
doi: 10.1007/978-3-030-88428-4_5
Konferenzveröffentlichung, Bibliographie
Wickert, Anna-Katharina ; Baumgärtner, Lars ; Breitfelder, Florian ; Mezini, Mira (2021)
Python Crypto Misuses in the Wild.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21). virtual Conference (11.10.2021-15.10.2021)
doi: 10.6084/m9.figshare.16499085.v1
Konferenzveröffentlichung, Bibliographie
Fejrskov, Martin ; Pedersen, Jens Myrup ; Böck, Leon ; Vasilomanolakis, Emmanouil (2021)
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
IEEE Conference on Communications and Network Security. Tempe, AZ, USA (04.10.2021-06.10.2021)
doi: 10.1109/CNS53000.2021.9705029
Konferenzveröffentlichung, Bibliographie
Zankel, Lisa Marie ; Gerber, Paul ; Zimmermann, Verena ; Gerber, Nina (2021)
Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems.
13th International ACM Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI '21). virtual Conference (09.09.2021-14.09.2021)
doi: 10.1145/3473682.3480267
Konferenzveröffentlichung, Bibliographie
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2)
doi: 10.1515/icom-2021-0021
Artikel, Bibliographie
Schoenefeld, Jonas J. ; Schulze, Kai ; Hildén, Mikael ; Jordan, Andrew J. (2021)
The Challenging Paths to Net-Zero Emissions: Insights from the Monitoring of National Policy Mixes.
In: The International Spectator, 56 (3)
doi: 10.1080/03932729.2021.1956827
Artikel, Bibliographie
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
42nd IEEE Symposium on Security and Privacy. virtual Conference (24.05.2021-27.05.2021)
doi: 10.1109/SP40001.2021.00093
Konferenzveröffentlichung, Bibliographie
Dehe, Sebastian ; Rehm, Imke-Sophie ; Hardt, Steffen (2021)
Hydrodynamic dispersion in Hele-Shaw flows with inhomogeneous wall boundary conditions.
In: Journal of Fluid Mechanics, 925
doi: 10.1017/jfm.2021.648
Artikel, Bibliographie
Brendel, Jacqueline ; Fiedler, Rune ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2021)
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
doi: 10.1007/978-3-030-97131-1_1
Report, Bibliographie
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie
Sarno, L. ; Wang, Yongqi ; Tai, Y.-C. ; Martino, R. ; Carravetta, A. (2021)
Asymptotic analysis of the eigenstructure of the two-layer model and a new family of criteria for evaluating the model hyperbolicity.
In: Advances in Water Resources, 154
doi: 10.1016/j.advwatres.2021.103966
Artikel, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2021)
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
In: Journal of Cryptology, 34 (4)
doi: 10.1007/s00145-021-09384-1
Artikel, Bibliographie
Liu, Jie ; Oberlack, Martin ; Wang, Yongqi (2021)
Analytical Investigation of Viscoelastic Stagnation-Point Flows with Regard to Their Singularity.
In: Applied Sciences, 11 (15)
doi: 10.3390/app11156931
Artikel, Bibliographie
Gonzalez, Ruben ; Hülsing, Andreas ; Kannwischer, Matthias ; Krämer, Juliane ; Lange, Tanja ; Stöttinger, Marc ; Waitz, Elisabeth ; Wiggers, Thom ; Yang, Bo-Yin (2021)
Verifying Post-Quantum Signatures in 8kB of RAM.
12th International Conference on Post-Quantum Cryptography. virtual Conference (20.07.2021-22.07.2021)
doi: 10.1007/978-3-030-81293-5_12
Konferenzveröffentlichung, Bibliographie
Egert, Rolf ; Grube, Tim ; Volk, Florian ; Mühlhäuser, Max (2021)
Holonic System Model for Resilient Energy Grid Operation.
In: Energies, 14 (14)
doi: 10.3390/en14144120
Artikel, Bibliographie
Wörner, Martin ; Samkhaniani, Nima ; Cai, Xuan ; Wu, Yanchen ; Majumdar, Arijit ; Marschall, Holger ; Frohnapfel, Bettina ; Deutschmann, Olaf (2021)
Spreading and rebound dynamics of sub-millimetre urea-water-solution droplets impinging on substrates of varying wettability.
In: Applied Mathematical Modelling, 95
doi: 10.1016/J.APM.2021.01.038
Artikel, Bibliographie
Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Konferenzveröffentlichung, Bibliographie
Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Konferenzveröffentlichung, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.2021-01.07.2021)
doi: 10.1145/3448300.3468251
Konferenzveröffentlichung, Bibliographie
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.2021-01.07.2021)
doi: 10.1145/3448300.3468252
Konferenzveröffentlichung, Bibliographie
Egert, Rolf ; Daubert, Jörg ; Marsh, Stephen ; Mühlhäuser, Max (2021)
Exploring energy grid resilience: The impact of data, prosumer awareness, and action.
In: Patterns, 2 (6)
doi: 10.1016/j.patter.2021.100258
Artikel, Bibliographie
Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.06.2021-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Konferenzveröffentlichung, Bibliographie
Deußen, Benjamin ; Oberlack, Martin ; Wang, Yongqi (2021)
Probability theory of active suspensions.
In: Physics of Fluids, 33 (6)
doi: 10.1063/5.0047227
Artikel, Bibliographie
Kikker, Anne ; Kummer, Florian ; Oberlack, Martin (2021)
A fully coupled high‐order discontinuous Galerkin solver for viscoelastic fluid flow.
In: International Journal for Numerical Methods in Fluids, 93 (6)
doi: 10.1002/fld.4950
Artikel, Bibliographie
Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.06.2021-11.06.2021)
Konferenzveröffentlichung, Bibliographie
Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021)
Language Support for Secure Software Development with Enclaves.
34th IEEE Computer Security Foundations Symposium (CSF 2021). virtual Conference (21.06.2021-24.06.2021)
Konferenzveröffentlichung, Bibliographie
Fomichev, Mikhail ; Hesse, Julia ; Almon, Lars ; Lippert, Timm ; Han, Jun ; Hollick, Matthias (2021)
FastZIP: faster and more secure zero-interaction pairing.
19th Annual International Conference on Mobile Systems, Applications, and Services. virtual Conference (24.06.2021-02.07.2021)
doi: 10.1145/3458864.3467883
Konferenzveröffentlichung, Bibliographie
Stöver, Alina ; Gerber, Nina ; Kaushik, Sushma ; Mühlhäuser, Max ; Marky, Karola (2021)
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps.
CHI '21: CHI Conference on Human Factors in Computing Systems. virtual Conference (08.05.2021-13.05.2021)
doi: 10.1145/3411763.3451791
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Rohrbach, Felix (2021)
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (10.05.2021-13.05.2021)
doi: 10.1007/978-3-030-75248-4_8
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Zimmermann, Verena ; Schürmann, Tim ; Böhm, Carlos (2021)
Exploring cybersecurity-related emotions and finding that they are challenging to measure.
In: Humanities and Social Sciences Communications, 8
doi: 10.1057/s41599-021-00746-5
Artikel, Bibliographie
Meurisch, Christian ; Mühlhäuser, Max (2021)
Data Protection in AI Services: A Survey.
In: ACM Computing Surveys, 54 (2)
doi: 10.1145/3440754
Artikel, Bibliographie
Guo, Xiaogang ; Peng, Chong ; Wu, Wei ; Wang, Yongqi (2021)
Unified constitutive model for granular–fluid mixture in quasi-static and dense flow regimes.
In: Acta Geotechnica, 16 (3)
doi: 10.1007/s11440-020-01044-1
Artikel, Bibliographie
Schulze, Kai (2021)
Policy Characteristics, Electoral Cycles, and the Partisan Politics of Climate Change.
In: Global Environmental Politics
doi: 10.1162/glep_a_00593
Artikel, Bibliographie
Mittelbach, Arno ; Fischlin, Marc (2021)
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography.
doi: 10.1007/978-3-030-63287-8
Buch, Bibliographie
Stojanovic, Vladimir M. (2021)
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction.
In: Physical Review A, 103 (2)
doi: 10.1103/PhysRevA.103.022410
Artikel, Bibliographie
Fickel, Beatrice ; Postulka, Niels ; Hartmann, Maximilian ; Gründing, Dirk M. ; Nau, Maximilian ; Meckel, Tobias ; Biesalski, Markus (2021)
Changes of meniscus shapes and capillary rise heights under hypergravity.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 610
doi: 10.1016/j.colsurfa.2020.125688
Artikel, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2021)
Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations.
In: Behaviour & Information Technology
doi: 10.1080/0144929X.2021.1876167
Artikel, Bibliographie
Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021)
FLGUARD: Secure and Private Federated Learning.
Report, Bibliographie
Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Hossein (2021)
Privacy - Preserving Clustering.
32. Kryptotag - crypto day matters. virtual Conference (15.01.2021-15.01.2021)
doi: 10.18420/cdm-2021-32-42
Konferenzveröffentlichung, Bibliographie
Grube, Tim ; Egert, Rolf ; Daubert, Jörg ; Mühlhäuser, Max (2021)
The Cost of Path Information: Routing in Anonymous Communication.
Consumer Communications & Networking Conference (CCNC 2021). virtual Conference (09.01.2021-12.01.2021)
Konferenzveröffentlichung, Bibliographie
Hassan, Sohaib S. ; Reuter, Christian ; Bzhalava, Levan (2021)
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs.
In: International Journal of Innovation Management, 25 (1)
doi: 10.1142/S136391962150002X
Artikel, Bibliographie
Zimmermann, Verena ; Renaud, Karen (2021)
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions.
In: ACM Transactions on Computer-Human Interaction, 28 (1)
doi: 10.1145/3429888
Artikel, Bibliographie
Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). virtual Conference (21.02.2021-24.02.2021)
doi: 10.14722/ndss.2021.23159
Konferenzveröffentlichung, Bibliographie
Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium 2021. Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie
Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2021)
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
30th USENIX Security Symposium. Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie
Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021)
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21). Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie
Niesler, Christian ; Surminski, Sebastian ; Davi, Lucas (2021)
HERA: Hotpatching of Embedded Real-time Applications.
28th Network and Distributed System Security Symposium (NDSS) 2021. virtual Conference (21.02.2021-25.02.2021)
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.10.2021-21.10.2021)
Konferenzveröffentlichung, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3)
doi: 10.2478/popets-2021-0045
Artikel, Bibliographie
Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (09.05.2021-13.05.2021)
Konferenzveröffentlichung, Bibliographie
Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021)
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena (2021)
From the Quest to Replace Passwords towards Supporting Secure and Usable Password Creation.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017425
Dissertation, Erstveröffentlichung, Verlagsversion
Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021)
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines. virtual Conference (09.05.2021-12.05.2021)
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021)
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021). virtual Conference (06.09.2021-10.09.2021)
Konferenzveröffentlichung, Bibliographie
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie
Stute, Milan ; Heinrich, Alexander ; Lorenz, Jannik ; Hollick, Matthias (2021)
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi.
30th USENIX Security Symposium. virtual Conference (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie
Sridaran, Kris Shrishak (2021)
Practical Secure Computation for Internet Infrastructure.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00018504
Dissertation, Erstveröffentlichung, Verlagsversion
Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021). virtual Conference (12.07.2021-16.07.2021)
Konferenzveröffentlichung, Bibliographie
Deußen, Benjamin ; Jayaram, A. ; Kummer, Florian ; Wang, Yongqi ; Speck, T. ; Oberlack, Martin (2021)
High-order simulation scheme for active particles driven by stress boundary conditions.
In: Journal of Physics: Condensed Matter, 33 (24)
doi: 10.1088/1361-648X/abf8cf
Artikel, Bibliographie
Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021)
Quantum Indistinguishability for Public Key Encryption.
PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography. virtual Conference (20.07.2021-22.07.2021)
Konferenzveröffentlichung, Bibliographie
Weber, Alexandra ; Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2021)
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography.
26th European Symposium on Research in Computer Security (ESORICS). virtual Conference (04.10.2021-08.10.2021)
Konferenzveröffentlichung, Bibliographie
Chen, Yanjiao ; Bai, Yijie ; Wang, Kaibo ; Mitev, Richard ; Xu, Wenyuan ; Sadeghi, Ahmad-Reza (2021)
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM Conference on Computer and Communications Security (CCS). virtual Conference (15.11.2021-19.11.2021)
Konferenzveröffentlichung, Bibliographie
Alkeilani Alkadri, Nabil ; Harasser, Patrick ; Janson, Christian (2021)
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs.
20th International Conference on Cryptology and Network Security (CANS 2021). Vienna, Austria (13.12.2021-15.12.2021)
Konferenzveröffentlichung, Bibliographie
Egert, Rolf (2021)
Resilience in Critical Infrastructures.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00019961
Dissertation, Erstveröffentlichung, Verlagsversion
Avramidis, Mario ; Kellner, Christiane ; Staudt, Josephine ; Zimmermann, Verena ; Gerber, Nina
Hrsg.: Wienrich, C. ; Wintersberger, P. ; Weyers, B. (2021)
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.09.2021-08.09.2021)
doi: 10.18420/muc2021-mci-ws10-351
Konferenzveröffentlichung, Bibliographie
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience.
In: i-com, 20 (2)
doi: 10.1515/icom-2021-0021
Artikel, Bibliographie
Gerber, Paul ; Heidinger, Marvin ; Stiegelmayer, Julia ; Gerber, Nina (2021)
LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing.
doi: 10.1145/3473856.3474094
Konferenzveröffentlichung, Bibliographie
Avramidis, Mario ; Kellner, Christiane ; Staudt, Josefine ; Zimmermann, Verena ; Gerber, Nina
Hrsg.: Wienrich, Carolin ; Wintersberger, Philipp ; Weyers, Benjamin (2021)
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance.
doi: 10.18420/muc2021-mci-ws10-351
Konferenzveröffentlichung, Bibliographie
Wang, Chun ; Ye, Guanlin ; Meng, Xiannan ; Wang, Yongqi ; Peng, Chong (2021)
A Eulerian−Lagrangian Coupled Method for the Simulation of Submerged Granular Column Collapse.
In: Journal of Marine Science and Engineering, 9 (6)
doi: 10.3390/jmse9060617
Artikel, Bibliographie
Kulyk, Oksana ; Gerber, Nina ; Hilt, Annika ; Volkamer, Melanie (2020)
Has the GDPR hype affected users’ reaction to cookie disclaimers?
In: Journal of Cybersecurity, 6 (1)
doi: 10.1093/cybsec/tyaa022
Artikel, Bibliographie
Meurisch, Christian ; Mihale-Wilson, Cristina ; Hawlitschek, Adrian ; Giger, Florian ; Müller, Florian ; Hinz, Oliver ; Mühlhäuser, Max (2020)
Exploring User Expectations of Proactive AI Systems.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4 (4)
doi: 10.1145/3432193
Artikel, Bibliographie
Weiner, Andre ; Gründing, Dirk ; Bothe, Dieter (2020)
Computing Mass Transfer at Deformable Bubbles for High Schmidt Numbers.
In: Chemie Ingenieur Technik
doi: 10.1002/cite.202000214
Artikel, Bibliographie
Gabel, Sabrina ; Reichert, Lilian ; Reuter, Christian (2020)
Discussing Conflict in Social Media - The Use of Twitter in the Jammu and Kashmir Conflict.
In: Media, War & Conflict, 13
doi: 10.1177/1750635220970997
Artikel, Bibliographie
Böck, Leon ; Shankar, Karuppayah ; Mühlhäuser, Max ; Emmanouil, Vasilomanolakis (2020)
An Overview of the Botnet Simulation Framework.
In: The Journal on Cybercrime & Digital Investigations, 6 (1)
doi: 10.18464/cybin.v6i1.25
Artikel, Bibliographie
Reinhold, Thomas
Hrsg.: Deutscher Bundestag, Verteidigungsausschuß (2020)
Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen.
Report, Bibliographie
Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil
Hrsg.: Moriai, Shiho ; Wang, Huaxiong (2020)
Security Reductions for White-Box Key-Storage in Mobile Payments.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). Daejeon, Korea (07.12.2020 - 11.12.2020)
doi: 10.1007/978-3-030-64837-4_8
Konferenzveröffentlichung, Bibliographie
Kempin, Maresa Vivien ; Stock, Sebastian ; Klitzing, R. von ; Kraume, Matthias ; Drews, Anja (2020)
Influence of particle type and concentration on the ultrafiltration behavior of nanoparticle stabilized Pickering emulsions and suspensions.
In: Separation and Purification Technology, 252
doi: 10.1016/j.seppur.2020.117457
Artikel, Bibliographie
Lauinger, Johannes ; Baumgärtner, Lars ; Wickert, Anna-Katharina ; Mezini, Mira (2020)
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Konferenzveröffentlichung, Bibliographie
Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020)
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020)
Information-Theoretic Security of Cryptographic Channels.
22nd International Conference on Information and Communications Security (ICICS 2020). virtual Conference (24.08.2021-26.08.2021)
doi: 10.1007/978-3-030-61078-4_17
Konferenzveröffentlichung, Bibliographie
Khalil, Adnan ; Schäfer, Felix ; Postulka, Niels ; Stanzel, Mathias ; Biesalski, Markus ; Andrieu-Brunsen, Annette (2020)
Wettability-defined droplet imbibition in ceramic mesopores.
In: Nanoscale, 12 (47)
doi: 10.1039/d0nr06650h
Artikel, Bibliographie
Wong, William S. Y. ; Hegner, Katharina I. ; Donadei, Valentina ; Hauer, Lukas ; Naga, Abhinav ; Vollmer, Doris (2020)
Capillary Balancing: Designing Frost-Resistant Lubricant-Infused Surfaces.
In: Nano Letters, 20 (12)
doi: 10.1021/acs.nanolett.0c02956
Artikel, Bibliographie
Nikolopoulos, Georgios M. ; Fischlin, Marc (2020)
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
In: Cryptography, 4 (4)
doi: 10.3390/cryptography4040031
Artikel, Bibliographie
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419417
Konferenzveröffentlichung, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419425
Konferenzveröffentlichung, Bibliographie
Schneider, Thomas (2020)
Engineering Privacy-Preserving Machine Learning Protocols.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-09.11.2020)
doi: 10.1145/3411501.3418607
Konferenzveröffentlichung, Bibliographie
Stute, Milan ; Kohnhäuser, Florian ; Baumgärtner, Lars ; Almon, Lars ; Hollick, Matthias ; Katzenbeisser, Stefan ; Freisleben, Bernd (2020)
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies.
In: Transactions on Dependable and Secure Computing
doi: 10.1109/TDSC.2020.3036224
Artikel, Bibliographie
Marić, Tomislav ; Kothe, Douglas B. ; Bothe, Dieter (2020)
Unstructured un-split geometrical Volume-of-Fluid methods – A review.
In: Journal of Computational Physics, 420
doi: 10.1016/j.jcp.2020.109695
Artikel, Bibliographie
Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira (2020)
Modular Collaborative Program Analysis in OPAL.
28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020). Virtual Conference (06.11.2020-16.11.2020)
doi: 10.1145/3368089.3409765
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Zimmermann, Verena (2020)
How to nudge in cyber security.
In: Network Security, 2020 (11)
doi: 10.1016/S1353-4858(20)30132-X
Artikel, Bibliographie
Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411496.3421229
Konferenzveröffentlichung, Bibliographie
Li, Can ; Lv, Qimeng ; Wu, Yingchun ; Wu, Xuecheng ; Tropea, Cameron (2020)
Measurement of transient evaporation of an ethanol droplet stream with phase rainbow refractometry and high-speed microscopic shadowgraphy.
In: International Journal of Heat and Mass Transfer, 146
doi: 10.1016/j.ijheatmasstransfer.2019.118843
Artikel, Bibliographie
Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (01.06.2020-05.06.2020)
Konferenzveröffentlichung, Bibliographie
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.10.2020-22.10.2020)
Konferenzveröffentlichung, Bibliographie
Gründing, Dirk ; Smuda, Martin ; Antritter, Thomas ; Fricke, Mathis ; Rettenmaier, Daniel ; Kummer, Florian ; Stephan, Peter ; Marschall, Holger ; Bothe, Dieter (2020)
A comparative study of transient capillary rise using direct numerical simulations.
In: Applied Mathematical Modelling, 86
doi: 10.1016/j.apm.2020.04.020
Artikel, Bibliographie
Gholijani, Alireza ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2020)
Experimental investigation of hydrodynamics and heat transport during vertical coalescence of multiple successive drops impacting a hot wall under saturated vapor atmosphere.
In: Experimental Thermal and Fluid Science, 118
doi: 10.1016/j.expthermflusci.2020.110145
Artikel, Bibliographie
Zhang, Gui-Rong ; Shen, Liu-Liu ; Schmatz, Patrick ; Krois, Konrad ; Etzold, Bastian J. M. (2020)
Cathodic activated stainless steel mesh as a highly active electrocatalyst for the oxygen evolution reaction with self-healing possibility.
In: Journal of Energy Chemistry, 49
doi: 10.1016/j.jechem.2020.01.025
Artikel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Comes, Tina ; Knodt, Michèle ; Mühlhäuser, Max (2020)
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3406324.3424590
Konferenzveröffentlichung, Bibliographie
Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2020)
A fully coupled numerical model for deposit formation from evaporating urea-water drops.
In: International Journal of Heat and Mass Transfer, 159
doi: 10.1016/j.ijheatmasstransfer.2020.120069
Artikel, Bibliographie
Glanz, Leonid ; Müller, Patrick ; Baumgärtner, Lars ; Reif, Michael ; Anthonysamy, Pauline ; Mezini, Mira (2020)
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384745
Konferenzveröffentlichung, Bibliographie
Seiler, Patrick M. ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Interaction between an aerodynamically driven, wall-bound drop and a single groove.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-900269-5
Artikel, Bibliographie
Fricke, Mathis ; Bothe, Dieter (2020)
Boundary conditions for dynamic wetting - A mathematical analysis.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-900249-7
Artikel, Bibliographie
Bothe, Dieter (2020)
Reflections on the article “Moving contact lines and dynamic contact angles: a ‘litmus test’ for mathematical models and some new challenges” by Yulii D. Shikhmurzaev.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-000149-6
Artikel, Bibliographie
Ghillani, Noemi ; Heinz, Michael ; Gambaryan-Roisman, Tatiana (2020)
Capillary rise and evaporation of a liquid in a corner between a plane and a cylinder: A model of imbibition into a nanofiber mat coating.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-000011-y
Artikel, Bibliographie
Afkhami, S. ; Gambaryan-Roisman, T. ; Pismen, L. M. (2020)
Editorial: Challenges in nanoscale physics of wetting phenomena.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-000167-4
Artikel, Bibliographie
Salvaneschi, Guido ; Wirth, Johannes ; Weisenburger, Pascal (2020)
A survey of multitier programming.
In: ACM Computing Surveys, 53 (4)
doi: 10.1145/3397495
Artikel, Bibliographie
Mentler, Tilo ; Reuter, Christian ; Nestler, Simon ; Kaufhold, Marc-André ; Herczeg, Michael ; Pottebaum, Jens
Hrsg.: Gesellschaft für Informatik e. V. (2020)
7. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Conference on Mensch und Computer 2020 (MuC'20). Magdeburg, Germany (06.09.2020-09.09.2020)
doi: 10.18420/muc2020-ws117
Konferenzveröffentlichung, Bibliographie
Zirwes, Thorsten ; Häber, Thomas ; Zhang, Feichi ; Kosaka, Hidemasa ; Dreizler, Andreas ; Steinhausen, Matthias ; Hasse, Christian ; Stagni, Alessandro ; Trimis, Dimosthenis ; Suntz, Rainer ; Bockhorn, Henning (2020)
Numerical Study of Quenching Distances for Side-Wall Quenching Using Detailed Diffusion and Chemistry.
In: Flow, Turbulence and Combustion, 106 (2)
doi: 10.1007/s10494-020-00215-0
Artikel, Bibliographie
Kissing, Johannes ; Kriegseis, Jochen ; Li, Zhenyao ; Feng, Lihao ; Hussong, Jeanette ; Tropea, Cameron (2020)
Insights into leading edge vortex formation and detachment on a pitching and plunging flat plate.
In: Experiments in Fluids, 61 (9)
doi: 10.1007/s00348-020-03034-1
Artikel, Bibliographie
Bothe, Dieter (2020)
On moving hypersurfaces and the discontinuous ODE-system associated with two-phase flows.
In: Nonlinearity, 33 (10)
doi: 10.1088/1361-6544/ab987d
Artikel, Bibliographie
Wan, K. ; Hartl, S. ; Vervisch, L. ; Domingo, P. ; Barlow, R. S. ; Hasse, C. (2020)
Combustion regime identification from machine learning trained by Raman/Rayleigh line measurements.
In: Combustion and Flame, 219
doi: 10.1016/j.combustflame.2020.05.024
Artikel, Bibliographie
Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020)
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20). virtual Conference (14.09.2020-18.09.2020)
Konferenzveröffentlichung, Bibliographie
Brulin, Sebastian ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Fingering instability of a viscous liquid bridge stretched by an accelerating substrate.
In: Journal of Fluid Mechanics, 899
doi: 10.1017/jfm.2020.422
Artikel, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020)
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1)
doi: 10.1145/3406112
Artikel, Bibliographie
Wacławczyk, Marta ; Grebenev, Vladimir N. ; Oberlack, Martin (2020)
Conformal Invariance of Characteristic Lines in a Class of Hydrodynamic Models.
In: Symmetry, 12 (9)
doi: 10.3390/sym12091482
Artikel, Bibliographie
Neureither, Jens ; Dmitrienko, Alexandra ; Koisser, David ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2020)
LegIoT: Ledgered Trust Management Platform for IoT.
25th European Symposium on Research in Computer Security. virtual Conference (14.09.2020-18.09.2020)
doi: 10.1007/978-3-030-58951-6_19
Konferenzveröffentlichung, Bibliographie
Meyer-Berg, Andreas ; Egert, Rolf ; Böck, Leon ; Mühlhäuser, Max (2020)
IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.08.2020-28.08.2020)
doi: 10.1145/3407023.3407036
Konferenzveröffentlichung, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.08.2020-28.08.2020)
doi: 10.1145/3407023.3407045
Konferenzveröffentlichung, Bibliographie
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Konferenzveröffentlichung, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Konferenzveröffentlichung, Bibliographie
Ries, Florian ; Li, Yongxiang ; Nishad, Kaushal ; Dressler, Louis ; Ziefuss, Matthias ; Mehdizadeh, Amirfarhang ; Hasse, C. ; Sadiki, Amsini (2020)
A wall-adapted anisotropic heat flux model for large eddy simulations of complex turbulent thermal flows.
In: Flow, Turbulence and Combustion, 106 (2)
doi: 10.1007/s10494-020-00201-6
Artikel, Bibliographie
Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
doi: 10.48550/arXiv.2008.04449
Report, Bibliographie
Sadeghi, Mehdi ; Truffin, Karine ; Peterson, Brian ; Böhm, Benjamin ; Jay, Stéphane (2020)
Development and Application of Bivariate 2D-EMD for the Analysis of Instantaneous Flow Structures and Cycle-to-Cycle Variations of In-cylinder Flow.
In: Flow, Turbulence and Combustion, 106
doi: 10.1007/s10494-020-00197-z
Artikel, Bibliographie
Schmidt, Anna ; van der Kley, Sani ; Wagner, Steven (2020)
Optically accessible generic exhaust gas test bench for the investigation of fundamental SCR-relevant processes.
In: Applied Optics, 59 (23)
doi: 10.1364/AO.397574
Artikel, Bibliographie
Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020)
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium. virtual Conference (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie
Stute, Milan ; Agarwal, Pranay ; Kumar, Abhinav ; Asadi, Arash ; Hollick, Matthias (2020)
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems.
In: IEEE Internet of Things Journal, 7 (8)
doi: 10.1109/JIOT.2020.2985044
Artikel, Bibliographie
Giga, Yoshikazu ; Gries, Mathis ; Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2020)
The hydrostatic Stokes semigroup and well-posedness of the primitive equations on spaces of bounded functions.
In: Journal of Functional Analysis, 279 (3)
doi: 10.1016/j.jfa.2020.108561
Artikel, Bibliographie
Tillmanns, Jörn ; Classen, Jiska ; Rohrbach, Felix ; Hollick, Matthias (2020)
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020). virtual Conference (11.08.2020-11.08.2020)
Konferenzveröffentlichung, Bibliographie
Sun, Z. ; Hasse, C. ; Scholtissek, A. (2020)
Ignition Under Strained Conditions: A Comparison Between Instationary Counterflow and Non-premixed Flamelet Solutions.
In: Flow, Turbulence and Combustion, 2020
doi: 10.1007/s10494-020-00198-y
Artikel, Bibliographie
Tripathy, Madhusmita ; Bharadwaj, Swaminath ; Shadrack Jabes, Barnabas ; Vegt, Nico F. A. van der (2020)
Characterizing Polymer Hydration Shell Compressibilities with the Small-System Method.
In: Nanomaterials, 10 (8)
doi: 10.3390/nano10081460
Artikel, Bibliographie
Hieber, Matthias ; Kozono, Hideo ; Seyfert, Anton ; Shimizu, Senjo ; Yanagisawa, Taku (2020)
The Helmholtz–Weyl decomposition of Lr vector fields for two dimensional exterior domains.
In: The Journal of Geometric Analysis, 2020
doi: 10.1007/s12220-020-00473-4
Artikel, Bibliographie
Greifenstein, M. ; Heinze, J. ; Willert, C. ; Voigt, L. ; Zedda, M. ; Richter, C. ; Dreizler, A. (2020)
Time-resolved temperature profile measurements in the exhaust of a single sector gas turbine combustor at realistic operating conditions.
In: Experiments in Fluids, 61 (8)
doi: 10.1007/s00348-020-03011-8
Artikel, Bibliographie
Sadeghi, Hamed ; Oberlack, Martin (2020)
New scaling laws of passive scalar with a constant mean gradient in decaying isotropic turbulence.
In: Journal of Fluid Mechanics, 899
doi: 10.1017/jfm.2020.413
Artikel, Bibliographie
Putz, Florentin ; Álvarez, Flor ; Classen, Jiska (2020)
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3399420
Konferenzveröffentlichung, Bibliographie
Nejati, Iman ; Sielaff, Axel ; Franz, Benjamin ; Zimmermann, Matthias ; Hänichen, Philipp ; Schweikert, Kai ; Krempel, Julian ; Stephan, Peter ; Martin, Anne ; Scheerer, Herbert ; Engler, Tom ; Oechsner, Matthias (2020)
Experimental Investigation of Single Bubble Nucleate Boiling in Microgravity.
In: Microgravity Science and Technology, 32 (4)
doi: 10.1007/s12217-020-09813-z
Artikel, Bibliographie
Nguyen, Nhut M. ; Alobaid, Falah ; May, Jan ; Peters, Jens ; Epple, Bernd (2020)
Experimental Study on Steam Gasification of Torrefied Woodchips in a Bubbling Fluidized Bed Reactor.
In: Energy, 202
doi: 10.1016/j.energy.2020.117744
Artikel, Bibliographie
Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020)
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. VIRTUAL (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3399343
Konferenzveröffentlichung, Bibliographie
Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020)
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3399423
Konferenzveröffentlichung, Bibliographie
Hieber, Matthias ; Stinner, Christian (2020)
Strong time periodic solutions to Keller-Segel systems: An approach by the quasilinear Arendt-Bu theorem.
In: Journal of Differential Equations, 269 (2)
doi: 10.1016/j.jde.2020.01.020
Artikel, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3401796
Konferenzveröffentlichung, Bibliographie
Shrishak, Kris ; Shulman, Haya (2020)
Limiting the Power of RPKI Authorities.
Proceedings of the Applied Networking Research Workshop (ANRW'20). Online Workshop (30.07.2020-31.07.2020)
Konferenzveröffentlichung, Bibliographie
Meng, Xiannan ; Wang, Yongqi ; Chiou, Min-Ching ; Zhou, Yunlai (2020)
Investigation of influence of an obstacle on granular flows by virtue of a depth-integrated theory.
In: European Journal of Mechanics - B/Fluids, 84
doi: 10.1016/j.euromechflu.2020.06.014
Artikel, Bibliographie
Habibi, Nahal ; Christau, Stephanie ; Ochyl, Lukasz J. ; Fan, Zixing ; Hassani Najafabadi, Alireza ; Kuehnhammer, Matthias ; Zhang, Mengwen ; Helgeson, Matthew ; Klitzing, R. von ; Moon, James J. ; Lahann, Joerg (2020)
Engineered Ovalbumin Nanoparticles for Cancer Immunotherapy.
In: Advanced Therapeutics
doi: 10.1002/adtp.202000100
Artikel, Bibliographie
Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020)
A Programming Model for Semi-implicit Parallelization of Static Analyses.
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis. virtual Conference (18.07.2020-22.07.2020)
doi: 10.1145/3395363.3397367
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020)
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy
doi: 10.1109/MSEC.2020.2994978
Artikel, Bibliographie
Zhang, Xuefei ; Yan, Pengqiang ; Xu, Junkang ; Li, Fan ; Herold, Felix ; Etzold, Bastian J. M. ; Wang, Peng ; Su, Dang Sheng ; Lin, Sen ; Qi, Wei ; Xie, Zailai (2020)
Methanol conversion on borocarbonitride catalysts: Identification and quantification of active sites.
In: Science Advances, 6 (26)
doi: 10.1126/sciadv.aba5778
Artikel, Bibliographie
Ries, F. ; Kütemeier, D. ; Li, Y. ; Nishad, K. ; Sadiki, A. (2020)
Effect Chain Analysis of Supercritical Fuel Disintegration Processes Using an LES-based Entropy Generation Analysis.
In: Combustion Science and Technology
doi: 10.1080/00102202.2020.1770239
Artikel, Bibliographie
Trabold, J. ; Hartl, S. ; Walther, S. ; Johchi, A. ; Dreizler, A. ; Geyer, D. (2020)
Fuel Effects in Turbulent Premixed Pre-vaporised Alcohol/Air Jet Flames.
In: Flow, Turbulence and Combustio, 106
doi: 10.1007/s10494-020-00166-6
Artikel, Bibliographie
Plümacher, Dominik ; Oberlack, Martin ; Wang, Yongqi ; Smuda, Martin (2020)
On a non-linear droplet oscillation theory via the unified method.
In: Physics of Fluids, 32 (6)
doi: 10.1063/5.0007341
Artikel, Bibliographie
Gholijani, Alireza ; Schlawitschek, Christiane ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2020)
Heat transfer during drop impingement onto a hot wall: The influence of wall superheat, impact velocity, and drop diameter.
In: International Journal of Heat and Mass Transfer, 153
doi: 10.1016/j.ijheatmasstransfer.2020.119661
Artikel, Bibliographie
Träger, Lisa ; Gläsel, Jan ; Scherle, Marc ; Hartmann, Julian ; Nieken, Ulrich ; Etzold, Bastian J. M. (2020)
Carbon‐Methanol Based Adsorption Heat Pumps: Identifying Accessible Parameter Space with Carbide‐Derived Carbon Model Materials.
In: Chemical Engineering & Technology, 43 (9)
doi: 10.1002/ceat.202000181
Artikel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Spahr, Fabian ; Spielhofer, Thomas ; Hahne, Anna Sophie (2020)
Emergency service staff and social media – A comparative empirical study of the attitude by Emergency Services staff in Europe in 2014 and 2017.
In: International Journal of Disaster Risk Reduction (IJDRR), 46
doi: 10.1016/j.ijdrr.2020.101516
Artikel, Bibliographie
Praturi, Divya Sri ; Plümacher, Dominik ; Oberlack, Martin (2020)
The hierarchy of multi-point probability density functions and characteristic functions in compressible turbulence.
In: Physics of Fluids, 32 (6)
doi: 10.1063/5.0010584
Artikel, Bibliographie
Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020)
TACAI: An Intermediate Representation Based on Abstract Interpretation.
SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis. London, UK (15.06.2020-19.06.2020)
doi: 10.1145/3394451.3397204
Konferenzveröffentlichung, Bibliographie
Deußen, Benjamin ; Dierkes, Dominik ; Oberlack, Martin (2020)
Statistical theory of helical turbulence.
In: Physics of Fluids, 32 (6)
doi: 10.1063/5.0010874
Artikel, Bibliographie
Ganguly, Pritam ; Polák, Jakub ; Vegt, Nico F. A. van der ; Heyda, Jan ; Shea, Joan-Emma (2020)
Protein Stability in TMAO and Mixed Urea–TMAO Solutions.
In: The Journal of Physical Chemistry B, 124 (29)
doi: 10.1021/acs.jpcb.0c04357
Artikel, Bibliographie
Kummer, Florian ; Weber, Jens ; Smuda, Martin (2020)
BoSSS: A package for multigrid extended discontinuous Galerkin methods.
In: Computers & Mathematics with Applications, 81
doi: 10.1016/j.camwa.2020.05.001
Artikel, Bibliographie
Al-Falahi, Adil ; Alobaid, Falah ; Epple, Bernd (2020)
A New Design of an Integrated Solar Absorption Cooling System Driven by an Evacuated Tube Collector: A Case Study for Baghdad, Iraq.
In: Applied Sciences, 10 (10)
doi: 10.3390/app10103622
Artikel, Bibliographie
Muench, Maybritt ; Mankel, Eric ; Mayer, Thomas ; Jaegermann, Wolfram (2020)
Phenomenological Prediction of the Band Diagram of Organic–Organic and Inorganic–Organic Heterointerfaces.
In: Advanced Materials Technologies, 2020
doi: 10.1002/admt.202000110
Artikel, Bibliographie
Dehe, Sebastian ; Rofman, Baruch ; Bercovici, Moran ; Hardt, Steffen (2020)
Electro-osmotic flow enhancement over superhydrophobic surfaces.
In: Physical Review Fluids, 5
doi: 10.1103/PhysRevFluids.5.053701
Artikel, Bibliographie
Schmidt, Marius ; Ding, Carl-Philipp ; Peterson, Brian ; Dreizler, Andreas ; Böhm, Benjamin (2020)
Near-Wall Flame and Flow Measurements in an Optically Accessible SI Engine.
In: Flow, Turbulence and Combustion, 106
doi: 10.1007/s10494-020-00147-9
Artikel, Bibliographie
Dressler, L. ; Sacomano Filho, F. L. ; Sadiki, A. ; Janicka, J. (2020)
Influence of Thickening Factor Treatment on Predictions of Spray Flame Properties Using the ATF Model and Tabulated Chemistry.
In: Flow, Turbulence and Combustion, 2020
doi: 10.1007/s10494-020-00149-7
Artikel, Bibliographie
Steinhausen, M. ; Luo, Y. ; Popp, S. ; Strassacker, C. ; Zirwes, T. ; Kosaka, H. ; Zentgraf, F. ; Maas, U. ; Sadiki, A. ; Dreizler, A. ; Hasse, C. (2020)
Numerical investigation of local heat-release rates and thermo-chemical states in side-wall quenching of laminar methane and dimethyl ether flames.
In: Flow, Turbulence and Combustion, 106 (2)
doi: 10.1007/s10494-020-00146-w
Artikel, Bibliographie
Kaufhold, Marc-André ; Haunschild, Jasmin ; Reuter, Christian (2020)
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
28th European Conference on Information Systems. Marrakech, Morocco (15.06.2020-17.06.2020)
Konferenzveröffentlichung, Bibliographie
Gerlach, Felix ; Hussong, Jeanette ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Capillary rivulet rise in real-world corners.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 592
doi: 10.1016/j.colsurfa.2020.124530
Artikel, Bibliographie
Brilmayer, Robert ; Förster, Claire ; Zhao, Lucy ; Andrieu-Brunsen, Annette (2020)
Recent trends in nanopore polymer functionalization.
In: Current Opinion in Biotechnology, 63
doi: 10.1016/j.copbio.2020.03.005
Artikel, Bibliographie
Haussmann, Marc ; Ries, Florian ; Jeppener-Haltenhoff, Jonathan B. ; Li, Yongxiang ; Schmidt, Marius ; Welch, Cooper ; Illmann, Lars ; Böhm, Benjamin ; Nirschl, Hermann ; Krause, Mathias J. ; Sadiki, Amsini (2020)
Evaluation of a Near-Wall-Modeled Large Eddy Lattice Boltzmann Method for the Analysis of Complex Flows Relevant to IC Engines.
In: Computation, 8 (2)
doi: 10.3390/computation8020043
Artikel, Bibliographie
Fischlin, Marc ; Harasser, Patrick ; Janson, Christian
Hrsg.: Canteaut, Anne ; Ishai, Yuval (2020)
Signatures from Sequential-OR Proofs.
39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Zagreb, Croatia (10.05.2020-14.05.2020)
doi: 10.1007/978-3-030-45727-3_8
Konferenzveröffentlichung, Bibliographie
Stojanovic, Vladimir M. (2020)
Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators.
In: Physical Review Letters, 124 (19)
doi: 10.1103/PhysRevLett.124.190504
Artikel, Bibliographie
Ochs, Maria ; Mohammadi, Reza ; Vogel, Nicolas ; Andrieu‐Brunsen, Annette (2020)
Wetting‐Controlled Localized Placement of Surface Functionalities within Nanopores.
In: Small, 16 (17)
doi: 10.1002/smll.201906463
Artikel, Bibliographie
Nieminen, Raine ; Järvinen, Kimmo (2020)
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing
doi: 10.1109/TMC.2020.2990871
Artikel, Bibliographie
Pelz, P. F. ; Metzler, M. ; Schmitz, Christian ; Müller, T. M. (2020)
Upper limit for tidal power with lateral bypass.
In: Journal of Fluid Mechanics, 889
doi: 10.1017/jfm.2020.99
Artikel, Bibliographie
Zhou, Wu ; Tropea, Cameron ; Chen, Benting ; Zhang, Yukun ; Luo, Xu ; Cai, Xiaoshu (2020)
Spray drop measurements using depth from defocus.
In: Measurement Science and Technology, 31 (7)
doi: 10.1088/1361-6501/ab79c6
Artikel, Bibliographie
Fricke, Mathis ; Marić, Tomislav ; Bothe, Dieter (2020)
Contact line advection using the geometrical Volume-of-Fluid method.
In: Journal of Computational Physics, 407
doi: 10.1016/j.jcp.2019.109221
Artikel, Bibliographie
Söhling, Nicolas ; Neijhoft, Jonas ; Nienhaus, Vinzenz ; Acker, Valentin ; Harbig, Jana ; Menz, Fabian ; Ochs, Joachim ; Verboket, René D. ; Ritz, Ulrike ; Blaeser, Andreas ; Dörsam, Edgar ; Frank, Johannes ; Marzi, Ingo ; Henrich, Dirk (2020)
3D-Printing of Hierarchically Designed and Osteoconductive Bone Tissue Engineering Scaffolds.
In: Materials, 13 (8)
doi: 10.3390/ma13081836
Artikel, Bibliographie
Friedrich, Jonas ; Schäfer, Michael (2020)
Towards an Acoustic Simulation of a Water Drop Impacting in a Water Pool.
In: Flow, Turbulence and Combustion, 2020
doi: 10.1007/s10494-020-00130-4
Artikel, Bibliographie
Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Artikel, Bibliographie
Herzog, Nicole ; Hübner, Hanna ; Rüttiger, Christian ; Gallei, Markus ; Andrieu-Brunsen, Annette (2020)
Functional Metalloblock Copolymers for the Preparation and In Situ Functionalization of Porous Silica Films.
In: Langmuir, 36 (15)
doi: 10.1021/acs.langmuir.0c00245
Artikel, Bibliographie
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
15. Internationale Tagung Wirtschaftsinformatik - Community Tracks. Potsdam, Germany (08.03.2020-11.03.2020)
doi: 10.30844/wi_2020_o2-haunschild
Konferenzveröffentlichung, Bibliographie
Stojanovic, Vladimir M. (2020)
Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models.
In: Physical Review B, 101 (13)
doi: 10.1103/PhysRevB.101.134301
Artikel, Bibliographie
Wen, Qingbo ; Yu, Zhaoju ; Riedel, Ralf (2020)
The fate and role of in situ formed carbon in polymer-derived ceramics.
In: Progress in Materials Science, 2020 (109)
doi: 10.1016/j.pmatsci.2019.100623
Artikel, Bibliographie
Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (05.04.2020-07.04.2020)
Konferenzveröffentlichung, Bibliographie
Krämer, Juliane ; Struck, Patrick (2020)
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020). virtual Conference (21.09.2020-23.09.2020)
Konferenzveröffentlichung, Bibliographie
Krämer, Juliane ; Struck, Patrick (2020)
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020). Lugano, Switzerland (05.10.2020-07.10.2020)
Konferenzveröffentlichung, Bibliographie
Müller-Plathe, Florian (2020)
Keine Angst vor der Entropie.
In: Chemie in unserer Zeit, 54 (4)
doi: 10.1002/ciuz.201900060
Artikel, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020)
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20). virtual Conference (30.03.2020-03.04.2020)
doi: 10.1145/3341105.3374020
Konferenzveröffentlichung, Bibliographie
Almoslh, Adel ; Alobaid, Falah ; Heinze, Christian ; Epple, Bernd (2020)
Comparison of Equilibrium-Stage and Rate-Based Models of a Packed Column for Tar Absorption Using Vegetable Oil.
In: Applied Sciences, 10 (7)
doi: 10.3390/app10072362
Artikel, Bibliographie
Tolle, T. ; Bothe, D. ; Marić, T. (2020)
SAAMPLE: A Segregated Accuracy-driven Algorithm for Multiphase Pressure-Linked Equations.
In: Computers & Fluids, 200
doi: 10.1016/j.compfluid.2020.104450
Artikel, Bibliographie
Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19.10.2020-22.10.2020)
Konferenzveröffentlichung, Bibliographie
Kubochkin, Nikolai ; Venzmer, Joachim ; Gambaryan-Roisman, Tatiana (2020)
Superspreading and Drying of Trisiloxane-Laden Quantum Dot Nanofluids on Hydrophobic Surfaces.
In: Langmuir, 36 (14)
doi: 10.1021/acs.langmuir.0c00337
Artikel, Bibliographie
Stonner, David Jakob ; Kysela, Jaroslav ; Weir, Graeme ; Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2020)
Deterministic twirling with low resources.
In: Physics letters A, 384 (8)
doi: 10.1016/j.physleta.2019.126179
Artikel, Bibliographie
Moratilla-Vega, M. A. ; Lackhove, K. ; Janicka, J. ; Xia, H. ; Page, G. J. (2020)
Jet noise analysis using an efficient LES/high-Order acoustic coupling method.
In: Computers & Fluids, 199
doi: 10.1016/j.compfluid.2020.104438
Artikel, Bibliographie
Sinnaeve, Davy ; Ilgen, Julian ; Di Pietro, Maria Enrica ; Primozic, Johann J. ; Schmidts, Volker ; Thiele, Christina M. ; Luy, Burkhard (2020)
Probing Long-Range Anisotropic Interactions: a General and Sign-Sensitive Strategy to Measure 1 H-1 H Residual Dipolar Couplings as a Key Advance for Organic Structure Determination.
In: Angewandte Chemie International Edition, 59 (13)
doi: 10.1002/anie.201915278
Artikel, Bibliographie
Ludwig, Michael ; Klitzing, R. von (2020)
Recent progress in measurements of oscillatory forces and liquid properties under confinement.
In: Current Opinion in Colloid & Interface Science, 47
doi: 10.1016/j.cocis.2020.02.002
Artikel, Bibliographie
Schürmann, Tim ; Gerber, Nina ; Gerber, Paul (2020)
Benefits of formalized computational modeling for understanding user behavior in online privacy research.
In: Journal of Intellectual Capital, 21 (3)
doi: 10.1108/JIC-05-2019-0126
Artikel, Bibliographie
Encinas, Noemí ; Yang, Ching-Yu ; Geyer, Florian ; Kaltbeitzel, Anke ; Baumli, Philipp ; Reinholz, Jonas ; Mailänder, Volker ; Butt, Hans-Jürgen ; Vollmer, Doris (2020)
Submicrometer-Sized Roughness Suppresses Bacteria Adhesion.
In: ACS Applied Materials & Interfaces, 12 (19)
doi: 10.1021/acsami.9b22621
Artikel, Bibliographie
Schneider, Thomas ; Treiber, Amos (2020)
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, 31 (3)
doi: 10.1109/TPDS.2019.2939313
Artikel, Bibliographie
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09.03.2020-13.03.2020)
Konferenzveröffentlichung, Bibliographie
Hori, Yohei ; Bothe, Dieter ; Hayashi, Kosuke ; Hosokawa, Shigeo ; Tomiyama, Akio (2020)
Mass transfer from single carbon-dioxide bubbles in surfactant-electrolyte mixed aqueous solutions in vertical pipes.
In: International Journal of Multiphase Flow, 124
doi: 10.1016/j.ijmultiphaseflow.2020.103207
Artikel, Bibliographie
Shamooni, A. ; Cuoci, A. ; Faravelli, T. ; Sadiki, A. (2020)
An a priori DNS analysis of scale similarity based combustion models for LES of non-premixed jet flames.
In: Flow, Turbulence and Combustion, 104 (2-3)
doi: 10.1007/s10494-019-00099-9
Artikel, Bibliographie
Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Artikel, Bibliographie
Hieber, Matthias ; Kajiwara, Naoto ; Kress, Klaus ; Tolksdorf, Patrick (2020)
The periodic version of the Da Prato–Grisvard theorem and applications to the bidomain equations with FitzHugh–Nagumo transport.
In: Annali di Matematica Pura ed Applicata, 199 (6)
doi: 10.1007/s10231-020-00975-6
Artikel, Bibliographie
Straub, Benedikt B. ; Lah, David C. ; Schmidt, Henrik ; Roth, Marcel ; Gilson, Laurent ; Butt, Hans-Jürgen ; Auernhammer, Günter K. (2020)
Versatile high-speed confocal microscopy using a single laser beam.
In: Review of Scientific Instruments, 91 (3)
doi: 10.1063/1.5122311
Artikel, Bibliographie
Schweigert, David ; Damson, Bjoern ; Lueders, Hartmut ; Stephan, Peter ; Deutschmann, Olaf (2020)
The effect of wetting characteristics, thermophysical properties, and roughness on spray-wall heat transfer in selective catalytic reduction systems.
In: International Journal of Heat and Mass Transfer, 152
doi: 10.1016/j.ijheatmasstransfer.2020.119554
Artikel, Bibliographie
Lv, Cunjing ; Varanakkottu, Subramanyan N. ; Hardt, Steffen (2020)
Liquid plug formation from heated binary mixtures in capillary tubes.
In: Journal of Fluid Mechanics, 889
doi: 10.1017/jfm.2020.80
Artikel, Bibliographie
Brulin, Sebastian ; Tropea, Cameron ; Roisman, Ilia V. (2020)
Pinch-off of a viscous liquid bridge stretched with high Reynolds numbers.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 587
doi: 10.1016/j.colsurfa.2019.124271
Artikel, Bibliographie
Weisenburger, Pascal ; Salvaneschi, Guido (2020)
Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala.
In: The Art, Science, and Engineering of Programming, 4 (3)
doi: 10.22152/programming-journal.org/2020/4/17
Artikel, Bibliographie
Wiederhold, Johannes (2020)
γ-spectroscopic determination of mean lifetimes and magnetic moments of excited nuclear states.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00011446
Dissertation, Erstveröffentlichung
Stute, Milan (2020)
Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00011457
Dissertation, Erstveröffentlichung
Miranda, F. C. ; Coelho, P. J. ; Ströhle, J. ; Janicka, J. (2020)
Large-eddy simulation of a bluff-body stabilised nonpremixed flame with radiation heat transfer.
In: Combustion Theory and Modelling, 24
doi: 10.1080/13647830.2020.1727017
Artikel, Bibliographie
Brilmayer, Robert ; Kübelbeck, Sonja ; Khalil, Adnan ; Brodrecht, Martin ; Kunz, Ulrike ; Kleebe, Hans-Joachim ; Buntkowsky, Gerd ; Baier, Grit ; Andrieu‐Brunsen, Annette (2020)
Influence of Nanoconfinement on the pKa of Polyelectrolyte Functionalized Silica Mesopores.
In: Advanced Materials Interfaces, 7 (7)
doi: 10.1002/admi.201901914
Artikel, Bibliographie
Yang, Yong-Biao ; Hao, Qiang ; Müller-Plathe, Florian ; Böhm, Michael C. (2020)
Monte Carlo Simulations of SO2, H2S, and CO2 Adsorption in Charged Single-Walled Carbon Nanotube Arrays.
In: The Journal of Physical Chemistry C, 124 (10)
doi: 10.1021/acs.jpcc.9b10424
Artikel, Bibliographie
Hardt, Steffen ; Hartmann, Johannes ; Zhao, Sicheng ; Bandopadhyay, Aditya (2020)
Electric-Field-Induced Pattern Formation in Layers of DNA Molecules at the Interface between Two Immiscible Liquids.
In: Physical Review Letters, 124 (6)
doi: 10.1103/PhysRevLett.124.064501
Artikel, Bibliographie
Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020)
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020
doi: 10.1109/TC.2020.2972549
Artikel, Bibliographie
Bauer, Andreas ; Bopp, Maximilian ; Jakirlic, Suad ; Tropea, Cameron ; Krafft, Axel Joachim ; Shokina, Nina ; Hennig, Jürgen (2020)
Analysis of the wall shear stress in a generic aneurysm under pulsating and transitional flow conditions.
In: Experiments in Fluids, 61 (2)
doi: 10.1007/s00348-020-2901-4
Artikel, Bibliographie
Klingenberg, Dario ; Oberlack, Martin ; Pluemacher, Dominik (2020)
Symmetries and turbulence modeling.
In: Physics of Fluids, 32 (2)
doi: 10.1063/1.5141165
Artikel, Bibliographie
John, Daniel ; Mohammadi, Reza ; Vogel, Nicolas ; Andrieu-Brunsen, Annette (2020)
Surface-Plasmon- and Green-Light-Induced Polymerization in Mesoporous Thin Silica Films.
In: Langmuir, 36 (7)
doi: 10.1021/acs.langmuir.0c00043
Artikel, Bibliographie
Geyer, Florian ; D'Acunzi, Maria ; Sharifi-Aghili, Azadeh ; Saal, Alexander ; Gao, Nan ; Kaltbeitzel, Anke ; Sloot, Tim-Frederik ; Berger, Rüdiger ; Butt, Hans-Jürgen ; Vollmer, Doris (2020)
When and how self-cleaning of superhydrophobic surfaces works.
In: Science Advances, 6 (3)
doi: 10.1126/sciadv.aaw9727
Artikel, Bibliographie
Ko, Yeongun ; Christau, Stephanie ; Klitzing, R. von ; Genzer, Jan (2020)
Charge Density Gradients of Polymer Thin Film by Gaseous Phase Quaternization.
In: ACS Macro Letters, 9 (2)
doi: 10.1021/acsmacrolett.9b00930
Artikel, Bibliographie
Alber, Gernot ; Sauer, Alexander (2020)
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming.
In: Cryptography, 4 (1)
doi: 10.3390/cryptography4010002
Artikel, Bibliographie
Kaufhold, Marc-André ; Bayer, Markus ; Reuter, Christian (2020)
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, 57 (1)
doi: 10.1016/j.ipm.2019.102132
Artikel, Bibliographie
Zimmermann, Verena ; Gerber, Nina (2020)
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes.
In: International Journal of Human-Computer Studies, 133
doi: 10.1016/j.ijhcs.2019.08.006
Artikel, Bibliographie
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20). Santiago de Compostela (08.06.2020-12.06.2020)
Konferenzveröffentlichung, Bibliographie
Friman-Gayer, Udo (2020)
Probing Nuclear Structure Relevant for Neutrinoless Double-Beta Decay with Nuclear Resonance Fluorescence.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00011385
Dissertation, Erstveröffentlichung
Shojaeian, Mostafa ; Hardt, Steffen (2020)
Mass Transfer via Femtoliter Droplets in Ping-Pong Mode.
In: Physical Review Applied, 13 (1)
doi: 10.1103/PhysRevApplied.13.014015
Artikel, Bibliographie
Wang, Hongguang ; Jiang, Xijie ; Wang, Yi ; Stark, Robert W. ; Aken, Peter A. van ; Mannhart, Jochen ; Boschker, Hans (2020)
Direct Observation of Huge Flexoelectric Polarization around Crack Tips.
In: Nano Letters, 20 (1)
doi: 10.1021/acs.nanolett.9b03176
Artikel, Bibliographie
Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020)
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
29th USENIX Security Syposium. Boston, MA, USA (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2020)
Social media in conflicts and crises.
In: Behaviour & Information Technology (BIT), 39 (3)
doi: 10.1080/0144929X.2019.1629025
Artikel, Bibliographie
Reuter, Christian
Hrsg.: Ückert, Sandra (2020)
Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen
Buchkapitel, Bibliographie
Krüger, Stefan ; Ali, Karim ; Bodden, Eric (2020)
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.
International Symposium on Code Generation and Optimization. San Diego, CA, USA (22.02.2020-26.02.2020)
Konferenzveröffentlichung, Bibliographie
Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
24th International Conference on Financial Cryptography and Data Security (FC'20). Kota Kinabalu, Malaysia (10.02.2020-14.02.2020)
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020)
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020. virtual Conference (19.07.2020-24.07.2020)
Konferenzveröffentlichung, Bibliographie
Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020)
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020. San Diego, USA (23.02.2020-26.02.2020)
Konferenzveröffentlichung, Bibliographie
Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020)
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium. Boston, USA (12.08.2020-14.08.2020)
Konferenzveröffentlichung, Bibliographie
Mohammadi, Reza ; Ochs, Maria ; Andrieu-Brunsen, Annette ; Vogel, Nicolas (2020)
Effect of Asymmetry on Plasmon Hybridization and Sensing Capacities of Hole-Disk Arrays.
In: The Journal of Physical Chemistry C, 124 (4)
doi: 10.1021/acs.jpcc.9b10229
Artikel, Bibliographie
Uhlig, Martin ; Löhmann, Oliver ; Vargas Ruiz, Salomé ; Varga, Imre ; Klitzing, R. von ; Campbell, Richard A. (2020)
New structural approach to rationalize the foam film stability of oppositely charged polyelectrolyte/surfactant mixtures.
In: Chemical Communications, 56 (6)
doi: 10.1039/c9cc08470c
Artikel, Bibliographie
Burzynski, David A. ; Roisman, Ilia V. ; Bansmer, Stephan E. (2020)
On the splashing of high-speed drops impacting a dry surface.
In: Journal of Fluid Mechanics, 892
doi: 10.1017/jfm.2020.168
Artikel, Bibliographie
Kosaka, Hidemasa ; Zentgraf, Florian ; Scholtissek, Arne ; Hasse, Christian ; Dreizler, Andreas (2020)
Effect of Flame-Wall Interaction on Local Heat Release of Methane and DME Combustion in a Side-Wall Quenching Geometry.
In: Flow, Turbulence and Combustion, 104 (4)
doi: 10.1007/s10494-019-00090-4
Artikel, Bibliographie
Rondina, Gustavo G. ; Böhm, Michael C. ; Müller-Plathe, Florian (2020)
Predicting the Mobility Increase of Coarse-Grained Polymer Models from Excess Entropy Differences.
In: Journal of Chemical Theory and Computation, 16 (3)
doi: 10.1021/acs.jctc.9b01088
Artikel, Bibliographie
Sacomano Filho, Fernando Luiz ; Hosseinzadeh, Arash ; Sadiki, Amsini ; Janicka, Johannes (2020)
On the interaction between turbulence and ethanol spray combustion using a dynamic wrinkling model coupled with tabulated chemistry.
In: Combustion and Flame, 215
doi: 10.1016/j.combustflame.2020.01.038
Artikel, Bibliographie
Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
The 25th Australasian Conference on Information Security and Privacy (ACISP'20). Perth, Australia (30.11.2020-02.12.2020)
Konferenzveröffentlichung, Bibliographie
Baier, Tobias ; Hardt, Steffen (2020)
Gas separation in a Knudsen pump inspired by a Crookes radiometer.
In: Microfluidics and Nanofluidics, 24 (6)
doi: 10.1007/s10404-020-02342-6
Artikel, Bibliographie
Connor, Paula ; Schuch, Jona ; Kaiser, Bernhard ; Jaegermann, Wolfram (2020)
The Determination of Electrochemical Active Surface Area and Specific Capacity Revisited for the System MnOx as an Oxygen Evolution Catalyst.
In: Zeitschrift für Physikalische Chemie, 234 (5)
doi: 10.1515/zpch-2019-1514
Artikel, Bibliographie
Knoche, Stefan ; Heid, Maurice ; Gora, Niklas ; Ohlig, Dominik ; Drochner, Alfons ; Etzold, Bastian ; Vogel, Herbert (2020)
Mechanistic Study on the Selective Oxidation of Acrolein to Acrylic Acid concerning the Role of Water.
In: ChemCatChem, 12 (13)
doi: 10.1002/cctc.201902348
Artikel, Bibliographie
Schneider, Jurek ; Süss, Leonard D. ; Müller-Plathe, Florian (2020)
The Influence of Entanglements on the Dynamics of Flash Nanoprecipitation: A Slip-Spring Dissipative-Particle-Dynamics Investigation.
In: Journal of Chemical & Engineering Data, 65 (3)
doi: 10.1021/acs.jced.9b00679
Artikel, Bibliographie
Dierkes, Dominik ; Cheviakov, Alexei ; Oberlack, Martin (2020)
Publisher’s Note: “New similarity reductions and exact solutions for helically symmetric viscous flows” [Phys. Fluids 32, 053604 (2020)].
In: Physics of Fluids, 32 (6)
doi: 10.1063/5.0015297
Artikel, Bibliographie
Fraga, G. C. ; Miranda, F. C. ; França, F. H. R. ; Janicka, J. ; Coelho, P. J. (2020)
Assessment of a model for emission subgrid-scale turbulence-radiation interaction applied to a scaled Sandia flame DD.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, 248
doi: 10.1016/j.jqsrt.2020.106986
Artikel, Bibliographie
Feldmann, Johannes ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Dynamics of a steady liquid flow in a rim bounding a falling wall film: Influence of aerodynamic effects.
In: Physical Review Fluids, 5 (6)
doi: 10.1103/PhysRevFluids.5.064001
Artikel, Bibliographie
Li, Can ; Wu, Yingchun ; Wu, Xuecheng ; Tropea, Cameron (2020)
Simultaneous measurement of refractive index, diameter and colloid concentration of a droplet using rainbow refractometry.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, 245
doi: 10.1016/j.jqsrt.2020.106834
Artikel, Bibliographie
Rofman, Baruch ; Dehe, Sebastian ; Frumkin, Valeri ; Hardt, Steffen ; Bercovici, Moran (2020)
Intermediate States of Wetting on Hierarchical Superhydrophobic Surfaces.
In: Langmuir, 36 (20)
doi: 10.1021/acs.langmuir.0c00499
Artikel, Bibliographie
Shrishak, Kris ; Shulman, Haya (2020)
MPC for Securing Internet Infrastructure.
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020). virtual Conference (29.06.2020-02.07.2020)
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020. virtual Conference (20.07.2020-24.07.2020)
Konferenzveröffentlichung, Bibliographie
Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020)
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020). virtual Conference (24.08.2020-27.08.2020)
Konferenzveröffentlichung, Bibliographie
Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography. virtual Conference (08.07.2020-10.07.2020)
Konferenzveröffentlichung, Bibliographie
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020)
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020). San Diego, USA (23.02.2020-26.02.2020)
Konferenzveröffentlichung, Bibliographie
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Konferenzveröffentlichung, Bibliographie
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Konferenzveröffentlichung, Bibliographie
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Konferenzveröffentlichung, Bibliographie
Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020)
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Konferenzveröffentlichung, Bibliographie
Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security. virtual Conference (14.09.2020-18.09.2020)
Konferenzveröffentlichung, Bibliographie
Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020)
Peek-a-Boo: I see your smart home activities, even encrypted!
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Haunschild, Jasmin ; Hollick, Matthias ; Mühlhäuser, Max ; Vogt, Joachim ; Kreutzer, Michael (2020)
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities.
Mensch und Computer 2020 - Digitaler Wandel im Fluss der Zeit. virtual Conference (06.09.2020-09.09.2020)
doi: 10.18420/muc2020-ws117-408
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2020)
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen.
In: BBK Bevölkerungsschutz, 2020 (2)
Artikel, Bibliographie
Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020)
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Annual Computer Security Applications Conference (ACSAC 2020). virtual Conference (07.12.2020-11.12.2020)
Konferenzveröffentlichung, Bibliographie
Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.11.2020-13.11.2020)
Konferenzveröffentlichung, Bibliographie
Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020)
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20). virtual Conference (14.12.2020-16.12.2020)
Konferenzveröffentlichung, Bibliographie
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.12.2020-11.12.2020)
Konferenzveröffentlichung, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020)
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020). virtual Conference (19.10.2020-23.10.2020)
Konferenzveröffentlichung, Bibliographie
Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020)
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020). virtual Conference (18.11.2020-19.11.2020)
Konferenzveröffentlichung, Bibliographie
Krämer, Juliane ; Struck, Patrick (2020)
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020). virtual Conference (13.12.2020-16.12.2020)
Konferenzveröffentlichung, Bibliographie
Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.12.2020-11.12.2020)
Konferenzveröffentlichung, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384749
Konferenzveröffentlichung, Bibliographie
Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020)
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain. virtual Conference (02.11.2020-06.11.2020)
Konferenzveröffentlichung, Bibliographie
Mazaheri, Sogol (2020)
Cryptographic Primitives that Resist Backdooring and Subversion.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00014550
Dissertation, Erstveröffentlichung, Verlagsversion
Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020)
LeakyPick: IoT Audio Spy Detector.
36th Annual Computer Security Applications Conference. virtual Conference (07.12.2020-11.12.2020)
doi: 10.1145/3427228.3427277
Konferenzveröffentlichung, Bibliographie
Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020)
Control Behavior Integrity for Distributed Cyber-Physical Systems.
11th International Conference on Cyber-Physical Systems (ICCPS). Sydney, Australia (22.04.2020-24.04.2020)
doi: 10.1109/ICCPS48487.2020.00011
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André (2020)
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis.
Technische Universität Darmstadt
Dissertation, Bibliographie
Kulyk, Oksana ; Reinheimer, Benjamin ; Aldag, Lukas ; Mayer, Peter ; Gerber, Nina ; Volkamer, Melanie (2020)
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation.
doi: 10.1007/978-3-030-54455-3_7
Konferenzveröffentlichung, Bibliographie
Tenzer, Fabian M. ; Roisman, Ilia V. ; Tropea, Cameron (2019)
Fast transient spray cooling of a hot thick target.
In: Journal of Fluid Mechanics, 881
doi: 10.1017/jfm.2019.743
Artikel, Bibliographie
Gerlach, Felix ; Hartmann, Maximilian ; Tropea, Cameron (2019)
The interaction of inner and outer surface corners during spontaneous wetting.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 583
doi: 10.1016/j.colsurfa.2019.123977
Artikel, Bibliographie
Krämer, Juliane ; Marzougui, Soundes (2019)
Post-Quantum Cryptography in Embedded Systems.
14th International Conference on Availability, Reliability and Security. Canterbury, United Kingdom (26.08.2019-29.08.2019)
doi: 10.1145/3339252.3341475
Konferenzveröffentlichung, Bibliographie
Schuster, Tom (2019)
Optimizing HyCC with Compiler Intermediate Representation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Fricke, Mathis ; Marić, Tomislav ; Bothe, Dieter (2019)
Contact line advection using the geometrical Volume-of-Fluid method.
Report, Bibliographie
Smuda, Martin ; Oberlack, Martin (2019)
On the analytical solution of the two-phase Couette flow with wall transpiration.
In: Physics of Fluids, 31 (12)
doi: 10.1063/1.5119795
Artikel, Bibliographie
Henrich, Franziska ; Linke, Dorota ; Sauer, Hans Martin ; Dörsam, Edgar ; Hardt, Steffen ; Butt, Hans-Jürgen ; Auernhammer, Günter K. (2019)
Forced dynamic dewetting of structured surfaces: Influence of surfactants.
In: Physical Review Fluids, 4
doi: 10.1103/PhysRevFluids.4.124202
Artikel, Bibliographie
Giga, Yoshikazu ; Gries, Mathis ; Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2019)
Analyticity of solutions to the primitive equations.
In: Mathematische Nachrichten, 2020
doi: 10.1002/mana.201700401
Artikel, Bibliographie
Liu, Wei ; Wang, Chao ; Herold, Felix ; Etzold, Bastian J. M. ; Su, Dangsheng ; Qi, Wei (2019)
Oxidative dehydrogenation on nanocarbon: Effect of heteroatom doping.
In: Applied Catalysis B: Environmental, 258
doi: 10.1016/j.apcatb.2019.117982
Artikel, Bibliographie
Pietralla, Norbert ; Isaak, Johann ; Werner, Volker (2019)
Photonuclear reactions: Achievements and perspectives.
In: The European Physical Journal A, 55
doi: 10.1140/epja/i2019-12857-4
Artikel, Bibliographie
Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019)
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference. San Juan, Puerto Rico (09.12.2019-13.12.2019)
Konferenzveröffentlichung, Bibliographie
Hatakenaka, Ryuta ; Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron ; Tagawa, Yoshiyuki (2019)
Magic carpet breakup of a drop impacting onto a heated surface in a depressurized environment.
In: International Journal of Heat and Mass Transfer, 145
doi: 10.1016/j.ijheatmasstransfer.2019.118729
Artikel, Bibliographie
Boyaciyan, Dikran ; Klitzing, R. von (2019)
Stimuli-responsive polymer/metal composites: From fundamental research to self-regulating devices.
In: Current Opinion in Colloid & Interface Science, 44
doi: 10.1016/j.cocis.2019.10.005
Artikel, Bibliographie
Zimmermann, Verena ; Gerber, Paul ; Marky, Karola ; Böck, Leon ; Kirchbuchner, Florian (2019)
Assessing Users’ Privacy and Security Concerns of Smart Home Technologies.
In: i-com Journal of Interactive Media, 18 (3)
doi: 10.1515/icom-2019-0015
Artikel, Bibliographie
Haubner, Johannes ; Ulbrich, Michael ; Ulbrich, Stefan (2019)
Analysis of shape optimization problems for unsteady fluid-structure interaction.
In: Inverse Problems, 2019
doi: 10.1088/1361-6420/ab5a11
Artikel, Bibliographie
Fricke, Mathis ; Maric, T. ; Bothe, D. (2019)
Contact line advection using the Level Set method.
In: Proceedings in Applied Mathematics and Mechanics, 19 (1)
doi: 10.1002/pamm.201900476
Artikel, Bibliographie
Gründing, Dirk ; Fricke, Mathis ; Bothe, Dieter (2019)
Capillary Rise ‐ Jurin's Height vs Spherical Cap.
In: PAMM, 19 (1)
doi: 10.1002/pamm.201900336
Artikel, Bibliographie
Lehr, Jan-Patrick ; Calotoiu, Alexandru ; Wolf, Felix ; Bischof, Christian (2019)
Automatic Instrumentation Refinement for Empirical Performance Modeling.
International Workshop on Programming and Performance Visualization Tools (ProTools'19). Denver, USA (17.11.2019-17.11.2019)
doi: 10.1109/ProTools49597.2019.00011
Konferenzveröffentlichung, Bibliographie
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019-15.11.2019)
Konferenzveröffentlichung, Bibliographie
Munaò, Gianmarco ; De Nicola, Antonio ; Müller-Plathe, Florian ; Kawakatsu, Toshihiro ; Kalogirou, Andreas ; Milano, Giuseppe (2019)
Influence of Polymer Bidispersity on the Effective Particle–Particle Interactions in Polymer Nanocomposites.
In: Macromolecules, 52 (22)
doi: 10.1021/acs.macromol.9b01367
Artikel, Bibliographie
Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
26th ACM Conference on Computer and Communications Security. London, United Kingdom (11.11.2019-15.11.2019)
doi: 10.1145/3319535.3363251
Konferenzveröffentlichung, Bibliographie
Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019)
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58
doi: 10.1016/j.csl.2019.06.001
Artikel, Bibliographie
Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019)
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
2019 International Conference On Computer Aided Design (ICCAD). The Westin Westminster Westminster, CO (04.11.2019-07.11.2019)
Konferenzveröffentlichung, Bibliographie
Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019)
Efficiently Stealing your Machine Learning Models.
WPES'19 - 18. Workshop on Privacy in the Electronic Society. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie
Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie
Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019)
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication
doi: 10.1016/j.specom.2019.09.004
Artikel, Bibliographie
Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019)
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2)
doi: 10.1145/3372300.3372304
Artikel, Bibliographie
Köhler, Mirco ; Salvaneschi, Guido (2019)
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering. San Diego, Ca, USA (10.11.2019-15.11.2019)
doi: 10.1109/ASE.2019.00082
Konferenzveröffentlichung, Bibliographie
Zaidan, Firas (2019)
Developing a Fuzzing Framework for ARM TrustZone.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Nguyen, Giang Nam (2019)
Developing Performance Models for Codes with Exponential Runtime Behavior.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019)
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Report, Bibliographie
Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019)
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4)
doi: 10.3390/cryptography3040025
Artikel, Bibliographie
Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2019)
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: IEEE Transactions on Software Engineering, 2019
doi: 10.1109/TSE.2019.2948910
Artikel, Bibliographie
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security
doi: 10.1049/iet-ifs.2019.0125
Artikel, Bibliographie
Fischler, Yannic ; Lehr, Jan-Patrick ; Kiehn, Matthäus Magnus ; Bischof, Christian (2019)
Automatic identification of standard template algorithms in raw loops.
6th ACM SIGPLAN International Workshop on AI-Inspired and Empirical Methods for Software Engineering on Parallel Computing Systems. Athens, Greece (22.10.2019-22.10.2019)
doi: 10.1145/3358500.3361568
Konferenzveröffentlichung, Bibliographie
Hill, Simon ; Acher, Thomas ; Hoffmann, Rainer ; Ferstl, Johann ; Deising, Daniel ; Marschall, Holger ; Rehfeldt, Sebastian ; Klein, Harald (2019)
Quantifizierung der Trenneffizienz einer strukturierten Packung mittels numerischer Simulation.
In: Chemie Ingenieur Technik
doi: 10.1002/cite.201900041
Artikel, Bibliographie
Dressler, L. ; Ries, F. ; Kuenne, G. ; Janicka, J. ; Sadiki, A. (2019)
Analysis of Shear Effects on Mixing and Reaction Layers in Premixed Turbulent Stratified Flames using LES coupled to Tabulated Chemistry.
In: Combustion Science and Technology, 2019
doi: 10.1080/00102202.2019.1678915
Artikel, Bibliographie
Geschwindner, Christopher ; Kranz, Patrick ; Welch, Cooper ; Schmidt, Marius ; Böhm, Benjamin ; Kaiser, Sebastian A. ; Morena, Joaquin de la (2019)
Analysis of the interaction of Spray G and in-cylinder flow in two optical engines for late gasoline direct injection.
In: International Journal of Engine Research, 21 (1)
doi: 10.1177/1468087419881535
Artikel, Bibliographie
Tom, Jessica C. ; Appel, Christian ; Andrieu-Brunsen, Annette (2019)
Fabrication and in situ functionalisation of mesoporous silica films by the physical entrapment of functional and responsive block copolymer structuring agents.
In: Soft Matter, 15 (40)
doi: 10.1039/c9sm00872a
Artikel, Bibliographie
Hartmann, Maximilian ; Fricke, Mathis ; Weimar, Lukas ; Gründing, Dirk ; Marić, Tomislav ; Bothe, Dieter ; Hardt, Steffen (2019)
Breakup dynamics of capillary bridges on hydrophobic stripes.
doi: 10.48550/arXiv.1910.01887
Report, Bibliographie
Fischlin, Marc ; Haagh, Helene
Hrsg.: Schwabe, Peter ; Theriault, Nicolas (2019)
How to Sign with White-Boxed AES.
6th International Conference on Cryptology and Information Security in Latin America. Santiago de Chile, Chile (02.10.2019-04.10.2019)
doi: 10.1007/978-3-030-30530-7_13
Konferenzveröffentlichung, Bibliographie
Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019)
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19). Fuzhou, China (25.10.2019-27.10.2019)
Konferenzveröffentlichung, Bibliographie
Kind, J. ; Thiele, C. M. (2019)
MRI and localised NMR spectroscopy of sessile droplets on hydrophilic, hydrophobic and superhydrophobic surfaces – Examination of the chemical composition during evaporation.
In: Journal of Magnetic Resonance, 307
doi: 10.1016/j.jmr.2019.106579
Artikel, Bibliographie
Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019)
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security
doi: 10.1186/s13635-019-0099-x
Artikel, Bibliographie
Krämer, Juliane (2019)
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5)
doi: 10.1007/s00287-019-01200-2
Artikel, Bibliographie
Sacomano Filho, Fernando Luiz ; Dressler, Louis ; Hosseinzadeh, Arash ; Sadiki, Amsini ; Krieger Filho, Guenther Carlos (2019)
Investigations of Evaporative Cooling and Turbulence Flame Interaction Modeling in Ethanol Turbulent Spray Combustion Using Tabulated Chemistry.
In: Fluids, 4 (4)
doi: 10.3390/fluids4040187
Artikel, Bibliographie
Irmer, Jonas von ; Frieß, Florian ; Herold, Dominik ; Kind, Jonas ; Thiele, Christina M. ; Gallei, Markus (2019)
Photochromic dithienylethenes characterized by in situ irradiation NMR-spectroscopy and electrochemically induced responsiveness on gold substrates.
In: Journal of Materials Chemistry C, 7 (45)
doi: 10.1039/c9tc04495g
Artikel, Bibliographie
Shen, Liu-Liu ; Zhang, Gui-Rong ; Biesalski, Markus ; Etzold, Bastian J. M. (2019)
Paper-based microfluidic aluminum–air batteries: toward next-generation miniaturized power supply.
In: Lab on a Chip, 19 (20)
doi: 10.1039/c9lc00574a
Artikel, Bibliographie
Wei, Nathaniel J. ; Kissing, Johannes ; Tropea, Cameron (2019)
Generation of periodic gusts with a pitching and plunging airfoil.
In: Experiments in Fluids, 60 (11)
doi: 10.1007/s00348-019-2815-1
Artikel, Bibliographie
Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019)
PAtt: Physics-based Attestation of Control Systems.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Beijing (23.09.2019-25.09.2019)
Konferenzveröffentlichung, Bibliographie
Fricke, Mathis ; Maric, Tomislav ; Bothe, Dieter (2019)
Contact Line Advection using the Level Set Method : Data and C++ Implementations.
doi: 10.25534/tudatalib-58
Forschungsdaten, Bibliographie
Tripathi, Gaurav ; Sharma, Priybrat ; Dhar, Atul ; Sadiki, Amsini (2019)
Computational investigation of diesel injection strategies in hydrogen-diesel dual fuel engine.
In: Sustainable Energy Technologies and Assessments, 36
doi: 10.1016/j.seta.2019.100543
Artikel, Bibliographie
Voß, Dorothea ; Ponce, Sebastian ; Wesinger, Stefanie ; Etzold, Bastian J. M. ; Albert, Jakob (2019)
Combining autoclave and LCWM reactor studies to shed light on the kinetics of glucose oxidation catalyzed by doped molybdenum-based heteropoly acids.
In: RSC Advances, 9 (50)
doi: 10.1039/c9ra05544d
Artikel, Bibliographie
Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019)
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-133-04
Konferenzveröffentlichung, Bibliographie
Gräßle, Carmen ; Hinze, Michael ; Lang, Jens ; Ullmann, Sebastian (2019)
POD model order reduction with space-adapted snapshots for incompressible flows.
In: Advances in Computational Mathematics, 45
doi: 10.1007/s10444-019-09716-7
Artikel, Bibliographie
Ding, Carl-Philipp ; Vuilleumier, David ; Kim, Namho ; Reuss, David L. ; Sjöberg, Magnus ; Böhm, Benjamin (2019)
Effect of engine conditions and injection timing on piston-top fuel films for stratified direct-injection spark-ignition operation using E30.
In: International Journal of Engine Research, 21 (2)
doi: 10.1177/1468087419869785
Artikel, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
Hrsg.: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A. (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
24th European Symposium on Research in Computer Security. Luxembourg (23.09.2019-27.09.2019)
doi: 10.1007/978-3-030-29962-0_25
Konferenzveröffentlichung, Bibliographie
Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
Hrsg.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.1145/3340764.3340782
Konferenzveröffentlichung, Bibliographie
Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf
Hrsg.: David, Klaus (2019)
Resilience in Security and Crises through Adaptions and Transitions.
49. Jahrestagung der Gesellschaft für Informatik. Kassel, Germany (23.09.2019-26.09.2019)
doi: 10.18420/inf2019_ws60
Konferenzveröffentlichung, Bibliographie
Dillen, Sebastian ; Oberlack, Martin ; Wang, Yongqi (2019)
Analytical investigation of rotationally symmetrical oscillating flows of viscoelastic fluids.
In: Journal of Non-Newtonian Fluid Mechanics, 272
doi: 10.1016/j.jnnfm.2019.104168
Artikel, Bibliographie
Nikolopoulos, Georgios M. (2019)
Optical scheme for cryptographic commitments with physical unclonable keys.
In: Optical Express, 27 (20)
doi: 10.1364/OE.27.029367
Artikel, Bibliographie
Stonner, David Jakob (2019)
Construction of Random Unitary Operations for Asymptotic Preparation of Werner States.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Stetten, Amy Z. ; Golovko, Dmytro S. ; Weber, Stefan A. L. ; Butt, Hans-Jürgen (2019)
Slide electrification: charging of surfaces by moving water drops.
In: Soft Matter, 15 (43)
doi: 10.1039/C9SM01348B
Artikel, Bibliographie
Spielhofer, Thomas ; Hahne, Anna Sophie ; Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2019)
Social Media Use in Emergencies of Citizens in the United Kingdom.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (19.05.2019-22.05.2019)
Konferenzveröffentlichung, Bibliographie
Appel, Christian ; Kuttich, Björn ; Stühn, Lukas ; Stark, Robert W. ; Stühn, Bernd (2019)
Structural Properties and Magnetic Ordering in 2D Polymer Nanocomposites: Existence of Long Magnetic Dipolar Chains in Zero Field.
In: Langmuir, 35 (37)
doi: 10.1021/acs.langmuir.9b02094
Artikel, Bibliographie
Heß, Julian ; Tai, Yih-Chin ; Wang, Yongqi (2019)
Debris flows with pore pressure and intergranular friction on rugged topography.
In: Computers & Fluids, 190
doi: 10.1016/j.compfluid.2019.06.015
Artikel, Bibliographie
Hark, Rhaban Simon (2019)
Monitoring Federated Softwarized Networks: Approaches for Efficient and Collaborative Data Collection in Large-Scale Software-Defined Networks.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019)
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40)
doi: 10.21105/joss.01606
Artikel, Bibliographie
Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019)
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19). Beijing, China (15.07.2019-19.07.2019)
doi: 10.1145/3293882.3330555
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019)
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019)
Mobile Private Contact Discovery at Scale.
28. USENIX Security Symposium (USENIX Security'19). SANTA CLARA, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019)
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019. Graz, Austria (15.09.2019-19.09.2019)
Konferenzveröffentlichung, Bibliographie
Nienhaus, Vinzenz ; Smith, Kevin ; Spiehl, Dieter ; Dörsam, Edgar (2019)
Investigations on nozzle geometry in fused filament fabrication.
In: Additive Manufacturing, 28 (13)
doi: 10.1016/j.addma.2019.06.019
Artikel, Bibliographie
Zhao, Binyu ; Luo, Shuang ; Bonaccurso, Elmar ; Auernhammer, Günter K. ; Deng, Xu ; Li, Zhigang ; Chen, Longquan (2019)
Resolving the Apparent Line Tension of Sessile Droplets and Understanding its Sign Change at a Critical Wetting Angle.
In: Physical Review Letters, 123 (9)
doi: 10.1103/PhysRevLett.123.094501
Artikel, Bibliographie
Nikolopoulos, Georgios M. (2019)
Cryptographic one-way function based on boson sampling.
In: Quantum Information Processing, 18 (8)
doi: 10.1007/s11128-019-2372-9
Artikel, Bibliographie
Egert, Rolf ; Tundis, Andrea ; Mühlhäuser, Max (2019)
On the Simulation of Smart Grid Environments.
2019 Summer Simulation Conference (SummerSim'19). Berlin, Germany (22.07.2019-24.07.2019)
Konferenzveröffentlichung, Bibliographie
Sun, Qiangqiang ; Wang, Dehui ; Li, Yanan ; Zhang, Jiahui ; Ye, Shuji ; Cui, Jiaxi ; Chen, Longquan ; Wang, Zuankai ; Butt, Hans-Jürgen ; Vollmer, Doris ; Deng, Xu (2019)
Surface charge printing for programmed droplet transport.
In: Nature Materials, 18 (9)
doi: 10.1038/s41563-019-0440-2
Artikel, Bibliographie
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas
Hrsg.: Ding, Jintai ; Steinwandt, Rainer (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
10th International Conference on Post-Quantum Cryptography. Chongqing, People's Republic China (08.05.2019-10.05.2019)
doi: 10.1007/978-3-030-25510-7_12
Konferenzveröffentlichung, Bibliographie
Bodenstein, Christina ; Sauer, Hans Martin ; Hirmer, Katrin ; Dörsam, Edgar (2019)
Printing process and characterization of fully pad printed electroluminescent panels on curved surfaces.
In: Journal of Coatings Technology and Research, 16 (6)
doi: 10.1007/s11998-019-00243-0
Artikel, Bibliographie
Stamm, Jacqueline ; Daume, Dominik ; Hartwig, Tobias ; Oschmann, Maximilian ; Schäfer, Julian ; Sauer, Hans Martin ; Dörsam, Edgar (2019)
Dynamic interferometric imaging of the thickness distribution of evaporating thin liquid films.
In: Journal of Coatings Technology and Research, 16 (6)
doi: 10.1007/s11998-019-00236-z
Artikel, Bibliographie
Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019)
Sustainable Security & Safety: Challenges and Opportunities.
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS). Stuttgart (09.07.2019-09.07.2019)
doi: 10.4230/OASIcs.CERTS.2019.4
Konferenzveröffentlichung, Bibliographie
Ashihmin, Alexander ; Piskunov, Maxim ; Roisman, Ilia ; Yanovsky, Vycheslav (2019)
Thermal stability control of the water-in-diesel microemulsion fuel produced by using a nonionic surfactant combined with aliphatic alcohols.
In: Journal of Dispersion Science and Technology
doi: 10.1080/01932691.2019.1634583
Artikel, Bibliographie
Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019)
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
ACM Asia Conference on Computer and Communications Security (AsiaCCS). Auckland (07.07.2019-12.07.2019)
doi: 10.1145/3321705.3329827
Konferenzveröffentlichung, Bibliographie
Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019)
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
Artikel, Bibliographie
Schneider, Thomas ; Tkachenko, Oleksandr (2019)
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19). Auckland New Zealand (09.07.2019-12.07.2019)
Konferenzveröffentlichung, Bibliographie
Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019)
Web Application for Privacy-Preserving Scheduling using Secure Computation.
16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic (26.07.2019 - 28.07.2019)
doi: 10.5220/0007947704560463
Konferenzveröffentlichung, Bibliographie
Rieks, Sebastian ; Wende, Marc ; Preußer, Niklas ; Gambaryan-Roisman, Tatiana ; Kenig, Eugeny Y. (2019)
A hydrodynamic analogy based modelling approach for zero-gravity distillation with metal foams.
In: Chemical Engineering Research and Design, 147
doi: 10.1016/j.cherd.2019.05.022
Artikel, Bibliographie
Nau, Maximilian ; Seelinger, David ; Biesalski, Markus (2019)
Independent Two Way Switching of the Wetting Behavior of Cellulose‐Derived Nanoparticle Surface Coatings by Light and by Temperature.
In: Advanced Materials Interfaces
doi: 10.1002/admi.201900378
Artikel, Bibliographie
Jesch, David ; Bevrnja, Alija ; Di Mare, Francesca ; Janicka, Johannes ; Sadiki, Amsini (2019)
Large eddy simulation of a turbulent flame using tabulated chemistry with a novel multivariate PDF.
In: International Journal of Computational Fluid Dynamics
doi: 10.1080/10618562.2019.1640359
Artikel, Bibliographie
Nishad, Kaushal ; Ries, Florian ; Li, Yongxiang ; Sadiki, Amsini (2019)
Numerical Investigation of Flow through a Valve during Charge Intake in a DISI -Engine Using Large Eddy Simulation.
In: Energies, 12 (13)
doi: 10.3390/en12132620
Artikel, Bibliographie
Nishad, Kaushal ; Stein, Marcus ; Ries, Florian ; Bykov, Viatcheslav ; Maas, Ulrich ; Deutschmann, Olaf ; Janicka, Johannes ; Sadiki, Amsini (2019)
Thermal Decomposition of a Single AdBlue® Droplet Including Wall–Film Formation in Turbulent Cross-Flow in an SCR System.
In: Energies, 12 (13)
doi: 10.3390/en12132600
Artikel, Bibliographie
Zucker, René (2019)
Erstellung eines Python-Interfaces für die Erforschung von Polytopen in der Quanteninformationstheorie.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Rettenmaier, Daniel ; Deising, Daniel ; Ouedraogo, Yun ; Gjonaj, Erion ; De Gersem, Herbert ; Bothe, Dieter ; Tropea, Cameron ; Marschall, Holger (2019)
Load balanced 2D and 3D adaptive mesh refinement in OpenFOAM.
In: SoftwareX, 10
doi: 10.1016/j.softx.2019.100317
Artikel, Bibliographie
Stark, Tobias ; Kiedrowski, Thomas ; Marschall, Holger ; Lasagni, Andrés Fabián (2019)
Avoiding Starvation in Tribocontact Through Active Lubricant Transport in Laser Textured Surfaces.
In: Lubricants, 7 (6)
doi: 10.3390/lubricants7060054
Artikel, Bibliographie
Sadeghi, Arman ; Azari, Milad ; Hardt, Steffen (2019)
Electroosmotic flow in soft microchannels at high grafting densities.
In: Physical Review Fluids, 4 (6)
doi: 10.1103/PhysRevFluids.4.063701
Artikel, Bibliographie
Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019)
Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises.
39 (3)
doi: 10.1080/0144929X.2019.1629025
Zeitschriftenheft, -band oder -jahrgang, Bibliographie
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019)
A Practical Attestation Protocol for Autonomous Embedded Systems.
4th IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm, Sweden (17.06.2019-19.06.2019)
Konferenzveröffentlichung, Bibliographie
Olt, Christian M. ; Mesbah, Neda (2019)
Weary of Watching Out? - Cause and Effect of Security Fatigue.
European Conference on Information Systems - ECIS 2019. Stockholm, Sweden (08.06.2019-14.06.2019)
Konferenzveröffentlichung, Bibliographie
Wagner, Amina ; Mesbah, Neda (2019)
Too Confident to Care: Investigating Overconfidence in Privacy Decision Making.
European Conference on Information Systems - ECIS 2019. Stockholm, Sweden (08.06.2019-14.06.2019)
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena ; Gerber, Nina ; Mayer, Peter ; Kleboth, Marius ; Preuschen, Alexandra von ; Schmidt, Konstantin (2019)
Keep on rating – on the systematic rating and comparison of authentication schemes.
In: Information & Computer Security
doi: 10.1108/ICS-01-2019-0020
Artikel, Bibliographie
Kohnhäuser, Florian (2019)
Advanced Remote Attestation Protocols for Embedded Systems.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Traverso, Giulia (2019)
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019)
ARM2GC: Succinct Garbled Processor for Secure Computation.
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE. Las Vegas, USA (02.06.2019-06.06.2019)
Konferenzveröffentlichung, Bibliographie
Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
4. IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm (17.06.2019-19.06.2019)
Konferenzveröffentlichung, Bibliographie
Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019)
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Faro, Portugal (12.06.2019-14.06.2019)
doi: 10.1007/978-3-030-22750-0_48
Konferenzveröffentlichung, Bibliographie
Wen, Qingbo ; Luan, Xingang ; Wang, Lei ; Xu, Xinming ; Ionescu, Emanuel ; Riedel, Ralf (2019)
Laser ablation behavior of SiHfC-based ceramics prepared from a single-source precursor: Effects of Hf-incorporation into SiC.
In: Journal of the European Ceramic Society, 39 (6)
doi: 10.1016/j.jeurceramsoc.2019.01.040
Artikel, Bibliographie
Mantel, Heiko ; Probst, Christian (2019)
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF). Hoboken, NJ, USA (25.06.2019-28.06.2019)
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena ; Dickhaut, Ernestine ; Gerber, Paul ; Vogt, Joachim (2019)
Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
4th European Workshop on Usable Security (EuroUSEC 2019). Stockholm, Schweden (20.06.2019-20.06.2019)
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019)
Why Johnny Fails to Protect his Privacy.
4th European Workshop on Usable Security (EuroUSEC 2019). Stockholm, Schweden (20.06.2019-20.06.2019)
Konferenzveröffentlichung, Bibliographie
Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (02.06.2019-06.06.2019)
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Zimmermann, Verena (2019)
Encouraging Password Manager Reuse.
In: Network Security, 2019 (6)
doi: 10.1016/S1353-4858(19)30075-3
Artikel, Bibliographie
Boukoros, Spyridon (2019)
Multidimensional Privacy Quantification for User Empowerment.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019)
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
IEEE Workshop on the Internet of Safe Things. San Francisco, California, USA (23.05.2019-23.05.2019)
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019)
Mitigating information overload in social media during conflicts and crises: design and evaluation of a cross-platform alerting system.
In: Behaviour & Information Technology (BIT), 38 (3)
doi: 10.1080/0144929X.2019.1620334
Artikel, Bibliographie
O'Connor, T. J. ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019)
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). Miami, FL, USA
Konferenzveröffentlichung, Bibliographie
Saeed, Saqib ; Pipek, Volkmar ; Rohde, Markus ; Reuter, Christian ; Pinatti de Carvalho, Aparecido Fabiano ; Wulf, Volker (2019)
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, 7
doi: 10.1109/ACCESS.2019.2916903
Artikel, Bibliographie
Brendel, Jacqueline ; Gerber, Nina (2019)
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5)
doi: 10.1007/s11623-019-1107-5
Artikel, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019)
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019. Darmstadt (19.05.2019-23.05.2019)
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Konferenzveröffentlichung, Bibliographie
Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019)
Investigating Next Steps in Static API-Misuse Detection.
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). Montreal, QC, Canada (26.05.2019-27.05.2019)
Konferenzveröffentlichung, Bibliographie
Sinn, Nico ; Schür, Maximilian T. ; Hardt, Steffen (2019)
No-contact electrostatic manipulation of droplets on liquid-infused surfaces: Experiments and numerical simulations.
In: Applied Physics Letters, 114 (21)
doi: 10.1063/1.5091836
Artikel, Bibliographie
Ji, Yining ; DiRocco, Daniel A. ; Kind, Jonas ; Thiele, Christina M. ; Gschwind, Ruth M. ; Reibarkh, Mikhail (2019)
LED‐Illuminated NMR Spectroscopy: A Practical Tool for Mechanistic Studies of Photochemical Reactions.
In: ChemPhotoChem
doi: 10.1002/cptc.201900109
Artikel, Bibliographie
Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019)
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing
doi: 10.1109/TSUSC.2019.2913948
Artikel, Bibliographie
Speth, Jonathan (2019)
How secure are business applications? An in-depth study on the security of business applications.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Baumli, Philipp ; Teisala, Hannu ; Bauer, Hoimar ; Garcia‐Gonzalez, Diana ; Damle, Viraj ; Geyer, Florian ; D'Acunzi, Maria ; Kaltbeitzel, Anke ; Butt, Hans-Jürgen ; Vollmer, Doris (2019)
Flow‐Induced Long‐Term Stable Slippery Surfaces.
In: Advanced Science
doi: 10.1002/advs.201900019
Artikel, Bibliographie
Ranly, Paul Moritz (2019)
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Krämer, Juliane ; Loiero, Mirjam (2019)
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019). Darmstadt, Germany (03.04.2019-05.04.2019)
Konferenzveröffentlichung, Bibliographie
Roth, Kai (2019)
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Weiner, Andre ; Hillenbrand, Dennis ; Marschall, Holger ; Bothe, Dieter (2019)
Data‐Driven Subgrid‐Scale Modeling for Convection‐Dominated Concentration Boundary Layers.
In: Chemical Engineering & Technology, 42 (7)
doi: 10.1002/ceat.201900044
Artikel, Bibliographie
Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Konferenzveröffentlichung, Bibliographie
Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019)
A Dataset of Parametric Cryptographic Misuses.
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR).
Konferenzveröffentlichung, Bibliographie
Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019)
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019). Kyoto, Japan (11.03.2019-15.03.2019)
Konferenzveröffentlichung, Bibliographie
Shen, Liu-Liu ; Zhang, Gui-Rong ; Venter, Tizian ; Biesalski, Markus ; Etzold, Bastian J. M. (2019)
Towards best practices for improving paper-based microfluidic fuel cells.
In: Electrochimica Acta, 298
doi: 10.1016/j.electacta.2018.12.077
Artikel, Bibliographie
Hrsg.: Reuter, Christian (2019)
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
doi: 10.1007/978-3-658-25652-4
Buch, Bibliographie
Grefe, Ann-Kathrin ; Kuttich, Björn ; Stühn, Lukas ; Stark, Robert ; Stühn, Bernd (2019)
Oriented crystallization of PEG induced by confinement in cylindrical nanopores: Structural and thermal properties.
In: Soft Matter, (15)
doi: 10.1039/C9SM00053D
Artikel, Bibliographie
Jamshidi, F. ; Heimel, H. ; Hasert, M. ; Cai, X. ; Deutschmann, O. ; Marschall, H. ; Wörner, M. (2019)
On suitability of phase-field and algebraic volume-of-fluid OpenFOAM® solvers for gas–liquid microfluidic applications.
In: Computer Physics Communications, 236
doi: 10.1016/j.cpc.2018.10.015
Artikel, Bibliographie
Schulz, Philipp (2019)
Developing Secure Distributed Systems with Modular Tierless Programming.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Srivatsa, Jeevan Karanam (2019)
Benchmarking of Data Provenance Computation Methods to Support Debugging in Apache Spark.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Liu, M. ; Bothe, D. (2019)
Toward the predictive simulation of bouncing versus coalescence in binary droplet collisions.
In: Acta Mechanica, 230 (2)
doi: 10.1007/s00707-018-2290-4
Artikel, Bibliographie
Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019)
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
IEEE Global Communications Conference (GLOBECOM). Abu Dhabi, United Arab Emirates (09.12.2018-13.12.2018)
doi: 10.1109/GLOCOM.2018.8647607
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel (2019)
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
39. GIL-Jahrestagung : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.02.2019-19.02.2019)
Konferenzveröffentlichung, Bibliographie
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung 2019: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.02.2019-19.02.2019)
Konferenzveröffentlichung, Bibliographie
Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019)
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
Artikel, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
HEALED: HEaling & Attestation for Low-end
Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019.
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
Report, Bibliographie
Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019)
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
San Francisco, CA, USA (04.03.2019-08.03.2019)
Konferenzveröffentlichung, Bibliographie
Seiler, Patrick M. ; Gloerfeld, Mark ; Roisman, Ilia V. ; Tropea, Cameron (2019)
Aerodynamically driven motion of a wall-bounded drop on a smooth solid substrate.
In: Physical Review Fluids, 4 (2)
doi: 10.1103/PhysRevFluids.4.024001
Artikel, Bibliographie
Surminski, Sebastian ; Rodler, Michael ; Davi, Lucas (2019)
Poster: Automated Evaluation of Fuzzers.
NDSS 2019 : 26th Annual Network and Distributed System Security Symposium. San Diego, California (24.02.2019-27.02.2019)
Konferenzveröffentlichung, Bibliographie
Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2019)
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
26th Annual Network & Distributed System Security Symposium (NDSS). Catamaran Resort Hotel & Spa, San Diego, CA
Konferenzveröffentlichung, Bibliographie
Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019)
Nautilus: Fishing for Deep Bugs with Grammars.
Konferenzveröffentlichung, Bibliographie
Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019)
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
SANCTUARY: ARMing TrustZone with User-space Enclaves.
Konferenzveröffentlichung, Bibliographie
Dimesso, Lucangelo ; Wittich, Carolin ; Mayer, Thomas ; Jaegermann, Wolfram (2019)
Phase-change behavior of hot-pressed methylammonium lead bromide hybrid perovskites.
In: Journal of Materials Science, 54 (3)
doi: 10.1007/s10853-018-3009-6
Artikel, Bibliographie
Wegert, Leonard (2019)
Preparations for Assembling Franson Interferometers in a Quantum Key Distributuion Setup.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Maier, Christine ; Brydges, Tiff ; Jurcevic, Petar ; Trautmann, Nils ; Hempel, Cornelius ; Lanyon, Ben P. ; Hauke, Philipp ; Blatt, Rainer ; Roos, Christian F. (2019)
Environment-Assisted Quantum Transport in a 10-qubit Network.
In: PHYSICAL REVIEW LETTERS, 122 (5)
doi: 10.1103/PhysRevLett.122.050501
Artikel, Bibliographie
Krüger, Stefan ; Hermann, Ben (2019)
Can an online service predict gender?: on the state-of-the-art in gender identification from texts.
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering. Montreal, Canada (27.05.2019-27.05.2019)
doi: 10.1109/GE.2019.00012
Konferenzveröffentlichung, Bibliographie
Ries, F. ; Yongxiang, L. ; Nishad, K. ; Janicka, J. ; Sadiki, A. (2019)
Entropy Generation Analysis and Thermodynamic Optimization of Jet Impingement Cooling Using Large Eddy Simulation.
In: Entropy, 21 (2)
doi: 10.3390/e21020129
Artikel, Bibliographie
Heidt, Margareta ; Gerlach, Jin ; Buxmann, Peter (2019)
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
Hawaii International Conference on System Sciences (HICSS). Wailea, USA (08.01.2019-11.01.2019)
Konferenzveröffentlichung, Bibliographie
Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Hrsg.: Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (2019)
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Buchkapitel, Bibliographie
Heidt, Margareta ; Olt, Christian M. ; Buxmann, Peter (2019)
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
Internationale Tagung Wirtschaftsinformatik. Siegen, Deutschland (24.02.2019-27.02.2019)
Konferenzveröffentlichung, Bibliographie
Heß, Julian ; Wang, Yongqi (2019)
On the role of pore-fluid pressure evolution and hypoplasticity in debris flows.
In: European Journal of Mechanics - B/Fluids, 74
doi: 10.1016/j.euromechflu.2018.09.005
Artikel, Bibliographie
Felsen, Susanne (2019)
Secure Two-Party Computation: ABY versus Intel SGX.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Hänichen, Philipp ; Bender, Achim ; Voß, Bernhard ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2019)
Drop evaporation of hydrocarbon fluids with deposit formation.
In: International Journal of Heat and Mass Transfer, 128
doi: 10.1016/j.ijheatmasstransfer.2018.08.102
Artikel, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (21.05.2018-23.05.2018)
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick (2019)
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 28
doi: 10.1007/s10606-018-9339-8
Artikel, Bibliographie
Kumar, Abhijeet ; Trambitas, Alexandra ; Peggau, Jörg ; Dahl, Verena ; Venzmer, Joachim ; Gambaryan-Roisman, Tatiana ; Kleinen, Jochen (2019)
Charge and size matters — How to formulate organomodified silicones for textile applications.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 560
doi: 10.1016/j.colsurfa.2018.09.080
Artikel, Bibliographie
Becker, Lukas G. ; Langenthal, Thomas von ; Pielsticker, Stefan ; Böhm, Benjamin ; Kneer, Reinhold ; Dreizler, Andreas (2019)
Experimental investigation of particle-laden flows in an oxy-coal combustion chamber for non-reacting conditions.
In: Fuel, 235
doi: 10.1016/j.fuel.2018.08.076
Artikel, Bibliographie
Knappstein, R. ; Kuenne, G. ; Nicolai, H. ; Di Mare, F. ; Sadiki, A. ; Janicka, J. (2019)
Description of the char conversion process in coal combustion based on premixed FGM chemistry.
In: Fuel, 236
doi: 10.1016/j.fuel.2018.08.158
Artikel, Bibliographie
Hieber, Matthias ; Mahalov, Alex ; Takada, Ryo (2019)
Time periodic and almost time periodic solutions to rotating stratified fluids subject to large forces.
In: Journal of Differential Equations, 266 (2-3)
doi: 10.1016/j.jde.2018.07.067
Artikel, Bibliographie
Takawale, Anand ; Abraham, Satyanand ; Sielaff, Axel ; Mahapatra, Pallab Sinha ; Pattamatta, Arvind ; Stephan, Peter (2019)
A comparative study of flow regimes and thermal performance between flat plate pulsating heat pipe and capillary tube pulsating heat pipe.
In: Applied Thermal Engineering, 149
doi: 10.1016/j.applthermaleng.2018.11.119
Artikel, Bibliographie
Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André
Hrsg.: Reuter, Christian (2019)
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_2
Buchkapitel, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_17
Buchkapitel, Bibliographie
Reinhold, Thomas ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_7
Buchkapitel, Bibliographie
Riebe, Thea ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_7
Buchkapitel, Bibliographie
Reinhold, Thomas ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_12
Buchkapitel, Bibliographie
Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_1
Buchkapitel, Bibliographie
Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah (2019)
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Wirtschaftsinformatik 2019. Siegen, Germany (23.02.2019-27.02.2019)
Konferenzveröffentlichung, Bibliographie
Fricke, Mathis ; Köhne, Matthias ; Bothe, Dieter (2019)
A kinematic evolution equation for the dynamic contact angle and some consequences.
In: Physica D: Nonlinear Phenomena
doi: 10.1016/j.physd.2019.01.008
Artikel, Bibliographie
Wurster, Verena ; Engel, Christine ; Graebe, Heiko ; Ferber, Thimo ; Jaegermann, Wolfram ; Hausbrand, René (2019)
Characterization of the Interfaces in LiFePO4/PEO-LiTFSI Composite Cathodes and to the Adjacent Layers.
In: Journal of The Electrochemical Society, 166 (3)
doi: 10.1149/2.0621903jes
Artikel, Bibliographie
Pfeiffer, Tobias ; De Nicola, Antonio ; Montis, Costanza ; Carlà, Francesco ; Vegt, Nico F. A. van der ; Berti, Debora ; Milano, Giuseppe (2019)
Nanoparticles at Biomimetic Interfaces: Combined Experimental and Simulation Study on Charged Gold Nanoparticles/Lipid Bilayer Interfaces.
In: The Journal of Physical Chemistry Letters, 10 (2)
doi: 10.1021/acs.jpclett.8b03399
Artikel, Bibliographie
Deichmann, Gregor ; Dallavalle, Marco ; Rosenberger, David ; Vegt, Nico F. A. van der (2019)
Phase Equilibria Modeling with Systematically Coarse-Grained Models—A Comparative Study on State Point Transferability.
In: The Journal of Physical Chemistry B, 123 (2)
doi: 10.1021/acs.jpcb.8b07320
Artikel, Bibliographie
Schwarzer, Madeleine ; Otto, Thomas ; Schremb, Markus ; Marschelke, Claudia ; Tee, Hisaschi T. ; Wurm, Frederik R. ; Roisman, Ilia V. ; Tropea, Cameron ; Synytska, Alla (2019)
Supercooled Water Drops Do Not Freeze During Impact on Hybrid Janus Particle-Based Surfaces.
In: Chemistry of Materials, 31 (1)
doi: 10.1021/acs.chemmater.8b03183
Artikel, Bibliographie
Köser, Jan ; Li, Tao ; Vorobiev, Nikita ; Dreizler, Andreas ; Schiemann, Martin ; Böhm, Benjamin (2019)
Multi-parameter diagnostics for high-resolution in-situ measurements of single coal particle combustion.
In: Proceedings of the Combustion Institute, 37 (3)
doi: 10.1016/j.proci.2018.05.116
Artikel, Bibliographie
Bender, Achim ; Stroh, Alexander ; Frohnapfel, Bettina ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2019)
Combined direct numerical simulation and long-wave simulation of a liquid film sheared by a turbulent gas flow in a channel.
In: Physics of Fluids, 31 (2)
doi: 10.1063/1.5064423
Artikel, Bibliographie
Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019)
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019. Rabat, Morocco (22.04.2019-24.04.2019)
Konferenzveröffentlichung, Bibliographie
Brumm, Pauline ; Sauer, Hans Martin ; Dörsam, Edgar (2019)
Scaling Behavior of Pattern Formation in the Flexographic Ink Splitting Process.
In: Colloids and Interfaces, 3 (1)
doi: 10.3390/colloids3010037
Artikel, Bibliographie
Geyer, Florian ; Seiler, Patrick M. ; Vollmer, Doris ; Berger, Rüdiger (2019)
Wie sich Tropfen bewegen.
In: Physik in unserer Zeit, 50 (2)
doi: 10.1002/piuz.201901531
Artikel, Bibliographie
Tai, Yih-Chin ; Heß, Julian ; Wang, Yongqi (2019)
Modeling Two‐Phase Debris Flows With Grain‐Fluid Separation Over Rugged Topography: Application to the 2009 Hsiaolin Event, Taiwan.
In: Journal of Geophysical Research: Earth Surface, 124 (2)
doi: 10.1029/2018JF004671
Artikel, Bibliographie
Han, Wang ; Wang, Haiou ; Kuenne, Guido ; Hawkes, Evatt R. ; Chen, Jacqueline H. ; Janicka, Johannes ; Hasse, Christian (2019)
Large eddy simulation/dynamic thickened flame modeling of a high Karlovitz number turbulent premixed jet flame.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.228
Artikel, Bibliographie
Dammel, Frank ; Oltmanns, Johannes ; Stephan, Peter (2019)
Nutzung der Abwärme des Hochleistungsrechners am Campus Lichtwiese.
In: Euro Heat & Power
Artikel, Bibliographie
Okajima, Junnosuke ; Stephan, Peter (2019)
Numerical simulation of liquid film formation and its heat transfer through vapor bubble expansion in a microchannel.
In: International Journal of Heat and Mass Transfer, 136
doi: 10.1016/j.ijheatmasstransfer.2019.03.004
Artikel, Bibliographie
Han, Wang ; Scholtissek, Arne ; Hasse, Christian (2019)
The role of tangential diffusion in evaluating the performance of flamelet models.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.171
Artikel, Bibliographie
Hartl, S. ; van Winkle, R. ; Geyer, D. ; Dreizler, A. ; Magnotti, G. ; Hasse, C. ; Barlow, R. S. (2019)
Assessing the relative importance of flame regimes in Raman/Rayleigh line measurements of turbulent lifted flames.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.067
Artikel, Bibliographie
Peterson, Brian ; Baum, Elias ; Dreizler, Andreas ; Böhm, Benjamin (2019)
An experimental study of the detailed flame transport in a SI engine using simultaneous dual-plane OH-LIF and stereoscopic PIV.
In: Combustion and Flame, 202
doi: 10.1016/j.combustflame.2018.12.024
Artikel, Bibliographie
Salenbauch, Steffen ; Hasse, Christian ; Vanni, Marco ; Marchisio, Daniele L. (2019)
A numerically robust method of moments with number density function reconstruction and its application to soot formation, growth and oxidation.
In: Journal of Aerosol Science, 128
doi: 10.1016/j.jaerosci.2018.11.009
Artikel, Bibliographie
Scholtissek, A. ; Domingo, P. ; Vervisch, L. ; Hasse, C. (2019)
A self-contained progress variable space solution method for thermochemical variables and flame speed in freely-propagating premixed flamelets.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.168
Artikel, Bibliographie
Stehl, Dmitrij ; Milojević, Nataša ; Stock, Sebastian ; Schomäcker, Reinhard ; Klitzing, R. von (2019)
Synergistic Effects of a Rhodium Catalyst on Particle-Stabilized Pickering Emulsions for the Hydroformylation of a Long-Chain Olefin.
In: Industrial & Engineering Chemistry Research, 58 (7)
doi: 10.1021/acs.iecr.8b04619
Artikel, Bibliographie
Witt, Marcus U. ; Hinrichs, Stephan ; Möller, Nadir ; Backes, Sebastian ; Fischer, Birgit ; Klitzing, R. von (2019)
Distribution of CoFe2O4 Nanoparticles Inside PNIPAM-Based Microgels of Different Cross-linker Distributions.
In: The Journal of Physical Chemistry B, 123 (10)
doi: 10.1021/acs.jpcb.8b09236
Artikel, Bibliographie
Yuan, Qingqing ; Wang, Chun ; Wang, Yongqi ; Peng, Chong ; Meng, Xiannan (2019)
Investigation of Submerged Soil Excavation by High-Velocity Water Jet Using Two-Fluid Smoothed Particle Hydrodynamics Method.
In: Journal of Hydraulic Engineering, 145 (6)
doi: 10.1061/(asce)hy.1943-7900.0001599
Artikel, Bibliographie
Ma, Bole ; Wang, Yongqi ; Kikker, Anne (2019)
Analytical solutions of oscillating Couette–Poiseuille flows for the viscoelastic Oldroyd B fluid.
In: Acta Mechanica
doi: 10.1007/s00707-019-02391-1
Artikel, Bibliographie
Ohlemüller, Peter ; Reitz, Michael ; Ströhle, Jochen ; Epple, Bernd (2019)
Investigation of chemical looping combustion of natural gas at 1 MWth scale.
In: Proceedings of the Combustion Institute, 37 (4)
doi: 10.1016/j.proci.2018.07.035
Artikel, Bibliographie
Kez, Vitali ; Consalvi, Jean-Louis ; Liu, Fengshan ; Gronarz, Tim ; Ströhle, Jochen ; Kneer, Reinhold ; Epple, Bernd (2019)
Investigation of gas and particle radiation modelling in wet oxy-coal combustion atmospheres.
In: International Journal of Heat and Mass Transfer, 133
doi: 10.1016/j.ijheatmasstransfer.2019.01.013
Artikel, Bibliographie
Niethammer, Matthias ; Marschall, Holger ; Bothe, Dieter (2019)
Robust Direct Numerical Simulation of Viscoelastic Flows.
In: Chemie Ingenieur Technik, 91 (4)
doi: 10.1002/cite.201800108
Artikel, Bibliographie
Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019)
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019. Dallas, TX, USA (07.07.2019-10.07.2019)
doi: 10.1109/ICDCS.2019.00120
Konferenzveröffentlichung, Bibliographie
Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019)
Function-Dependent Commitments from Homomorphic Authenticators.
24th Australasian Conference, ACISP 2019. Christchurch, New Zealand (03.07.2019-05.07.2019)
Konferenzveröffentlichung, Bibliographie
Oak, Aditya ; Mezini, Mira ; Salvaneschi, Guido (2019)
Language Support for Multiple Privacy Enhancing Technologies.
Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming.
Konferenzveröffentlichung, Bibliographie
Hartmann, Maximilian ; Hardt, Steffen (2019)
Stability of Evaporating Droplets on Chemically Patterned Surfaces.
In: Langmuir, 35 (14)
doi: 10.1021/acs.langmuir.9b00172
Artikel, Bibliographie
Bürkle, Sebastian ; Becker, Lukas G. ; Agizza, Maria A. ; Dreizler, Andreas ; Wagner, Steven (2019)
Comparison of two measurement strategies to obtain the residence time distribution in combustion chambers using tunable diode laser absorption spectroscopy.
In: Applied Optics, 58 (10)
doi: 10.1364/ao.58.000c36
Artikel, Bibliographie
Kyrey, Tetyana ; Witte, Judith ; Pipich, Vitaliy ; Feoktystov, Artem ; Koutsioubas, Alexandros ; Vezhlev, Egor ; Frielinghaus, Henrich ; Klitzing, R. von ; Wellert, Stefan ; Holderer, Olaf (2019)
Influence of the cross-linker content on adsorbed functionalised microgel coatings.
In: Polymer, 169
doi: 10.1016/j.polymer.2019.02.037
Artikel, Bibliographie
Lehmann, Maren ; Krause, Paul ; Miruchna, Viktor ; Klitzing, R. von (2019)
Tailoring PNIPAM hydrogels for large temperature-triggered changes in mechanical properties.
In: Colloid and Polymer Science, 297 (4)
doi: 10.1007/s00396-019-04470-0
Artikel, Bibliographie
Li, Lingxi ; Rosenkranz, Simon ; Schäfer, Walter ; Tropea, Cameron (2019)
Light scattering from a drop with an embedded particle and its exploitation in the time-shift technique.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, 227
doi: 10.1016/j.jqsrt.2019.01.022
Artikel, Bibliographie
Merklein, Lisa ; Daume, Dominik ; Braig, Felix ; Schlisske, Stefan ; Rödlmeier, Tobias ; Mink, Marvin ; Kourkoulos, Dimitrios ; Ulber, Benjamin ; Di Biase, Manuela ; Meerholz, Klaus ; Hernandez-Sosa, Gerardo ; Lemmer, Uli ; Sauer, Hans Martin ; Dörsam, Edgar ; Scharfer, Philip ; Schabel, Wilhelm (2019)
Comparative Study of Printed Multilayer OLED Fabrication through Slot Die Coating, Gravure and Inkjet Printing, and Their Combination.
In: Colloids and Interfaces, 3 (1)
doi: 10.3390/colloids3010032
Artikel, Bibliographie
Miranda, Flavia C. ; Coelho, Pedro J. ; Di Mare, Francesca ; Janicka, Johannes (2019)
Study of turbulence-radiation interactions in large-eddy simulation of scaled Sandia flame D.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, 228
doi: 10.1016/j.jqsrt.2019.02.010
Artikel, Bibliographie
Ponce, Sebastian ; Trabold, Michael ; Drochner, Alfons ; Albert, Jakob ; Etzold, Bastian J. M. (2019)
Insights into the redox kinetics of vanadium substituted heteropoly acids through liquid core waveguide membrane microreactor studies.
In: Chemical Engineering Journal, 369
doi: 10.1016/j.cej.2019.03.103
Artikel, Bibliographie
Rau, F. ; Hartl, S. ; Hasse, C. (2019)
Numerical and experimental investigation of the laminar burning velocity of biofuels at atmospheric and high-pressure conditions.
In: Fuel, 247
doi: 10.1016/j.fuel.2019.03.024
Artikel, Bibliographie
Roy, Tamal ; Szuttor, Kai ; Smiatek, Jens ; Holm, Christian ; Hardt, Steffen (2019)
Conformation and Dynamics of Long-Chain End-Tethered Polymers in Microchannels.
In: Polymers, 11 (3)
doi: 10.3390/polym11030488
Artikel, Bibliographie
Stephan, Michael ; Zentgraf, Florian ; Berrocal, Edouard ; Albert, Barbara ; Böhm, Benjamin ; Dreizler, Andreas (2019)
Multiple scattering reduction in instantaneous gas phase phosphor thermometry: applications with dispersed seeding.
In: Measurement Science and Technology, 30 (5)
doi: 10.1088/1361-6501/ab0abc
Artikel, Bibliographie
Haaf, Martin ; Ohlemüller, Peter ; Ströhle, Jochen ; Epple, Bernd (2019)
Techno-economic assessment of alternative fuels in second-generation carbon capture and storage processes.
In: Mitigation and Adaptation Strategies for Global Change
doi: 10.1007/s11027-019-09850-z
Artikel, Bibliographie
Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019)
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Design Automation Conference (DAC). Las Vegas, USA (03.06.2019-05.06.2019)
Konferenzveröffentlichung, Bibliographie
Bruce, Ellen E. ; Bui, Pho T. ; Rogers, Bradley A. ; Cremer, Paul S. ; Vegt, Nico F. A. van der (2019)
Nonadditive Ion Effects Drive Both Collapse and Swelling of Thermoresponsive Polymers in Water.
In: Journal of the American Chemical Society, 141 (16)
doi: 10.1021/jacs.9b00295
Artikel, Bibliographie
Dalgicdir, Cahit ; Vegt, Nico F. A. van der (2019)
Improved Temperature Behavior of PNIPAM in Water with a Modified OPLS Model.
In: The Journal of Physical Chemistry B, 123 (17)
doi: 10.1021/acs.jpcb.9b01644
Artikel, Bibliographie
Johchi, Ayane ; Pareja, Jhon ; Böhm, Benjamin ; Dreizler, Andreas (2019)
Quantitative mixture fraction imaging of a synthetic biogas turbulent jet propagating into a NO-vitiated air co-flow using planar laser-induced fluorescence (PLIF).
In: Experiments in Fluids, 60 (5)
doi: 10.1007/s00348-019-2723-4
Artikel, Bibliographie
Niethammer, Matthias ; Brenn, Günter ; Marschall, Holger ; Bothe, Dieter (2019)
An extended volume of fluid method and its application to single bubbles rising in a viscoelastic liquid.
In: Journal of Computational Physics, 387
doi: 10.1016/j.jcp.2019.02.021
Artikel, Bibliographie
Paulssen, Dorothea ; Hardt, Steffen ; Levkin, Pavel A. (2019)
Droplet Sorting and Manipulation on Patterned Two-Phase Slippery Lubricant-Infused Surface.
In: ACS Applied Materials & Interfaces, 11 (17)
doi: 10.1021/acsami.8b21879
Artikel, Bibliographie
Souček, Ondřej ; Orava, Vít ; Málek, Josef ; Bothe, Dieter (2019)
A continuum model of heterogeneous catalysis: Thermodynamic framework for multicomponent bulk and surface phenomena coupled by sorption.
In: International Journal of Engineering Science, 138
doi: 10.1016/j.ijengsci.2019.01.001
Artikel, Bibliographie
Zimmermann, Verena ; Renaud, Karen (2019)
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset.
In: International Journal of Human-Computer Studies
doi: 10.1016/j.ijhcs.2019.05.005
Artikel, Bibliographie
Schäfer, Julian ; Roisman, Ilia V. ; Sauer, Hans Martin ; Dörsam, Edgar (2019)
Millisecond fluid pattern formation in the nip of a gravure printing machine.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 575
doi: 10.1016/j.colsurfa.2019.04.085
Artikel, Bibliographie
Stute, Milan ; Narain, Sashank ; Mariotto, Alex ; Heinrich, Alexander ; Kreitschmann, David ; Noubir, Guevara ; Hollick, Matthias (2019)
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
28th USENIX Security Symposium (USENIX Security '19). Santa Clara, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie
Ludwig, Michael ; Witt, Marcus U. ; Klitzing, R. von (2019)
Bridging the gap between two different scaling laws for structuring of liquids under geometrical confinement.
In: Advances in Colloid and Interface Science, 269
doi: 10.1016/j.cis.2019.04.012
Artikel, Bibliographie
Shokina, Nina ; Bauer, Andreas ; Teschner, Gabriel ; Buchenberg, Waltraud B. ; Tropea, Cameron ; Egger, Herbert ; Hennig, Jürgen ; Krafft, Axel J. (2019)
MR-based wall shear stress measurements in fully developed turbulent flow using the Clauser plot method.
In: Journal of Magnetic Resonance, 305
doi: 10.1016/j.jmr.2019.05.009
Artikel, Bibliographie
Klitzing, R. von ; Richtering, W. ; Zemb, T. (2019)
Preface to the Growth of Colloid and Interface Science Special Issue.
In: Langmuir, 35 (26)
doi: 10.1021/acs.langmuir.9b01702
Artikel, Bibliographie
Geyer, Florian ; Asaumi, Yuta ; Vollmer, Doris ; Butt, Hans-Jürgen ; Nakamura, Yoshinobu ; Fujii, Syuji (2019)
Polyhedral Liquid Marbles.
In: Advanced Functional Materials, 29 (25)
doi: 10.1002/adfm.201808826
Artikel, Bibliographie
Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019)
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (19.05.2019-22.05.2019)
Konferenzveröffentlichung, Bibliographie
Langer, Amanda ; Kaufhold, Marc-André ; Runft, Elena ; Reuter, Christian ; Grinko, Margarita ; Pipek, Volkmar (2019)
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (19.05.2019-22.05.2019)
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019)
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI
Artikel, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Konferenzveröffentlichung, Bibliographie
Riebe, Thea ; Kaufhold, Marc-André ; Kumar, Tarun ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Threat Intelligence Application for Cyber Attribution.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Konferenzveröffentlichung, Bibliographie
Hartwig, Katrin ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Konferenzveröffentlichung, Bibliographie
Riebe, Thea ; Reuter, Christian
Hrsg.: Reuter, Christian (2019)
Accessing Dual Use in IT Development.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Konferenzveröffentlichung, Bibliographie
Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian
Hrsg.: Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko ; Reuter, Christian (2019)
Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations.
SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Konferenzveröffentlichung, Bibliographie
Riebe, Thea ; Langer, Amanda ; Kaufhold, Marc-André ; Kretschmer, Nina Katharina ; Reuter, Christian (2019)
Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-133-05
Konferenzveröffentlichung, Bibliographie
Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian (2019)
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-302-06
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Riebe, Thea ; Aldehoff, Larissa ; Kaufhold, Marc-André ; Reinhold, Thomas
Hrsg.: Werkner, Ines-Jacqueline (2019)
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?
doi: 10.1007/978-3-658-27713-0_2
Buchkapitel, Bibliographie
Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Ludwig, Thomas ; Pottebaum, Jens ; Kaufhold, Marc-André (2019)
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-133
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019)
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen.
Buch, Bibliographie
Reuter, Christian
Hrsg.: Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019)
Fake News und manipulierte Meinungsbildung.
In: Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen
Buchkapitel, Bibliographie
Reuter, Christian (2019)
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Buch, Bibliographie
Reuter, Christian ; Häusser, Katja ; Bien, Mona ; Herbert, Franziska
Hrsg.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.1145/3340764.3340770
Konferenzveröffentlichung, Bibliographie
Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019)
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN). Osnabrück (14.10.2019-17.10.2019)
Konferenzveröffentlichung, Bibliographie
Álvarez, Flor ; Almon, Lars ; Radtki, Hauke ; Hollick, Matthias (2019)
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019). Seattle, WA (17.10.2019-20.10.2019)
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019)
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (24.02.2019-27.02.2019)
Konferenzveröffentlichung, Bibliographie
Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian (2019)
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
39. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.02.2019-19.02.2019)
Konferenzveröffentlichung, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2019)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (23.02.2019-27.02.2019)
Konferenzveröffentlichung, Bibliographie
Riebe, Thea ; Reuter, Christian (2019)
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, 2019 (1)
Artikel, Bibliographie
Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker
Hrsg.: Reuter, Christian (2019)
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_19
Buchkapitel, Bibliographie
Kresse, B. ; Höfler, M. V. ; Privalov, A. F. ; Vogel, Michael (2019)
One dimensional magnetic resonance microscopy with micrometer resolution in static field gradients.
In: Journal of Magnetic Resonance, 307
doi: 10.1016/j.jmr.2019.106566
Artikel, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Konferenzveröffentlichung, Bibliographie
Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019)
Security Reductions for White-Box Key-Storage in Mobile Payments.
doi: 10.1007/978-3-030-64837-4_8
Report, Bibliographie
Antritter, Thomas ; Hachmann, Peter ; Gambaryan-Roisman, Tatiana ; Buck, Bernhard ; Stephan, Peter (2019)
Spreading of Micrometer-Sized Droplets under the Influence of Insoluble and Soluble Surfactants: A Numerical Study.
In: Colloids and Interfaces, 3 (3)
doi: 10.3390/colloids3030056
Artikel, Bibliographie
Butz, David ; Hartl, Sandra ; Popp, Sebastian ; Walther, Steffen ; Barlow, Robert S. ; Hasse, Christian ; Dreizler, Andreas ; Geyer, Dirk (2019)
Local flame structure analysis in turbulent CH4/air flames with multi-regime characteristics.
In: Combustion and Flame, 210
doi: 10.1016/j.combustflame.2019.08.032
Artikel, Bibliographie
Fischlin, Marc ; Günther, Felix (2019)
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint
Artikel, Bibliographie
Hill, H. ; Ding, C.-P. ; Baum, E. ; Böhm, B. ; Dreizler, A. ; Peterson, B. (2019)
An application of tomographic PIV to investigate the spray-induced turbulence in a direct-injection engine.
In: International Journal of Multiphase Flow, 121
doi: 10.1016/j.ijmultiphaseflow.2019.103116
Artikel, Bibliographie
Emmert, Johannes ; Grauer, Samuel J. ; Wagner, Steven ; Daun, Kyle J. (2019)
Efficient Bayesian inference of absorbance spectra from transmitted intensity spectra.
In: Optics Express, 27 (19)
doi: 10.1364/oe.27.026893
Artikel, Bibliographie
Müller, Christopher ; Ullmann, Sebastian ; Lang, Jens (2019)
A Bramble--Pasciak Conjugate Gradient Method for Discrete Stokes Equations with Random Viscosity.
In: SIAM/ASA Journal on Uncertainty Quantification, 7 (3)
doi: 10.1137/18m1163920
Artikel, Bibliographie
Zhao, Sicheng ; Dietzel, Mathias ; Hardt, Steffen (2019)
Faraday instability of a liquid layer on a lubrication film.
In: Journal of Fluid Mechanics, 879
doi: 10.1017/jfm.2019.684
Artikel, Bibliographie
Schoenefeld, Jonas J. ; Schulze, Kai ; Hildén, Mikael ; Jordan, Andrew J. (2019)
Policy Monitoring in the EU: The Impact of Institutions, Implementation, and Quality.
In: Politische Vierteljahresschrift, 60 (4)
doi: 10.1007/s11615-019-00209-2
Artikel, Bibliographie
Rauls, Anne-Therese ; Ulbrich, Stefan (2019)
Computation of a Bouligand Generalized Derivative for the Solution Operator of the Obstacle Problem.
In: SIAM Journal on Control and Optimization, 57 (5)
doi: 10.1137/18m1187283
Artikel, Bibliographie
Hrsg.: Reuter, Christian ; Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko (2019)
Science peace security ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research.
Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt (25.-27.09.2019)
doi: 10.25534/tuprints-00009164
Konferenzveröffentlichung, Erstveröffentlichung
Schweikert, Kai ; Sielaff, Axel ; Stephan, Peter (2019)
Heat flux during dip-coating of a superheated substrate.
In: Interfacial Phenomena and Heat Transfer, 7 (3)
doi: 10.1615/InterfacPhenomHeatTransfer.2019032623
Artikel, Bibliographie
Gambaryan-Roisman, Tatiana (2019)
Simultaneous imbibition and evaporation of liquids on grooved substrates.
In: Interfacial Phenomena and Heat Transfer, 7 (3)
doi: 10.1615/InterfacPhenomHeatTransfer.2019031166
Artikel, Bibliographie
Schäfer Aguilar, P. ; Schmitt, J. M. ; Ulbrich, Stefan ; Moos, M. (2019)
On the numerical discretization of optimal control problems
for conservation laws.
In: Control and Cybernetics, 2019 (1)
Artikel, Bibliographie
Li, Lingxi ; Stegmann, Patrick G. ; Rosenkranz, Simon ; Schäfer, Walter ; Tropea, Cameron (2019)
Simulation of light scattering from a colloidal droplet using a polarized Monte Carlo method: application to the time-shift technique.
In: Optics Express, 27 (25)
doi: 10.1364/oe.27.036388
Artikel, Bibliographie
Widmann, Tobias ; Kreuzer, Lucas P. ; Hohn, Nuri ; Bießmann, Lorenz ; Wang, Kun ; Rinner, Stephan ; Moulin, Jean-François ; Schmid, Andreas J. ; Hannappel, Yvonne ; Wrede, Oliver ; Kühnhammer, Matthias ; Hellweg, Thomas ; Klitzing, R. von ; Müller-Buschbaum, Peter (2019)
Hydration and Solvent Exchange Induced Swelling and Deswelling of Homogeneous Poly(N-isopropylacrylamide) Microgel Thin Films.
In: Langmuir, 35 (49)
doi: 10.1021/acs.langmuir.9b03104
Artikel, Bibliographie
Bansarkhani, Rachid El (2019)
LARA - A Design Concept for Lattice-based Encryption.
FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Frigate Bay, St. Kitts and Nevis (18.02.2019-22.02.2019)
doi: 10.1007/978-3-030-32101-7_23
Konferenzveröffentlichung, Bibliographie
Taubert, Paul ; Buttenbender, Johannes ; Pelz, P. F. (2019)
Modelling a torus cloud employing the van Wijngaarden Ansatz and the Gilmore equation.
doi: 10.1088/1755-1315/405/1/012001
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Gerber, Nina ; Volkamer, Melanie ; Hilt, Annika (2019)
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen.
In: Datenschutz und Datensicherheit - DuD, 43 (2)
doi: 10.1007/s11623-019-1068-8
Artikel, Bibliographie
Zimmermann, Sina ; Gerber, Nina (2019)
Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment.
In: i-com, 18 (3)
doi: 10.1515/icom-2018-0041
Artikel, Bibliographie
Mayer, Peter ; Gerber, Nina ; Reinheimer, Benjamin ; Rack, Philipp ; Braun, Kristoffer ; Volkamer, Melanie (2019)
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads.
doi: 10.1145/3290605.3300779
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; Reinheimer, Benjamin ; Volkamer, Melanie (2019)
Investigating People’s Privacy Risk Perception.
In: Proceedings on Privacy Enhancing Technologies, 2019 (3)
doi: 10.2478/popets-2019-0047
Artikel, Bibliographie
Herzog, Nicole ; Brilmayer, Robert ; Stanzel, Mathias ; Kalyta, Anastasia ; Spiehl, Dieter ; Dörsam, Edgar ; Hess, Christian ; Andrieu-Brunsen, Annette (2019)
Gravure printing for mesoporous film preparation.
In: RSC Advances, 9 (41)
doi: 10.1039/C9RA04266K
Artikel, Bibliographie
Salvaneschi, Guido ; Köhler, Mirko ; Sokolowski, Daniel ; Haller, Philipp ; Erdweg, Sebastian ; Mezini, Mira (2019)
Language-Integrated Privacy-Aware Distributed Queries.
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA)
doi: 10.1145/3360593
Artikel, Bibliographie
Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018)
Exploring the Performance Envelope of the LLL Algorithm.
21st IEEE International Conference on Computational Science and Engineering. Bucharest, Romania (29.10.2018-31.10.2018)
doi: 10.1109/CSE.2018.00012
Konferenzveröffentlichung, Bibliographie
Geihs, Matthias ; Buchmann, Johannes (2018)
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
21st Annual International Conference on Information Security and Cryptology. Seoul, Korean (28.11.2018-30.11.2018)
doi: 10.1007/978-3-030-12146-4_17
Konferenzveröffentlichung, Bibliographie
Heidt, Margareta ; Gerlach, Jin (2018)
The Influence of SME Constraints in an Organizational IT Security Context.
International Conference on Information Systems (ICIS). San Francisco, USA (13.12.2018-16.12.2018)
Konferenzveröffentlichung, Bibliographie
Fasihi Yazdi, Mohsen (2018)
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Teisala, Hannu ; Butt, Hans-Jürgen (2018)
Hierarchical Structures for Superhydrophobic and Superoleophobic Surfaces.
In: Langmuir, 35 (33)
doi: 10.1021/acs.langmuir.8b03088
Artikel, Bibliographie
Büscher, Niklas (2018)
Compilation for More Practical Secure Multi-Party Computation.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Koch, Christian (2018)
Proactive Mechanisms for Video-on-Demand Content Delivery.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Reith, Robert Nikolai (2018)
Silently Learning your Support Vector Machines Models.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
McCracken, Gabriel (2018)
A Field Theory for Quantum Markov Processes.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
The 11th International Symposium on Foundations & Practice of Security (FPS). Montreal, Canada (13.11.2018-15.11.2018)
Konferenzveröffentlichung, Bibliographie
Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018)
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18). New Delhi, India (29.10.2018-02.11.2018)
doi: 10.1145/3241539.3267716
Konferenzveröffentlichung, Bibliographie
Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
Artikel, Bibliographie
Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018)
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18). New Delhi, India (29.10.2018-02.11.2018)
doi: 10.1145/3241539.3241566
Konferenzveröffentlichung, Bibliographie
Degabriele, Jean Paul ; Fischlin, Marc (2018)
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
24th International Conference on the Theory and Application of Cryptology and Information Security. Brisbane, Australia (02.12.2018-06.12.2018)
doi: 10.1007/978-3-030-03332-3_19
Konferenzveröffentlichung, Bibliographie
Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018)
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018. Toronto, Canada (15.10.2018-19.10.2018)
Konferenzveröffentlichung, Bibliographie
de Maleprade, Hélène ; Soto, Dan ; Quéré, David ; Hinch, E. John ; Baier, Tobias ; Schür, Maximilian T. ; Hardt, Steffen (2018)
Air-propelled, herringbone-textured platelets.
In: Physical Review Fluids, 3 (104101)
doi: 10.1103/PhysRevFluids.3.104101
Artikel, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
Konferenzveröffentlichung, Bibliographie
Dix, Isabella (2018)
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Ibrahim, Ahmad (2018)
Collective Attestation: for a Stronger Security in Embedded Networks.
IEEE. Salvador, Brazil, Brazil (02.10.2018-05.10.2018)
doi: 10.1109/SRDS.2018.00039
Konferenzveröffentlichung, Bibliographie
Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243786
Konferenzveröffentlichung, Bibliographie
Schneider, Thomas ; Tkachenko, Oleksandr (2018)
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3267323.3268956
Konferenzveröffentlichung, Bibliographie
Schmid, Jakob (2018)
Independent Compilation for the Arithmetic Black Box.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Keshavaprakash, Manoj (2018)
A Benchmark for New and Existing Model Comparison.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243856
Konferenzveröffentlichung, Bibliographie
Marakis, Vassilios (2018)
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Meng, Xiannan ; Wang, Yongqi ; Feng, Feng ; Wang, Chun ; Zhou, Yunlai (2018)
Granular flows in a rotating drum and on an inclined plane: Analytical and numerical solutions.
In: Physics of Fluids, 30 (10)
doi: 10.1063/1.5045308
Artikel, Bibliographie
Koşak Söz, Çağla ; Trosien, Simon ; Biesalski, Markus (2018)
Superhydrophobic Hybrid Paper Sheets with Janus-Type Wettability.
In: ACS Applied Materials & Interfaces, 10 (43)
doi: 10.1021/acsami.8b12116
Artikel, Bibliographie
Guski, Florian (2018)
Simulation of the Quantum Hybrid Attack in Q#.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Baier, Tobias ; Tiwari, Sudarshan ; Shrestha, Samir ; Klar, Axel ; Hardt, Steffen (2018)
Thermophoresis of Janus particles at large Knudsen numbers.
In: Physical Review Fluids, 3 (094202)
doi: 10.1103/PhysRevFluids.3.094202
Artikel, Bibliographie
Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018)
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering. Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania (29.10.2018-31.10.2018)
Konferenzveröffentlichung, Bibliographie
Wunderer, Thomas (2018)
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC)
Artikel, Bibliographie
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
Kryptotag29: 29. Krypto-Tag @ Bosch. Renningen, Germany (06.09.2018-07.09.2018)
doi: 10.18420/cdm-2018-29-24
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
Hrsg.: Dachselt, Raimund ; Weber, Gerhard (2018)
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws12-033
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; Radziewski, Elmar von
Hrsg.: Dachselt, Raimund ; Weber, Gerhard (2018)
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws12-0453
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
Hrsg.: Dachselt, Raimund ; Weber, Gerhard (2018)
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws12-0328
Konferenzveröffentlichung, Bibliographie
Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018)
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking. New Delhi, India (29.10.2018-02.11.2018)
doi: 10.1145/3241539.3241576
Konferenzveröffentlichung, Bibliographie
Günther, Daniel (2018)
Private Function Evaluation with Universal Circuits.
Bosch Renningen, Germany (06.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie
Backes, Sebastian ; Klitzing, R. von (2018)
Nanomechanics and Nanorheology of Microgels at Interfaces.
In: Polymers, 10 (9)
doi: 10.3390/polym10090978
Artikel, Bibliographie
Álvarez-Torrellas, Silvia ; Munoz, Macarena ; Gläsel, Jan ; Pedro, Zahara M. de ; Domínguez, Carmen M. ; García, Juan ; Etzold, Bastian J. M. ; Casas, Jose A. (2018)
Highly efficient removal of pharmaceuticals from water by well-defined carbide-derived carbons.
In: Chemical Engineering Journal, 347
doi: 10.1016/j.cej.2018.04.127
Artikel, Bibliographie
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018)
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18). Naples, Italy (30.09.2018-03.10.2018)
doi: 10.1007/978-3-030-00434-7_1
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Konferenzveröffentlichung, Bibliographie
Tkachenko, Oleksandr (2018)
Privacy-Preserving Genomics on a Large Scale.
Bosch Renningen, Germany (06.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie
Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018)
A unified lattice model and framework for purity analyses.
ASE 2018. Corum, Montpellier, France (03.09.2018-07.09.2018)
doi: 10.1145/3238147.3238226
Konferenzveröffentlichung, Bibliographie
Hutter, Kolumban ; Wang, Yongqi (2018)
Fluid and Thermodynamics. Volume 3: Structured and Multiphase
Fluids.
doi: 10.1007/978-3-319-77745-0
Buch, Bibliographie
May, Jan ; Alobaid, Falah ; Ohlemüller, Peter ; Stroh, Alexander ; Ströhle, Jochen ; Epple, Bernd (2018)
Reactive two–fluid model for chemical–looping combustion – Simulation of fuel and air reactors.
In: International Journal of Greenhouse Gas Control, 76
doi: 10.1016/j.ijggc.2018.06.023
Artikel, Bibliographie
Earley, Timothy (2018)
Extending the Language Coverage of Side-Channel Finder AVR.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Schäfer, Julian ; Roisman, Ilia V. ; Sauer, Hans Martin ; Dörsam, Edgar (2018)
Millisecond fluid pattern formation in the nip of a gravure printing machine.
ECIS 2018 - Annual Conference of the European Colloid and Interface Society. Ljubljana (02.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie
Humbert, Marcel Nikolas (2018)
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Deising, D. ; Bothe, D. ; Marschall, H. (2018)
Direct Numerical Simulation of Mass Transfer in Bubbly Flows.
In: Computers & Fluids, 172
doi: 10.1016/j.compfluid.2018.03.041
Artikel, Bibliographie
Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018)
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks. Denver,CO,USA (26.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie
Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018)
Web Application for Privacy-Preserving Scheduling.
27th USENIX Security Symposium (USENIX Security'18). Baltimore, USA (15.08.2018-17.08.2018)
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Mazaheri, Sogol (2018)
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
2018 IEEE 31st Computer Security Foundations Symposium (CSF). Oxford, United Kingdom (09.07.2018-12.07.2018)
doi: 10.1109/CSF.2018.00013
Konferenzveröffentlichung, Bibliographie
Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub (2018)
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC)
Artikel, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018)
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day. Kirchheim bei München, Germany (07.06.2018-08.06.2018)
doi: 10.18420/cdm-2018-28-23
Konferenzveröffentlichung, Bibliographie
Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan (2018)
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
28th Crypto-Day. Kirchheim bei München, Germany (07.06.2018-08.06.2018)
doi: 10.18420/cdm-2018-28-22
Konferenzveröffentlichung, Bibliographie
Sharma, Ratika (2018)
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Helm, Dominik (2018)
A Framework for Modular Purity Analyses.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Haaf, Martin ; Hilz, Jochen ; Helbig, Martin ; Weingärtner, Christoph ; Stallmann, Olaf ; Ströhle, Jochen ; Epple, Bernd (2018)
Assessment of the operability of a 20 MWth calcium looping demonstration plant by advanced process modelling.
In: International Journal of Greenhouse Gas Control, 75
doi: 10.1016/j.ijggc.2018.05.014
Artikel, Bibliographie
Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018)
IMIX: In-Process Memory Isolation EXtension.
27th USENIX Security Symposium - Technical Sessions Track 2. Baltimore, MD, USA (15.08.2018-17.08.2018)
Konferenzveröffentlichung, Bibliographie
Mitev, Richard (2018)
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018)
Finally Johnny Can Encrypt. But Does This Make Him Feel More
Secure?
International Conference on Availability, Reliability and Security (ARES). Hamburg, Germany (27.08.2018-30.08.2018)
doi: 10.1145/3230833.3230859
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena ; Gerber, Nina ; Kleboth, Marius ; Preuschen, Alexandra von ; Schmidt, Konstantin ; Mayer, Peter
Hrsg.: Clarke, Nathan L. ; Furnell, Steven M. (2018)
The Quest to Replace Passwords Revisited – Rating Authentication Schemes.
Twelth International Symposium on Human Aspects of Information Security & Assurance (HAISA). Dundee, UK (29.08.2018-31.08.2018)
Konferenzveröffentlichung, Bibliographie
Villeneuve, Come du Crest de (2018)
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Butt, Hans-Jürgen ; Berger, Rüdiger ; Steffen, Werner ; Vollmer, Doris ; Weber, Stefan A. L. (2018)
Adaptive Wetting – Adaptation in Wetting.
In: Langmuir, 34 (38)
doi: 10.1021/acs.langmuir.8b01783
Artikel, Bibliographie
Dodhy, Anam (2018)
Misuses of Parameters for Cryptographic APIs.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Hanreich, Matthias (2018)
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Hald, Martin (2018)
Cryptographic Analysis of the Bitmessage Protocol.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Kumar, Manish (2018)
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Nanjunde Gowda, Vidyashree (2018)
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Ece, Olcay (2018)
Security of E-Mail-Encryption.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018)
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
Incheon, Republic of Korea
doi: 10.1145/3196494.3196544
Konferenzveröffentlichung, Bibliographie
Zhang, Gui-Rong ; Wolker, Thomas ; Sandbeck, Daniel J. S. ; Munoz, Macarena ; Mayrhofer, Karl J. J. ; Cherevko, Serhiy ; Etzold, Bastian J. M. (2018)
Tuning the Electrocatalytic Performance of Ionic Liquid Modified Pt Catalysts for the Oxygen Reduction Reaction via Cationic Chain Engineering.
In: ACS Catalysis, 8 (9)
doi: 10.1021/acscatal.8b02018
Artikel, Bibliographie
Baack, Leon (2018)
Optimisation of parts of a set-up for quantum key distribution.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018)
Towards Practical RAM based Secure Computation.
ESORICS 2018. Barcelona, Spain (03.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie
Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018)
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems. Vienna, Austria (02.07.2018-05.07.2018)
Konferenzveröffentlichung, Bibliographie
Boyaciyan, Dikran ; Braun, Larissa ; Löhmann, Oliver ; Silvi, Luca ; Schneck, Emanuel ; Klitzing, R. von (2018)
Gold nanoparticle distribution in polyelectrolyte brushes loaded at different pH conditions.
In: The Journal of Chemical Physics, 149 (16)
doi: 10.1063/1.5035554
Artikel, Bibliographie
Classen, Jiska ; Wegemer, Daniel (2018)
Fitbit Firmware Hacking.
Anderes, Bibliographie
Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018)
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
Taipei, Taiwan
doi: 10.1109/NOMS.2018.8406315
Konferenzveröffentlichung, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018)
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
Artikel, Bibliographie
Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018)
Function-Dependent Commitments for Verifiable Multi-Party Computation.
Konferenzveröffentlichung, Bibliographie
Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018)
Estimate all the {LWE, NTRU} schemes!
11th Conference on Security and Cryptography for Networks. Amalfi, Italy
Konferenzveröffentlichung, Bibliographie
Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018)
PROPYLA: Privacy Preserving Long-Term Secure Storage.
The Sixth International Workshop on Security in Cloud Computing (SCC).
Konferenzveröffentlichung, Bibliographie
Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018)
Differential Power Analysis of XMSS and SPHINCS.
9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018). Singapore (23.04.2018-24.04.2018)
doi: 10.1007/978-3-319-89641-0_10
Konferenzveröffentlichung, Bibliographie
Wunderer, Thomas ; Wang, Yuntao (2018)
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
14th International Conference on Information Security Practice and Experience (ISPEC 2018).
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018)
Towards Secure Distributed Trust Management on a Global Scale.
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy. Budapest, Hungary (20.08.2018-25.08.2018)
doi: 10.1145/3229565.3229569
Konferenzveröffentlichung, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018)
An Overview of DRAM-Based Security Primitives.
In: Cryptography, 2 (7)
doi: 10.3390/cryptography2020007
Artikel, Bibliographie
Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018)
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18). San Diego, CA, USA (05.11.2018-08.11.2018)
Konferenzveröffentlichung, Bibliographie
Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
Invited: Reconciling Remote Attestation and Safety-Critical
Operation on Simple IoT Devices.
Design Automation Conference. San Francisco, USA (24.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018). Salvador, Brazil (02.10.2018-05.10.2018)
Konferenzveröffentlichung, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018)
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018). Barcelona, Spain (03.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Artikel, Bibliographie
Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2018)
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
32nd European Conference on Object-Oriented Programming (ECOOP 2018). Amsterdam, The Netherlands (15.07.2018-21.07.2018)
doi: 10.4230/LIPIcs.ECOOP.2018.10
Konferenzveröffentlichung, Bibliographie
Guhl, Conrad ; Kehne, Philipp ; Ma, Qianli ; Tietz, Frank ; Alff, Lambert ; Komissinskiy, Philipp ; Jaegermann, Wolfram ; Hausbrand, René (2018)
In-operando photoelectron spectroscopy for batteries: Set-up using pristine thin film cathode and first results on NaxCoO2.
In: Review of Scientific Instruments, 89 (7)
doi: 10.1063/1.5022616
Artikel, Bibliographie
Rowe, Steven (2018)
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Mantz, Dennis (2018)
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Franke, Fabian (2018)
Learning the Beams.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Mehmedovic, Damir (2018)
Wi-Fi Based Key Exchange On Android Smartphones.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Senker, Matthias (2018)
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018)
Lattice Based Modularization of Static Analyses.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236509
Konferenzveröffentlichung, Bibliographie
Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018)
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236503
Konferenzveröffentlichung, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018)
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3)
doi: 10.3390/cryptography2030013
Artikel, Bibliographie
Heidt, Margareta (2018)
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
Artikel, Bibliographie
Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018)
Towards a Cloud-based System for Software Protection and Licensing.
Secrypt 2018. Porto, Portugal (26.07.2018-28.07.2018)
doi: 10.5220/0006899506980702
Konferenzveröffentlichung, Bibliographie
Wang, Yongqi ; Hutter, Kolumban (2018)
Phenomenological Thermodynamics of Irreversible Processes.
In: Entropy, 20 (6)
doi: 10.3390/e20060479
Artikel, Bibliographie
Kolvenbach, Philip ; Lass, Oliver ; Ulbrich, Stefan (2018)
An approach for robust PDE-constrained optimization with application to shape optimization of electrical engines and of dynamic elastic structures under uncertainty.
In: Optimization and Engineering, 19 (3)
doi: 10.1007/s11081-018-9388-3
Artikel, Bibliographie
Fischlin, Marc ; Harasser, Patrick (2018)
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
16th International Conference on Applied Cryptography and Network Security. Leuven, Belgium (02.07.2018-04.07.2018)
doi: 10.1007/978-3-319-93387-0_11
Konferenzveröffentlichung, Bibliographie
Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018)
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18). Guimaraes, Portugal (26.06.2018-28.06.2018)
doi: 10.1109/ICL-GNSS.2018.8440910
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018)
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
Konferenzveröffentlichung, Bibliographie
Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Konferenzveröffentlichung, Bibliographie
Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196541
Konferenzveröffentlichung, Bibliographie
Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018)
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196522
Konferenzveröffentlichung, Bibliographie
Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018)
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Stockholm, Sweden (18.06.2018-20.06.2018)
doi: 10.1145/3212480.3212499
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
Revisiting Context-Based Pairing in IoT.
55th Design Automation Conference (DAC). San Francisco, CA, USA (24.06.2018-29.06.2018)
Konferenzveröffentlichung, Bibliographie
Gajewski, Marvin (2018)
Asymptotische Eigenschaften offener quantenoptischer Systeme.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Renaud, Karen ; Zimmermann, Verena (2018)
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2)
Artikel, Bibliographie
Wijden, Marius van der (2018)
Payment and State Channels in practice.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Varky, Jacek (2018)
TeePay – Using Trusted Execution Environments for Off-chain Payment.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Ullrich, Fabian (2018)
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Wolf, Yannic (2018)
Eine Faserverstärkerstufe für den Quantenhub.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Kiel, Robert (2018)
Zero-Knowledge Contingent Payments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018)
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium.
Konferenzveröffentlichung, Bibliographie
Reis, M. C. ; Sousa, M. F. B. ; Alobaid, F. ; Bertran, C. A. ; Wang, Yongqi (2018)
A two-fluid model for calcium carbonate precipitation in highly supersaturated solutions.
In: Advanced Powder Technology, 29
doi: 10.1016/j.apt.2018.03.022
Artikel, Bibliographie
Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric (2018)
VisuFlow: a Debugging Environment for Static Analyses.
Konferenzveröffentlichung, Bibliographie
Treiber, Amos (2018)
Access Count Leakage in Oblivious RAMs.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018)
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, 18 (9)
Artikel, Bibliographie
Scheidel, Lukas (2018)
Distributed Path ORAM.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Deligeorgopoulos, Efstathios (2018)
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Ouédraogo, Yun ; Gjonaj, Erion ; Weiland, Thomas ; De Gersem, Herbert ; Steinhausen, Christoph ; Lamanna, Grazia ; Weigand, Bernhard ; Preusche, Andreas ; Dreizler, Andreas
Hrsg.: Langer, U. ; Amrhein, W. ; Zulehner, W. (2018)
Modelling and Simulation of Electrically Controlled Droplet Dynamics.
In: Scientific Computing in Electrical Engineering
doi: 10.1007/978-3-319-75538-0_10
Buchkapitel, Bibliographie
Heinrich, A. ; Ries, F. ; Kuenne, G. ; Ganter, S. ; Hasse, C. ; Sadiki, A. ; Janicka, J. (2018)
Large Eddy Simulation with tabulated chemistry of an experimental sidewall quenching burner.
In: International Journal of Heat and Fluid Flow, 71
doi: 10.1016/j.ijheatfluidflow.2018.03.011
Artikel, Bibliographie
Schön, Sebastian ; Klitzing, R. von (2018)
A simple extension of the commonly used fitting equation for oscillatory structural forces in case of silica nanoparticle suspensions.
In: Beilstein Journal of Nanotechnology, 9
doi: 10.3762/bjnano.9.101
Artikel, Bibliographie
Guhl, Conrad ; Kehne, Philipp ; Ma, Qianli ; Tietz, Frank ; Komissinskiy, Philipp ; Jaegermann, Wolfram ; Hausbrand, René (2018)
Interfaces in solid-state sodium-ion batteries: NaCoO 2 thin films on solid electrolyte substrates.
In: Electrochimica Acta, 268
doi: 10.1016/j.electacta.2018.02.109
Artikel, Bibliographie
Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018)
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM). Honolulu, Hawaii, USA (15.04.2018-19.04.2018)
Konferenzveröffentlichung, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018)
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018. Tel Aviv, Israel (29.04.2019-03.05.2018)
doi: 10.1007/978-3-319-78372-7_5
Konferenzveröffentlichung, Bibliographie
Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max (2018)
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
Taipei, Taiwan.
doi: 10.1109/NOMS.2018.8406119
Konferenzveröffentlichung, Bibliographie
Alobaid, Falah ; Al-Maliki, Wisam Abed Kattea ; Lanz, Thomas ; Haaf, Martin ; Brachthäuser, Andreas ; Epple, Bernd ; Zorbach, Ingo (2018)
Dynamic simulation of a municipal solid waste incinerator.
In: Energy, 149
doi: 10.1016/j.energy.2018.01.170
Artikel, Bibliographie
Tariq, Taha (2018)
Web application for privacy-preserving assignments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Wittich, Carolin ; Mankel, Eric ; Clemens, Oliver ; Lakus-Wollny, Kerstin ; Mayer, Thomas ; Jaegermann, Wolfram ; Kleebe, Hans-Joachim (2018)
Structural and compositional characteristics of vacuum deposited methylammonium lead halide perovskite layers in dependence on background pressure and substrate temperature.
In: Thin Solid Films, 650
doi: 10.1016/j.tsf.2018.02.004
Artikel, Bibliographie
Schulz, Natalia ; Hausbrand, René ; Dimesso, Lucangelo ; Jaegermann, Wolfram (2018)
XPS-Surface Analysis of SEI Layers on Li-Ion Cathodes: Part I. Investigation of Initial Surface Chemistry.
In: Journal of The Electrochemical Society, 165 (5)
doi: 10.1149/2.0061805jes
Artikel, Bibliographie
Schulz, Natalia ; Hausbrand, René ; Wittich, Carolin ; Dimesso, Lucangelo ; Jaegermann, Wolfram (2018)
XPS-Surface Analysis of SEI Layers on Li-Ion Cathodes: Part II. SEI-Composition and Formation inside Composite Electrodes.
In: Journal of The Electrochemical Society, 165 (5)
doi: 10.1149/2.0881803jes
Artikel, Bibliographie
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Hrsg.: Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (2018)
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018
Buchkapitel, Bibliographie
Brandy, Malte (2018)
Asymptotische Eigenschaften iterierter Quantenoperationen.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Neubauer, Sven (2018)
Angriffsanalyse einer TETRA-Basisstation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Etzold, Bastian J. M. ; Begin, Dominique (2018)
Editoral special issue CarboCat-VII.
In: Catalysis Today, 301
doi: 10.1016/j.cattod.2017.11.001
Artikel, Bibliographie
Godina, Lidia I. ; Tokarev, Anton V. ; Simakova, Irina L. ; Mäki-Arvela, Päivi ; Kortesmäki, Ewelina ; Gläsel, Jan ; Kronberg, Leif ; Etzold, Bastian ; Murzin, Dmitry Yu. (2018)
Aqueous-phase reforming of alcohols with three carbon atoms on carbon-supported Pt.
In: Catalysis Today, 301
doi: 10.1016/j.cattod.2017.03.042
Artikel, Bibliographie
Fräbel, Sabine ; Wagner, Bastian ; Krischke, Markus ; Schmidts, Volker ; Thiele, Christina M. ; Staniek, Agata ; Warzecha, Heribert (2018)
Engineering of new-to-nature halogenated indigo precursors in plants.
In: Metabolic Engineering, 46
doi: 10.1016/j.ymben.2018.02.003
Artikel, Bibliographie
Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018)
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Konferenzveröffentlichung, Bibliographie
Alhassan, Masaud Y. (2018)
Improving scalability of universal circuits for large-scale private function evaluation.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Hofmann, Daniel (2018)
Charakterisierung von verschränkten Photonenpaaren.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Trautmann, N. ; Hauke, P. (2018)
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: Physical Review A, 97 (2)
doi: 10.1103/PhysRevA.97.023606
Artikel, Bibliographie
Saleem, Umair Muhammad (2018)
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Gao, Nan ; Geyer, Florian ; Pilat, Dominik W. ; Wooh, Sanghyuk ; Vollmer, Doris ; Butt, Hans-Jürgen ; Berger, Rüdiger (2018)
How drops start sliding over solid surfaces.
In: Nature Physics, 14 (2)
doi: 10.1038/nphys4305
Artikel, Bibliographie
Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018)
K-Miner: Uncovering Memory Corruption in Linux.
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018)
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
doi: 10.48550/arXiv.1801.05764
Report, Bibliographie
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. Toronto, Canada (15.10.2018-15.10.2018)
doi: 10.1145/3267323.3268963
Konferenzveröffentlichung, Bibliographie
Bender, Achim ; Hänichen, Philipp ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018)
Modeling Crystallization and Heat Transfer in an Evaporating Urea-Water Drop.
In: IHTC 16 - International Heat Transfer Conference 16 Digital Libary, August 10-15, Beijing, China
doi: 10.1615/IHTC16
Artikel, Bibliographie
Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Hrsg.: Reuter, Christian (2018)
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Auflage: 1. Auflage
doi: 10.1007/978-3-658-19523-6_30
Buchkapitel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
Hrsg.: Reuter, Christian (2018)
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Auflage: 1. Auflage
doi: 10.1007/978-3-658-19523-6_19
Buchkapitel, Bibliographie
Ahmad, Saad (2018)
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Groß, T. F. ; Bauer, J. ; Ludwig, G. ; Fernandez Rivas, D. ; Pelz, P. F. (2018)
Bubble nucleation from micro-crevices in a shear flow.
In: Experiments in Fluids, 59 (1)
doi: 10.1007/s00348-017-2459-y
Artikel, Bibliographie
Stroh, Alexander ; Alobaid, Falah ; Bohnstein, Maximilian von ; Ströhle, Jochen ; Epple, Bernd (2018)
Numerical CFD simulation of 1 MWth circulating fluidized bed using the coarse grain discrete element method with homogenous drag models and particle size distribution.
In: Fuel Processing Technology, 169
doi: 10.1016/j.fuproc.2017.09.014
Artikel, Bibliographie
Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018)
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion
Buchkapitel, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018)
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2)
doi: 10.1145/3154794
Artikel, Bibliographie
Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias (2018)
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
3rd NSF Millimeter-Wave RCN Workshop.
Konferenzveröffentlichung, Bibliographie
Preußer, Niklas ; Rieks, Sebastian ; Kenig, Eugeny Y. ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018)
Transport Processes and Separation in Zero-Gravity Destillation.
In: IHTC 16 - International Heat Transfer Conference 16 Digital Libary, August 10-15, Beijing, China
doi: 10.1615/IHTC16.her.023300
Artikel, Bibliographie
Reis, Martina Costa ; Sousa, M. F. B. ; Alobaid, Falah ; Bertran, C. A. ; Wang, Yongqi (2018)
Numerical simulations for homogeneous nucleation of calcium carbonate in concentrated electrolyte solutions.
In: International Journal of Computational Methods and Experimental Measurements, 6 (1)
doi: 10.2495/CMEM-V6-N1-35-45
Artikel, Bibliographie
Dimesso, Lucangelo ; Das, Chittaranjan ; Mayer, Thomas ; Jaegermann, Wolfram (2018)
Investigation of earth-alkaline (EA = Mg, Ca, Sr) containing methylammonium tin iodide perovskite systems.
In: Journal of Materials Science, 53 (1)
doi: 10.1007/s10853-017-1545-0
Artikel, Bibliographie
Heß, Julian ; Wang, Yongqi (2018)
Modeling Debris Flow: On The Influence Of Pore Pressure Evolution And Hypoplasticity.
In: International Journal of Computational Methods and Experimental Measurements, 6 (2)
doi: 10.2495/CMEM-V6-N2-385-397
Artikel, Bibliographie
Batzdorf, Stefan ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2018)
Direct Numerical Simulation of the Microscale Fluid Flow and Heat Transfer in the Three-Phase Contact Line Region During Evaporation.
In: Journal of Heat Transfer, 140 (3)
doi: 10.1115/1.4038191
Artikel, Bibliographie
Bürkle, Sebastian ; Dreizler, Andreas ; Ebert, Volker ; Wagner, Steven (2018)
Experimental comparison of a 2D laminar diffusion flame under oxy-fuel and air atmosphere.
In: Fuel, 212
doi: 10.1016/j.fuel.2017.10.067
Artikel, Bibliographie
Hill, S. ; Deising, D. ; Acher, T. ; Klein, H. ; Bothe, D. ; Marschall, H. (2018)
Boundedness-preserving implicit correction of mesh-induced errors for VOF based heat and mass transfer.
In: Journal of Computational Physics, 352
doi: 10.1016/j.jcp.2017.09.027
Artikel, Bibliographie
Han, Haoya ; Li, Li ; Yang, Qingsong ; Tian, Yuchuan ; Wang, Yunwei ; Ye, Zhishuang ; Klitzing, R. von ; Guo, Xuhong (2018)
Characterization of hollow silica–polyelectrolyte composite nanoparticles by small-angle X-ray scattering.
In: Journal of Materials Science, 53 (5)
doi: 10.1007/s10853-017-1747-5
Artikel, Bibliographie
Jainski, Christopher ; Rißmann, Martin ; Jakirlić, Suad ; Böhm, Benjamin ; Dreizler, Andreas (2018)
Quenching of Premixed Flames at Cold Walls: Effects on the Local Flow Field.
In: Flow, Turbulence and Combustion, 100 (1)
doi: 10.1007/s10494-017-9836-8
Artikel, Bibliographie
Kraheberger, S. ; Hoyas, S. ; Oberlack, M. (2018)
DNS of a turbulent Couette flow at constant wall transpiration up to.
In: Journal of Fluid Mechanics, 835
doi: 10.1017/jfm.2017.757
Artikel, Bibliographie
Landwehr, Johannes ; Steldinger, Hendryk ; Etzold, Bastian J. M. (2018)
Introducing sulphur surface groups in microporous carbons: A mechanistic study on carbide derived carbons.
In: Catalysis Today, 301
doi: 10.1016/j.cattod.2017.05.027
Artikel, Bibliographie
Schremb, Markus ; Roisman, Ilia V. ; Tropea, Cameron (2018)
Normal impact of supercooled water drops onto a smooth ice surface: experiments and modelling.
In: Journal of Fluid Mechanics, 835
doi: 10.1017/jfm.2017.797
Artikel, Bibliographie
Ullrich, Wolfram Christoph ; Hirsch, Christoph ; Sattelmayer, Thomas ; Lackhove, Kilian ; Sadiki, Amsini ; Fischer, André ; Staufer, Max (2018)
Combustion Noise Prediction Using Linearized Navier–Stokes Equations and Large-Eddy Simulation Sources.
In: Journal of Propulsion and Power, 34 (1)
doi: 10.2514/1.b36428
Artikel, Bibliographie
Verschaeve, Joris C. G. ; Pedersen, Geir K. ; Tropea, Cameron (2018)
Non-modal stability analysis of the boundary layer under solitary waves.
In: Journal of Fluid Mechanics, 836
doi: 10.1017/jfm.2017.825
Artikel, Bibliographie
Kumar, Abhijeet ; Kleinen, Jochen ; Gambaryan-Roisman, Tatiana ; Venzmer, Joachim (2018)
Electrokinetic investigation of deposition of cationic fabric softener vesicles on anionic porous cotton fabrics.
In: Journal of Colloid and Interface Science, 514
doi: 10.1016/j.jcis.2017.11.062
Artikel, Bibliographie
Chen, Longquan ; Bonaccurso, Elmar ; Gambaryan-Roisman, Tatiana ; Starov, Victor ; Koursari, Nektaria ; Zhao, Yapu (2018)
Static and dynamic wetting of soft substrates.
In: Current Opinion in Colloid & Interface Science, 36
doi: 10.1016/j.cocis.2017.12.001
Artikel, Bibliographie
Zhang, Kai ; Meng, Dong ; Müller-Plathe, Florian ; Kumar, Sanat K. (2018)
Coarse-grained molecular dynamics simulation of activated penetrant transport in glassy polymers.
In: Soft Matter, 14 (3)
doi: 10.1039/c7sm01941f
Artikel, Bibliographie
Gao, Yangyang ; Müller-Plathe, Florian (2018)
Molecular Dynamics Study on the Thermal Conductivity of the End-grafted Carbon Nanotubes Filled Polyamide-6.6 Nanocomposites.
In: The Journal of Physical Chemistry C, 122 (2)
doi: 10.1021/acs.jpcc.7b11310
Artikel, Bibliographie
Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018)
Numerical investigation of the evolution and breakup of an evaporating liquid film on a structured wall.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.01.013
Artikel, Bibliographie
Silies, Laura ; Andrieu-Brunsen, Annette (2018)
Programming Ionic Pore Accessibility in Zwitterionic Polymer Modified Nanopores.
In: Langmuir, 34 (3)
doi: 10.1021/acs.langmuir.7b00529
Artikel, Bibliographie
Falcone, M. ; Bothe, D. ; Marschall, H. (2018)
3D direct numerical simulations of reactive mass transfer from deformable single bubbles: An analysis of mass transfer coefficients and reaction selectivities.
In: Chemical Engineering Science, 177
doi: 10.1016/j.ces.2017.11.024
Artikel, Bibliographie
Yu, Haitao ; Sun, Hui ; Shen, Jianqi ; Tropea, Cameron (2018)
Measurements of refractive index and size of a spherical drop from Gaussian beam scattering in the primary rainbow region.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, 207
doi: 10.1016/j.jqsrt.2017.12.028
Artikel, Bibliographie
Hänichen, Philipp ; Eyk, Maximilian van ; Stephan, Peter (2018)
Experimental investigations of fuel film evaporation with deposit formation.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.001
Artikel, Bibliographie
Fink, V. ; Cai, X. ; Stroh, A. ; Bernard, R. ; Kriegseis, J. ; Frohnapfel, B. ; Marschall, H. ; Wörner, M. (2018)
Drop bouncing by micro-grooves.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.014
Artikel, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2018)
From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59 (3)
doi: 10.1007/s00348-018-2514-3
Artikel, Bibliographie
Ding, Carl-Philipp ; Sjöberg, Magnus ; Vuilleumier, David ; Reuss, David L. ; He, Xu ; Böhm, Benjamin (2018)
Fuel film thickness measurements using refractive index matching in a stratified-charge SI engine operated on E30 and alkylate fuels.
In: Experiments in Fluids, 59 (3)
doi: 10.1007/s00348-018-2512-5
Artikel, Bibliographie
Endoh, Kenkoh S. ; Kawakatsu, Toshihiro ; Müller-Plathe, Florian (2018)
Coarse-Grained Molecular Simulation Model for Gecko Feet Keratin.
In: The Journal of Physical Chemistry B, 122 (8)
doi: 10.1021/acs.jpcb.7b10481
Artikel, Bibliographie
Forooghi, Pourya ; Weidenlener, Alex ; Magagnato, Franco ; Böhm, Benjamin ; Kubach, Heiko ; Koch, Thomas ; Frohnapfel, Bettina (2018)
DNS of momentum and heat transfer over rough surfaces based on realistic combustion chamber deposit geometries.
In: International Journal of Heat and Fluid Flow, 69
doi: 10.1016/j.ijheatfluidflow.2017.12.002
Artikel, Bibliographie
Ghoussoub, Yara E. ; Zerball, Maximilian ; Fares, Hadi M. ; Ankner, John F. ; Klitzing, R. von ; Schlenoff, Joseph B. (2018)
Ion distribution in dry polyelectrolyte multilayers: a neutron reflectometry study.
In: Soft Matter, 14 (9)
doi: 10.1039/c7sm02461d
Artikel, Bibliographie
Roisman, I. V. ; Breitenbach, J. ; Tropea, C. (2018)
Thermal atomisation of a liquid drop after impact onto a hot substrate.
In: Journal of Fluid Mechanics, 842
doi: 10.1017/jfm.2018.123
Artikel, Bibliographie
Hartl, Sandra ; Geyer, Dirk ; Dreizler, Andreas ; Magnotti, Gaetano ; Barlow, Robert S. ; Hasse, Christian (2018)
Regime identification from Raman/Rayleigh line measurements in partially premixed flames.
In: Combustion and Flame, 189
doi: 10.1016/j.combustflame.2017.10.024
Artikel, Bibliographie
Marić, T. ; Marschall, H. ; Bothe, D. (2018)
An enhanced un-split face-vertex flux-based VoF method.
In: Journal of Computational Physics, 371
doi: 10.1016/j.jcp.2018.03.048
Artikel, Bibliographie
Meng, Xiannan ; Wang, Yongqi (2018)
Modeling dynamic flows of grain–fluid mixtures by coupling the mixture theory with a dilatancy law.
In: Acta Mechanica, 229
doi: 10.1007/s00707-018-2111-9
Artikel, Bibliographie
Reis, Martina Costa ; Alobaid, Falah ; Wang, Yongqi (2018)
Toward the modeling of combustion reactions through discrete element method (DEM) simulations.
In: Computational Particle Mechanics, 5
doi: 10.1007/s40571-018-0191-x
Artikel, Bibliographie
Boyaciyan, D. ; Krause, P. ; Klitzing, R. von (2018)
Making strong polyelectrolyte brushes pH-sensitive by incorporation of gold nanoparticles.
In: Soft Matter, 14 (20)
doi: 10.1039/c8sm00411k
Artikel, Bibliographie
Peral, D. ; Stehl, D. ; Bibouche, B. ; Yu, H. ; Mardoukh, J. ; Schomäcker, R. ; Klitzing, R. von ; Vogt, D. (2018)
Colloidal polymer particles as catalyst carriers and phase transfer agents in multiphasic hydroformylation reactions.
In: Journal of Colloid and Interface Science, 513
doi: 10.1016/j.jcis.2017.11.071
Artikel, Bibliographie
Lehmann, Maren ; Tabaka, Weronika ; Möller, Tim ; Oppermann, Alex ; Wöll, Dominik ; Volodkin, Dmitry ; Wellert, Stefan ; Klitzing, R. von (2018)
DLS Setup for in Situ Measurements of Photoinduced Size Changes of Microgel-Based Hybrid Particles.
In: Langmuir, 34 (12)
doi: 10.1021/acs.langmuir.7b04298
Artikel, Bibliographie
Löhmann, Oliver ; Micciulla, Samantha ; Soltwedel, Olaf ; Schneck, Emanuel ; Klitzing, R. von (2018)
Swelling Behavior of Composite Systems: Mutual Effects between Polyelectrolyte Brushes and Multilayers.
In: Macromolecules, 51 (8)
doi: 10.1021/acs.macromol.8b00359
Artikel, Bibliographie
Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018)
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
Artikel, Bibliographie
Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018)
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94
Artikel, Bibliographie
Reif, Michael ; Eichberg, Michael ; Mezini, Mira
Hrsg.: Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (2018)
Call Graph Construction for Java Libraries.
Software Engineering und Software Management 2018. Bonn
Konferenzveröffentlichung, Bibliographie
Aygüler, Meltem F. ; Hufnagel, Alexander G. ; Rieder, Philipp ; Wussler, Michael ; Jaegermann, Wolfram ; Bein, Thomas ; Dyakonov, Vladimir ; Petrus, Michiel L. ; Baumann, Andreas ; Docampo, Pablo (2018)
Influence of Fermi Level Alignment with Tin Oxide on the Hysteresis of Perovskite Solar Cells.
In: ACS Applied Materials & Interfaces, 10 (14)
doi: 10.1021/acsami.8b00990
Artikel, Bibliographie
Dimesso, L. ; Mayer, T. ; Jaegermann, W. (2018)
Investigation of Methylammonium Tin Strontium Bromide Perovskite Systems.
In: ECS Journal of Solid State Science and Technology, 7 (3)
doi: 10.1149/2.0181803jss
Artikel, Bibliographie
Thammanna Gurumurthy, Vignesh ; Rettenmaier, Daniel ; Roisman, Ilia V. ; Tropea, Cameron ; Garoff, Stephen (2018)
Computations of spontaneous rise of a rivulet in a corner of a vertical square capillary.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 544
doi: 10.1016/j.colsurfa.2018.02.003
Artikel, Bibliographie
Kuhnhenn, Maximilian ; Joensen, Tórstein V. ; Reck, Mads ; Roisman, Ilia V. ; Tropea, Cameron (2018)
Study of the internal flow in a rotary atomizer and its influence on the properties of the resulting spray.
In: International Journal of Multiphase Flow, 100
doi: 10.1016/j.ijmultiphaseflow.2017.11.019
Artikel, Bibliographie
Li, Ang ; Jia, Yunfei ; Sun, Shengtong ; Xu, Yisheng ; Minsky, Burcu Baykal ; Stuart, M. A. Cohen ; Cölfen, Helmut ; Klitzing, R. von ; Guo, Xuhong (2018)
Mineral-Enhanced Polyacrylic Acid Hydrogel as an Oyster-Inspired Organic–Inorganic Hybrid Adhesive.
In: ACS Applied Materials & Interfaces, 10 (12)
doi: 10.1021/acsami.8b01082
Artikel, Bibliographie
Mehdizadeh, A. ; Doost, S. ; Sadiki, A. ; Janicka, J. ; Karimi, N. (2018)
Assessment of predictive capability of hybrid URANS/LES methods in residence time calculation.
In: Chemical Engineering Science, 183
doi: 10.1016/j.ces.2018.02.035
Artikel, Bibliographie
Nayar, Divya ; Vegt, Nico F. A. van der (2018)
Cosolvent Effects on Polymer Hydration Drive Hydrophobic Collapse.
In: The Journal of Physical Chemistry B, 122 (13)
doi: 10.1021/acs.jpcb.7b10780
Artikel, Bibliographie
Rosenberger, David ; Vegt, Nico F. A. van der (2018)
Addressing the temperature transferability of structure based coarse graining models.
In: Physical Chemistry Chemical Physics, 20 (9)
doi: 10.1039/c7cp08246k
Artikel, Bibliographie
Surblys, Donatas ; Leroy, Frédéric ; Yamaguchi, Yasutaka ; Müller-Plathe, Florian (2018)
Molecular dynamics analysis of the influence of Coulomb and van der Waals interactions on the work of adhesion at the solid-liquid interface.
In: The Journal of Chemical Physics, 148 (13)
doi: 10.1063/1.5019185
Artikel, Bibliographie
Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018)
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
Konferenzveröffentlichung, Bibliographie
Kittel, Hannah M. ; Alam, Ehsanul ; Roisman, Ilia V. ; Tropea, Cameron ; Gambaryan-Roisman, Tatiana (2018)
Splashing of a Newtonian drop impacted onto a solid substrate coated by a thin soft layer.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 553
doi: 10.1016/j.colsurfa.2018.04.060
Artikel, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2018)
Publisher Correction: From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59 (5)
doi: 10.1007/s00348-018-2535-y
Artikel, Bibliographie
Cherkashinin, Gennady ; Eilhardt, Robert ; Lebedev, Mikhail V. ; Nappini, Silvia ; Magnano, Elena ; Jaegermann, Wolfram (2018)
Olivine-LiNiPO 4 Thin Films: Chemical Compatibility with Liquid Electrolyte and Interface Stability at High Potential.
In: Journal of The Electrochemical Society, 165 (4)
doi: 10.1149/2.0211804jes
Artikel, Bibliographie
Eslami, Hossein ; Bahri, Kheiri ; Müller-Plathe, Florian (2018)
Solid–Liquid and Solid–Solid Phase Diagrams of Self-Assembled Triblock Janus Nanoparticles from Solution.
In: The Journal of Physical Chemistry C, 122 (16)
doi: 10.1021/acs.jpcc.8b02043
Artikel, Bibliographie
Ganter, Sebastian ; Straßacker, Christina ; Kuenne, Guido ; Meier, Thorsten ; Heinrich, Arne ; Maas, Ulrich ; Janicka, J. (2018)
Laminar near-wall combustion: Analysis of tabulated chemistry simulations by means of detailed kinetics.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.015
Artikel, Bibliographie
Gugat, Martin ; Ulbrich, Stefan (2018)
Lipschitz solutions of initial boundary value problems for balance laws.
In: Mathematical Models and Methods in Applied Sciences, 28 (05)
doi: 10.1142/s0218202518500240
Artikel, Bibliographie
Kosaka, Hidemasa ; Zentgraf, Florian ; Scholtissek, Arne ; Bischoff, Lothar ; Häber, Thomas ; Suntz, Rainer ; Albert, Barbara ; Hasse, Christian ; Dreizler, Andreas (2018)
Wall heat fluxes and CO formation/oxidation during laminar and turbulent side-wall quenching of methane and DME flames.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.01.009
Artikel, Bibliographie
Kunimoto, Masahiro ; Bothe, Dieter ; Tamura, Risa ; Oyanagi, Takahiro ; Fukunaka, Yasuhiro ; Nakai, Hiromi ; Homma, Takayuki (2018)
Spectroscopic and Computational Analyses of Liquid–Liquid Interfacial Reaction Mechanism of Boric Acid Esterification with 2,2,4-Trimethyl-1,3-pentanediol in Boron Extraction Processes.
In: The Journal of Physical Chemistry C, 122 (19)
doi: 10.1021/acs.jpcc.8b01086
Artikel, Bibliographie
Nishad, K. ; Ries, F. ; Janicka, J. ; Sadiki, A. (2018)
Analysis of spray dynamics of urea–water-solution jets in a SCR-DeNOx system: An LES based study.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.017
Artikel, Bibliographie
Shojaeian, Mostafa ; Hardt, Steffen (2018)
Fast electric control of the droplet size in a microfluidic T-junction droplet generator.
In: Applied Physics Letters, 112 (19)
doi: 10.1063/1.5025874
Artikel, Bibliographie
Sauer, Hans Martin ; Roisman, Ilia V. ; Dörsam, Edgar ; Tropea, Cameron (2018)
Fast liquid sheet and filament dynamics in the fluid splitting process.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 557
doi: 10.1016/j.colsurfa.2018.05.101
Artikel, Bibliographie
Rolfe, A. ; Huang, Y. ; Haaf, M. ; Pita, A. ; Rezvani, S. ; Dave, A. ; Hewitt, N.J. (2018)
Technical and environmental study of calcium carbonate looping versus oxy-fuel options for low CO2 emission cement plants.
In: International Journal of Greenhouse Gas Control, 75
doi: 10.1016/j.ijggc.2018.05.020
Artikel, Bibliographie
Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018)
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474
Artikel, Bibliographie
Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018)
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
Konferenzveröffentlichung, Bibliographie
Limper, Max (2018)
Automatic Optimization of 3D Mesh Data for Real-Time Online Presentation.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018)
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing
doi: 10.1109/MIC.2018.182130646
Artikel, Bibliographie
Silies, Laura ; Gonzalez Solveyra, Estefania ; Szleifer, Igal ; Andrieu-Brunsen, Annette (2018)
Insights into the Role of Counterions on Polyelectrolyte-Modified Nanopore Accessibility.
In: Langmuir, 34 (20)
doi: 10.1021/acs.langmuir.8b00963
Artikel, Bibliographie
Bruce, Ellen E. ; Vegt, Nico F. A. van der (2018)
Does an electronic continuum correction improve effective short-range ion-ion interactions in aqueous solution?
In: The Journal of Chemical Physics, 148 (22)
doi: 10.1063/1.5017101
Artikel, Bibliographie
Bürkle, Sebastian ; Becker, Lukas Georg ; Dreizler, Andreas ; Wagner, Steven (2018)
Experimental investigation of the flue gas thermochemical composition of an oxy-fuel swirl burner.
In: Fuel, 231
doi: 10.1016/j.fuel.2018.05.039
Artikel, Bibliographie
Bürkle, Sebastian ; Biondo, Luigi ; Ding, Carl-Philipp ; Honza, Rene ; Ebert, Volker ; Böhm, Benjamin ; Wagner, Steven (2018)
In-Cylinder Temperature Measurements in a Motored IC Engine using TDLAS.
In: Flow, Turbulence and Combustion, 101 (1)
doi: 10.1007/s10494-017-9886-y
Artikel, Bibliographie
Bürkle, Sebastian ; Walter, Nicole ; Wagner, Steven (2018)
Laser-based measurements of pressure broadening and pressure shift coefficients of combustion-relevant absorption lines in the near-infrared region.
In: Applied Physics B, 124 (6)
doi: 10.1007/s00340-018-6993-y
Artikel, Bibliographie
Čechová, Lucie ; Kind, Jonas ; Dračínský, Martin ; Filo, Juraj ; Janeba, Zlatko ; Thiele, Christina M. ; Cigáň, Marek ; Procházková, Eliška (2018)
Photoswitching Behavior of 5-Phenylazopyrimidines: In Situ Irradiation NMR and Optical Spectroscopy Combined with Theoretical Methods.
In: The Journal of Organic Chemistry, 83 (11)
doi: 10.1021/acs.joc.8b00569
Artikel, Bibliographie
Fegan, Sarah K. ; Kirsch, Peer ; Müller-Plathe, Florian (2018)
The alignment of dichroic dyes in a nematic liquid crystal: a molecular dynamics investigation.
In: Liquid Crystals, 45 (9)
doi: 10.1080/02678292.2018.1441456
Artikel, Bibliographie
Ilie, Ioana M. ; Nayar, Divya ; Otter, Wouter K. den ; Vegt, Nico F. A. van der ; Briels, Wim J. (2018)
Intrinsic Conformational Preferences and Interactions in α-Synuclein Fibrils: Insights from Molecular Dynamics Simulations.
In: Journal of Chemical Theory and Computation, 14 (6)
doi: 10.1021/acs.jctc.8b00183
Artikel, Bibliographie
Krumbein, B. ; Termini, V. ; Jakirlić, S. ; Tropea, C. (2018)
Flow and heat transfer in cross-stream type T-junctions: A computational study.
In: International Journal of Heat and Fluid Flow, 71
doi: 10.1016/j.ijheatfluidflow.2018.03.013
Artikel, Bibliographie
Liu, Hong ; Zhao, Huan-Yu ; Müller-Plathe, Florian ; Qian, Hu-Jun ; Sun, Zhao-Yan ; Lu, Zhong-Yuan (2018)
Distribution of the Number of Polymer Chains Grafted on Nanoparticles Fabricated by Grafting-to and Grafting-from Procedures.
In: Macromolecules, 51 (10)
doi: 10.1021/acs.macromol.8b00309
Artikel, Bibliographie
Milzetti, Jasmin ; Nayar, Divya ; Vegt, Nico F. A. van der (2018)
Convergence of Kirkwood–Buff Integrals of Ideal and Nonideal Aqueous Solutions Using Molecular Dynamics Simulations.
In: The Journal of Physical Chemistry B, 122 (21)
doi: 10.1021/acs.jpcb.7b11831
Artikel, Bibliographie
Renaud, A. ; Ding, C.-P. ; Jakirlic, S. ; Dreizler, A. ; Böhm, B. (2018)
Experimental characterization of the velocity boundary layer in a motored IC engine.
In: International Journal of Heat and Fluid Flow, 71
doi: 10.1016/j.ijheatfluidflow.2018.04.014
Artikel, Bibliographie
Schmidt, Anna ; Kühnreich, Benjamin ; Kittel, Hannah ; Tropea, Cameron ; Roisman, Ilia V. ; Dreizler, Andreas ; Wagner, Steven (2018)
Laser based measurement of water film thickness for the application in exhaust after-treatment processes.
In: International Journal of Heat and Fluid Flow, 71
doi: 10.1016/j.ijheatfluidflow.2018.04.013
Artikel, Bibliographie
Schneider, Moritz ; Lang, Jens ; Hundsdorfer, Willem (2018)
Extrapolation-based super-convergent implicit-explicit Peer methods with A-stable implicit part.
In: Journal of Computational Physics, 367
doi: 10.1016/j.jcp.2018.04.006
Artikel, Bibliographie
Simon, Bernhard ; Markus, Daniel ; Tropea, Cameron ; Grundmann, Sven (2018)
Cancellation of Tollmien–Schlichting Waves in Direct Vicinity of a Plasma Actuator.
In: AIAA Journal, 56 (5)
doi: 10.2514/1.j056265
Artikel, Bibliographie
Waclawczyk, T. ; Schäfer, M. (2018)
Verification of a binary fluid solidification model using semi-analytical solution of 1D heat diffusion equation.
In: Chemical and Process Engineering-Inzynieria Chemiczna I Procesowa, 39 (1)
doi: 10.24425/119101
Artikel, Bibliographie
Benneckendorf, Frank S. ; Hillebrandt, Sabina ; Ullrich, Florian ; Rohnacher, Valentina ; Hietzschold, Sebastian ; Jänsch, Daniel ; Freudenberg, Jan ; Beck, Sebastian ; Mankel, Eric ; Jaegermann, Wolfram ; Pucci, Annemarie ; Bunz, Uwe H. F. ; Müllen, Klaus (2018)
Structure–Property Relationship of Phenylene-Based Self-Assembled Monolayers for Record Low Work Function of Indium Tin Oxide.
In: The Journal of Physical Chemistry Letters, 9 (13)
doi: 10.1021/acs.jpclett.8b01242
Artikel, Bibliographie
Bibouche, Bachir ; Peral, Daniel ; Stehl, Dmitrij ; Söderholm, Viktor ; Schomäcker, Reinhard ; Klitzing, R. von ; Vogt, Dieter (2018)
Multiphasic aqueous hydroformylation of 1-alkenes with micelle-like polymer particles as phase transfer agents.
In: RSC Advances, 8 (41)
doi: 10.1039/c8ra04022b
Artikel, Bibliographie
Emmert, Johannes ; Blume, Niels Göran ; Dreizler, Andreas ; Wagner, Steven (2018)
Data analysis and uncertainty estimation in supercontinuum laser absorption spectroscopy.
In: Scientific Reports, 8 (1)
doi: 10.1038/s41598-018-28705-2
Artikel, Bibliographie
Thammanna Gurumurthy, Vignesh ; Roisman, Ilia V. ; Tropea, Cameron ; Garoff, Stephen (2018)
Spontaneous rise in open rectangular channels under gravity.
In: Journal of Colloid and Interface Science, 527
doi: 10.1016/j.jcis.2018.05.042
Artikel, Bibliographie
Kittel, Hannah M. ; Roisman, Ilia V. ; Tropea, Cameron (2018)
Splash of a drop impacting onto a solid substrate wetted by a thin film of another liquid.
In: Physical Review Fluids, 3 (7)
doi: 10.1103/PhysRevFluids.3.073601
Artikel, Bibliographie
Kübelbeck, Sonja ; Mikhael, Jules ; Keller, Harald ; Konradi, Rupert ; Andrieu-Brunsen, Annette ; Baier, Grit (2018)
Enzyme-Polymer Conjugates to Enhance Enzyme Shelf Life in a Liquid Detergent Formulation.
In: Macromolecular Bioscience, 18 (7)
doi: 10.1002/mabi.201800095
Artikel, Bibliographie
Kuhnhenn, Maximilian ; Luh, Max F. ; Joensen, Tórstein V. ; Reck, Mads ; Roisman, Ilia V. ; Tropea, Cameron (2018)
Modelling of the breakup process of viscous fluids by a high-speed rotary atomizer.
In: Experiments in Fluids, 59 (7)
doi: 10.1007/s00348-018-2573-5
Artikel, Bibliographie
Reiser, Patrick ; Müller, Lars ; Sivanesan, Vipilan ; Lovrincic, Robert ; Barlow, Stephen ; Marder, Seth R. ; Pucci, Annemarie ; Jaegermann, Wolfram ; Mankel, Eric ; Beck, Sebastian (2018)
Dopant Diffusion in Sequentially Doped Poly(3-hexylthiophene) Studied by Infrared and Photoelectron Spectroscopy.
In: The Journal of Physical Chemistry C, 122 (26)
doi: 10.1021/acs.jpcc.8b02657
Artikel, Bibliographie
Schön, Sebastian ; Klitzing, R. von (2018)
Experimental evaluation of additional short ranged repulsion in structural oscillation forces.
In: Soft Matter, 14 (26)
doi: 10.1039/c8sm00846a
Artikel, Bibliographie
Schuld, Stephan ; Hausbrand, René ; Fingerle, Mathias ; Jaegermann, Wolfram ; Weitzel, Karl-Michael (2018)
Experimental Studies on Work Functions of Li+ Ions and Electrons in the Battery Electrode Material LiCoO2 : A Thermodynamic Cycle Combining Ionic and Electronic Structure.
In: Advanced Energy Materials, 8 (18)
doi: 10.1002/aenm.201703411
Artikel, Bibliographie
Weißheit, Susann ; Kahse, Marie ; Kämpf, Kerstin ; Tietze, Alesia ; Vogel, Michael ; Winter, Roland ; Thiele, Christina Marie (2018)
Elastin-like Peptide in Confinement: FT-IR and NMR T1 Relaxation Data.
In: Zeitschrift für Physikalische Chemie, 232 (7-8)
doi: 10.1515/zpch-2017-1047
Artikel, Bibliographie
Asokan, N. ; Miettinen, Markus (2018)
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications
doi: 10.1016/j.comcom.2018.07.030
Artikel, Bibliographie
Meidinger, Josefine ; Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2018)
Analysis of a Pumped Heat Electricity Storage System with Latent Heat Thermal Energy Storage.
In: Proceedings of ECOS 2018 - 31st International Conference on Efficiency, Cost, Optimization, Simulation and Environmental Impact of Energy Systems, June 17-21, Guimaraes, Portugal
Artikel, Bibliographie
Cordes, U. ; Lambie, B. ; Hufnagel, K. ; Spiegelberg, H. ; Kampers, G. ; Tropea, C. (2018)
The Adaptive Camber Concept - A passive approach for gust load alleviation on wind turbines.
In: Wind Energy, 21 (9)
doi: 10.1002/we.2190
Artikel, Bibliographie
Grebenev, Vladimir N. ; Oberlack, Martin (2018)
Homogeneous Isotropic Turbulence: Geometric and Isometry Properties of the 2-point Velocity Correlation Tensor.
In: Journal of Nonlinear Mathematical Physics, 25 (4)
doi: 10.1080/14029251.2018.1503447
Artikel, Bibliographie
Hellwig, Johannes ; Strebe, Julia ; Klitzing, R. von (2018)
Effect of environmental parameters on the nano mechanical properties of hyaluronic acid/poly(l-lysine) multilayers.
In: Physical Chemistry Chemical Physics, 20 (28)
doi: 10.1039/c8cp02621a
Artikel, Bibliographie
Hieber, Matthias ; Prüss, Jan (2018)
On the bidomain problem with FitzHugh–Nagumo transport.
In: Archiv der Mathematik, 111 (3)
doi: 10.1007/s00013-018-1188-7
Artikel, Bibliographie
Vécsei, Miklós ; Dietzel, Mathias ; Hardt, Steffen (2018)
Interfacial instability of liquid films coating the walls of a parallel-plate channel and sheared by a gas flow.
In: Microfluidics and Nanofluidics, 22 (9)
doi: 10.1007/s10404-018-2111-z
Artikel, Bibliographie
Oltmanns, Johannes ; Freystein, Martin ; Dammel, Frank ; Stephan, Peter (2018)
Improving the operation of a district heating and a district cooling network.
In: Energy Procedia, 149
doi: 10.1016/j.egypro.2018.08.218
Artikel, Bibliographie
Ilgen, Julian ; Kaltschnee, Lukas ; Thiele, Christina M. (2018)
perfect BASH: Band-selective homonuclear decoupling in peptides and peptidomimetics.
In: Magnetic Resonance in Chemistry, 56 (10)
doi: 10.1002/mrc.4757
Artikel, Bibliographie
Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018)
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie
Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018)
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
PST 2018 - 16th Annual Conference on Privacy, Security and Trust. Belfast, Northern Ireland, United Kingdom (28.08.2018-30.08.2018)
Konferenzveröffentlichung, Bibliographie
Pesci, Chiara ; Weiner, Andre ; Marschall, Holger ; Bothe, Dieter (2018)
Computational analysis of single rising bubbles influenced by soluble surfactant.
In: Journal of Fluid Mechanics, 856
doi: 10.1017/jfm.2018.723
Artikel, Bibliographie
Barz, Dominik P. J. ; Scholz, Mathias ; Hardt, Steffen (2018)
Electrokinetic manipulation of the von Kármán vortex street in the wake of a confined cylinder. I. DC electric field.
In: Physics of Fluids, 30 (8)
doi: 10.1063/1.5037595
Artikel, Bibliographie
Lv, Cunjing ; Eigenbrod, Michael ; Hardt, Steffen (2018)
Stability and collapse of holes in liquid layers.
In: Journal of Fluid Mechanics, 855
doi: 10.1017/jfm.2018.680
Artikel, Bibliographie
Sacomano Filho, Fernando Luiz ; Speelman, Nico ; Oijen, Jeroen Adrianus van ; Goey, Laurentius Philippus Hendrika de ; Sadiki, Amsini ; Janicka, J. (2018)
Numerical analyses of laminar flames propagating in droplet mists using detailed and tabulated chemistry.
In: Combustion Theory and Modelling, 22 (5)
doi: 10.1080/13647830.2018.1470332
Artikel, Bibliographie
Straub, Carmen ; Kronenburg, Andreas ; Stein, Oliver T. ; Kuenne, Guido ; Janicka, J. ; Barlow, Robert S. ; Geyer, Dirk (2018)
Multiple mapping conditioning coupled with an artificially thickened flame model for turbulent premixed combustion.
In: Combustion and Flame, 196
doi: 10.1016/j.combustflame.2018.05.021
Artikel, Bibliographie
Wunderer, Thomas (2018)
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Reuter, Christian ; Leopold, Inken (2018)
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1)
Artikel, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2018)
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-mci-0356
Konferenzveröffentlichung, Bibliographie
Scholl, Simon ; Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André (2018)
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-mci-0347
Konferenzveröffentlichung, Bibliographie
Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian
Hrsg.: Dachselt, Raimund ; Weber, Gerhard (2018)
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
Mensch und Computer 2018. Dresden, Germany
doi: 10.18420/muc2018-ws12-0449
Konferenzveröffentlichung, Bibliographie
Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian (2018)
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, 2018 (3)
Artikel, Bibliographie
Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Hrsg.: Ojendal, Joakim ; Swain, Ashok (2018)
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding
Buchkapitel, Bibliographie
Reuter, Christian ; Pottebaum, Jens (2018)
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1)
doi: 10.4018/IJISCRAM.20180101
Artikel, Bibliographie
Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018)
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1)
doi: 10.4018/IJISCRAM.2018010101
Artikel, Bibliographie
Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2018)
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
26th European Conference on Information Systems. Portsmouth, United Kingdom (23.06.2018-28.06.2018)
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Pottebaum, Jens (2018)
International Journal of Information Systems for Crisis Response and Management : Special Issue on IT Support for Crisis and Continuity Management.
10 (1)
Zeitschriftenheft, -band oder -jahrgang, Bibliographie
Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian (2018)
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
International Conference on Information Systems for Crisis Response and Management ISCRAM 2018. Rochester, New York, USA
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2018)
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, 2018 (2)
Artikel, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas (2018)
Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 2018 (1)
Artikel, Bibliographie
Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018)
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4)
doi: 10.1080/10447318.2018.1427833
Artikel, Bibliographie
Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André (2018)
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4)
doi: 10.1080/10447318.2018.1427832
Artikel, Bibliographie
Hrsg.: Reuter, Christian ; Mentler, Tilo (2018)
Journal of Contingencies and Crisis Management : Special Issue:
Human-Computer-Interaction and Social Media in Safety-Critical Systems.
26 (1)
Zeitschriftenheft, -band oder -jahrgang, Bibliographie
Reuter, Christian
Hrsg.: Reuter, Christian (2018)
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_1
Buchkapitel, Bibliographie
Reuter, Christian ; Mentler, Tilo (2018)
Human-computer interaction and social media in safety-critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1)
doi: 10.1111/1468-5973.12192
Artikel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
Hrsg.: Reuter, Christian (2018)
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_28
Buchkapitel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André (2018)
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1)
doi: 10.1111/1468-5973.12196
Artikel, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar
Hrsg.: Reuter, Christian (2018)
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_22
Buchkapitel, Bibliographie
Hrsg.: Reuter, Christian (2018)
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
doi: 10.1007/978-3-658-19523-6
Buch, Bibliographie
Hrsg.: Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018)
International Journal of Human–Computer Interaction : Special Issue:
Social Media in Crisis Management.
34 (4)
Zeitschriftenheft, -band oder -jahrgang, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
Hrsg.: Reuter, Christian (2018)
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_2
Buchkapitel, Bibliographie
Kashiwaya, Shun ; Aymonier, Cyril ; Majimel, Jérôme ; Olivier, Céline ; Klein, Andreas ; Jaegermann, Wolfram ; Toupance, Thierry (2018)
Supercritical CO2-assisted deposition of NiO on (101)-anatase-TiO2 for efficient facet engineered photocatalysts.
In: New Journal of Chemistry, 42 (23)
doi: 10.1039/c8nj04292f
Artikel, Bibliographie
Geihs, Matthias (2018)
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Rieks, Sebastian ; Preußer, Niklas ; Gambaryan-Roisman, Tatiana ; Kenig, Eugeny Y. (2018)
Zero-Gravity Distillation with Metal Foams: A Modelling Approach.
In: CHEMICAL ENGINEERING TRANSACTIONS, 69
doi: 10.3303/CET1869048
Artikel, Bibliographie
Chilukoti, Hari Krishna ; Müller-Plathe, Florian ; Yang, Hua (2018)
Application of Reverse Nonequilibrium Molecular Dynamics to the Calculation of the Mutual Diffusion Coefficient of Alkane Mixtures.
In: The Journal of Physical Chemistry B, 122 (39)
doi: 10.1021/acs.jpcb.8b06886
Artikel, Bibliographie
Eigenbrod, Michael ; Bihler, Florian ; Hardt, Steffen (2018)
Electrokinetics of a particle attached to a fluid interface: Electrophoretic mobility and interfacial deformation.
In: Physical Review Fluids, 3 (10)
doi: 10.1103/PhysRevFluids.3.103701
Artikel, Bibliographie
Hajduk, Andreas ; Lebedev, Mikhail V. ; Kaiser, Bernhard ; Jaegermann, Wolfram (2018)
Interaction of liquid water with the p-GaInP2(100) surface covered with submonolayer oxide.
In: Physical Chemistry Chemical Physics, 20 (32)
doi: 10.1039/c8cp03337d
Artikel, Bibliographie
Heinrich, Arne ; Kuenne, Guido ; Ganter, Sebastian ; Hasse, Christian ; Janicka, J. (2018)
Investigation of the Turbulent Near Wall Flame Behavior for a Sidewall Quenching Burner by Means of a Large Eddy Simulation and Tabulated Chemistry.
In: Fluids, 3 (3)
doi: 10.3390/fluids3030065
Artikel, Bibliographie
Jeziorowski, Sharon ; Thiele, Christina M. (2018)
Poly-γ-p -Biphenylmethyl-Glutamate as Enantiodifferentiating Alignment Medium for NMR Spectroscopy with Temperature-Tunable Properties.
In: Chemistry - A European Journal, 24 (58)
doi: 10.1002/chem.201802921
Artikel, Bibliographie
Lang, Jens ; Mindt, Pascal (2018)
Entropy-preserving coupling conditions for one-dimensional Euler systems at junctions.
In: Networks & Heterogeneous Media, 13 (1)
doi: 10.3934/nhm.2018008
Artikel, Bibliographie
Löhmann, Oliver ; Zerball, Maximilian ; Klitzing, R. von (2018)
Water Uptake of Polyelectrolyte Multilayers Including Water Condensation in Voids.
In: Langmuir, 34 (38)
doi: 10.1021/acs.langmuir.8b02258
Artikel, Bibliographie
Sadeghi, H. ; Oberlack, Martin ; Gauding, M. (2018)
On new scaling laws in a temporally evolving turbulent plane jet using Lie symmetry analysis and direct numerical simulation.
In: Journal of Fluid Mechanics, 854
doi: 10.1017/jfm.2018.625
Artikel, Bibliographie
Schön, Sebastian ; Richter, Marcel ; Witt, Marcus ; Klitzing, R. von (2018)
Externally Triggered Oscillatory Structural Forces.
In: Langmuir, 34 (38)
doi: 10.1021/acs.langmuir.8b02284
Artikel, Bibliographie
Schwab, Mira ; Schmidts, Volker ; Thiele, Christina M. (2018)
Thermoresponsive Alignment Media in NMR Spectroscopy: Helix Reversal of a Copolyaspartate at Ambient Temperatures.
In: Chemistry - A European Journal, 24 (54)
doi: 10.1002/chem.201803540
Artikel, Bibliographie
Shamooni, Ali ; Cuoci, Alberto ; Faravelli, Tiziano ; Sadiki, Amsini (2018)
Prediction of Combustion and Heat Release Rates in Non-Premixed Syngas Jet Flames Using Finite-Rate Scale Similarity Based Combustion Models.
In: Energies, 11 (9)
doi: 10.3390/en11092464
Artikel, Bibliographie
Daikeler, Alexander ; Ströhle, Jochen ; Epple, Bernd (2018)
Experimental Flow Structure Analysis in a 1 MWth Circulating Fluidized Bed Pilot Plant.
In: Chemical Engineering Science
doi: 10.1016/j.ces.2018.10.037
Artikel, Bibliographie
Wellert, Stefan ; Hübner, Jessica ; Boyaciyan, Dikran ; Ivanova, Oxana ; Klitzing, R. von ; Soltwedel, Olaf ; Holderer, Olaf (2018)
A grazing incidence neutron spin echo study of near surface dynamics in p(MEO2MA-co-OEGMA) copolymer brushes.
In: Colloid and Polymer Science, 296 (12)
doi: 10.1007/s00396-018-4421-9
Artikel, Bibliographie
Ries, F. ; Nishad, K. ; Dressler, L. ; Janicka, J. ; Sadiki, A. (2018)
Evaluating large eddy simulation results based on error analysis.
In: Theoretical and Computational Fluid Dynamics, 32 (6)
doi: 10.1007/s00162-018-0474-0
Artikel, Bibliographie
Eslami, Hossein ; Sedaghat, Parvin ; Müller-Plathe, Florian (2018)
Local bond order parameters for accurate determination of crystal structures in two and three dimensions.
In: Physical Chemistry Chemical Physics, 20 (42)
doi: 10.1039/c8cp05248d
Artikel, Bibliographie
Lohaus, Christian ; Klein, Andreas ; Jaegermann, Wolfram (2018)
Author Correction: Limitation of Fermi level shifts by polaron defect states in hematite photoelectrodes.
In: Nature Communications, 9 (1)
doi: 10.1038/s41467-018-07410-8
Artikel, Bibliographie
Lv, Cunjing ; Varanakkottu, Subramanyan Namboodiri ; Baier, Tobias ; Hardt, Steffen (2018)
Controlling the Trajectories of Nano/Micro Particles Using Light-Actuated Marangoni Flow.
In: Nano Letters, 18 (11)
doi: 10.1021/acs.nanolett.8b02814
Artikel, Bibliographie
Lamanna, Grazia ; Steinhausen, Christoph ; Weigand, Bernhard ; Preusche, Andreas ; Bork, Benjamin ; Dreizler, Andreas ; Stierle, Rolf ; Groß, Joachim (2018)
On the importance of non-equilibrium models for describing the coupling of heat and mass transfer at high pressure.
In: International Communications in Heat and Mass Transfer, 98
doi: 10.1016/j.icheatmasstransfer.2018.07.012
Artikel, Bibliographie
Ponce, Sebastian ; Christians, Hauke ; Drochner, Alfons ; Etzold, Bastian J. M. (2018)
An Optical Microreactor Enabling In Situ Spectroscopy Combined with Fast Gas-Liquid Mass Transfer.
In: Chemie Ingenieur Technik, 90 (11)
doi: 10.1002/cite.201800061
Artikel, Bibliographie
Bakhshandeh Chamazkoti, Rohollah ; Oberlack, Martin (2018)
Geometry of two-point velocity correlation tensor of homogeneous isotropic turbulence with helicity in sol-manifold coordinates.
In: Journal of Mathematical Physics, 59 (10)
doi: 10.1063/1.5048802
Artikel, Bibliographie
Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018)
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), 27 (3)
doi: 10.1111/1468-5973.12249
Artikel, Bibliographie
Stroh, Alexander ; Daikeler, Alexander ; Nikku, Markku ; May, Jan ; Alobaid, Falah ; Bohnstein, Maximilian von ; Ströhle, Jochen ; Epple, Bernd (2018)
Coarse grain 3D CFD-DEM simulation and validation with capacitance probe measurements in a circulating fluidized bed.
In: Chemical Engineering Science, 196
doi: 10.1016/j.ces.2018.11.052
Artikel, Bibliographie
Sielaff, Axel ; Gowik, M. ; Völzel, C. ; Rosengarten, G. ; Rajic, N. ; Stephan, Peter (2018)
Temperature measurement using infrared thermometry within semi-transparent media.
In: Experimental Heat Transfer
doi: 10.1080/08916152.2018.1549622
Artikel, Bibliographie
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018)
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197
Artikel, Bibliographie
Ibrahim, Ahmad (2018)
Securing Embedded Networks Through Secure Collective Attestation.
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018. New York, NY, USA
doi: 10.1145/3212711.3212712
Konferenzveröffentlichung, Bibliographie
Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018)
The Future of IoT Security: Special Session.
International Conference on Embedded Software (EMSOFT 2018), 2018. Piscataway, NJ, USA
Konferenzveröffentlichung, Bibliographie
Fricke, Mathis ; Köhne, Matthias ; Bothe, Dieter (2018)
On the Kinematics of Contact Line Motion.
In: PAMM, 18 (1)
doi: 10.1002/pamm.201800451
Artikel, Bibliographie
Deichmann, Gregor ; Vegt, Nico F. A. van der (2018)
Bottom-up approach to represent dynamic properties in coarse-grained molecular simulations.
In: The Journal of Chemical Physics, 149 (24)
doi: 10.1063/1.5064369
Artikel, Bibliographie
Kyrey, Tetyana ; Ganeva, Marina ; Gawlitza, Kornelia ; Witte, Judith ; Klitzing, R. von ; Soltwedel, Olaf ; Di, Zhenyu ; Wellert, Stefan ; Holderer, Olaf (2018)
Grazing incidence SANS and reflectometry combined with simulation of adsorbed microgel particles.
In: Physica B: Condensed Matter, 551
doi: 10.1016/j.physb.2018.03.049
Artikel, Bibliographie
Wester, T. T. B. ; Kampers, G. ; Gülker, G. ; Peinke, J. ; Cordes, U. ; Tropea, C. ; Hölling, M. (2018)
High speed PIV measurements of an adaptive camber airfoil under highly gusty inflow conditions.
In: Journal of Physics: Conference Series, 1037 (7)
doi: 10.1088/1742-6596/1037/7/072007
Artikel, Bibliographie
Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018)
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11)
Artikel, Bibliographie
Renaud, Karen ; Zimmermann, Verena (2018)
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), 120
doi: 10.1016/j.ijhcs.2018.05.011
Artikel, Bibliographie
Zimmermann, Verena ; Bennighof, Merve ; Edel, Miriam ; Hofmann, Oliver ; Jung, Judith ; Wick, Melina von
Hrsg.: Dachselt, R. ; Weber, G. (2018)
‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes.
Mensch und Computer. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws08-0539
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Zimmermann, Verena (2018)
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP)
doi: 10.1017/bpp.2018.3
Artikel, Bibliographie
Gründing, Dirk ; Bothe, Dieter ; Marschall, Holger (2018)
Wetting phenomena with ALE interface tracking.
In: PAMM, 18 (1)
doi: 10.1002/pamm.201800430
Artikel, Bibliographie
Ohlemüller, Peter ; Alobaid, Falah ; Abad, Alberto ; Adanez, Juan ; Ströhle, Jochen ; Epple, Bernd (2018)
Development and validation of a 1D process model with autothermal operation of a 1 MW th chemical looping pilot plant.
In: International Journal of Greenhouse Gas Control, 73
doi: 10.1016/j.ijggc.2018.03.013
Artikel, Bibliographie
Demmler, Daniel (2018)
Towards Practical Privacy-Preserving Protocols.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus
Hrsg.: Wiemeyer, Josef (2018)
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt
Buchkapitel, Bibliographie
Gerlach, Felix ; Garoff, Stephen ; Tropea, Cameron (2018)
Quantitative optical measurement of contact lines on milliscale metal
structures dipped into a liquid pool.
19th International Symposium on Application of Laser and Imaging Techniques to Fluid Mechanics. Lisbon (16.07.2018-19.07.2018)
Konferenzveröffentlichung, Bibliographie
Geyer, Florian ; D'Acunzi, Maria ; Yang, Ching-Yu ; Müller, Michael ; Baumli, Philipp ; Kaltbeitzel, Anke ; Mailänder, Volker ; Encinas, Noemí ; Vollmer, Doris ; Butt, Hans-Jürgen (2018)
How to Coat the Inside of Narrow and Long Tubes with a Super-Liquid-Repellent Layer-A Promising Candidate for Antibacterial Catheters.
In: Advanced Materials, 31 (2)
doi: 10.1002/adma.201801324
Artikel, Bibliographie
Vinther, Frank ; Joensen, Tórstein Vincent ; Kuhnhenn, Maximilian ; Reck, Mads ; Tropea, Cameron (2018)
Rotary Wheel Atomizer Study Using Computational Fluid Dynamics and Full-Scale Testing.
IDS'2018 – 21st International Drying Symposium. València (11.09.2018-14.09.2018)
doi: 10.4995/ids2018.2018.8374
Konferenzveröffentlichung, Bibliographie
Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018)
Removing the Bottleneck for Practical 2PC.
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3278521
Konferenzveröffentlichung, Bibliographie
Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018)
Off-path Attacks Against PKI.
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3278516
Konferenzveröffentlichung, Bibliographie
Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018)
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
HotNets'18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (15.11.2018-16.11.2018)
doi: 10.1145/3286062.3286071
Konferenzveröffentlichung, Bibliographie
Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018)
Internet As a Source of Randomness.
HotNets '18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (15.11.2018-16.11.2018)
doi: 10.1145/3286062.3286072
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Henhapl, Birgit ; Gerber, Nina
Hrsg.: Dachselt, Raimund ; Weber, Gerhard (2018)
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
doi: 10.18420/muc2018-ws08-0542
Konferenzveröffentlichung, Bibliographie
Karegar, Farzaneh ; Gerber, Nina ; Volkamer, Melanie ; Fischer-Hübner, Simone (2018)
Helping john to make informed decisions on using social login.
doi: 10.1145/3167132.3167259
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; Gerber, Paul ; Volkamer, Melanie (2018)
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior.
In: Computers & Security, 77 (1)
doi: 10.1016/j.cose.2018.04.002
Artikel, Bibliographie
Kulyk, Oksana ; Hilt, Annika ; Gerber, Nina ; Volkamer, Melanie (2018)
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer.
Konferenzveröffentlichung, Bibliographie
Fladung, Lukas (2017)
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Deller, Yannick (2017)
Zweidimensionale Surface-Kodes und ihre Anwendungen.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Neumann, Klara Maria (2017)
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Schürl, Stefan (2017)
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Muneeb, Ahmed (2017)
mproving a Linux Device Driver for Visible Light Communication.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Ay, Serafettin (2017)
Detecting WiFi Covert Channels.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Yuan, Yimin (2017)
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos Athanasios ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan (2017)
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
27th Crypto-Day. Frankfurt (Oder), Germany (07.12.2017-08.12.2017)
doi: 10.13140/RG.2.2.33800.52483
Konferenzveröffentlichung, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017)
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
27th Crypto-Day. Frankfurt (Oder), Germany (07.12.2017-08.12.2017)
doi: 10.13140/RG.2.2.25411.91689
Konferenzveröffentlichung, Bibliographie
Singh, Govind (2017)
o Static Bug Finders Identify API Misuses?
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Kübler, Florian (2017)
Foundations of a refinement-based framework for escape analyses.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017. Hong Kong, China (03.12.2017-07.12.2017)
doi: 10.1007/978-3-319-70697-9_16
Konferenzveröffentlichung, Bibliographie
Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17). Incheon Republic of Korea (12.12.2017-15.12.2017)
doi: 10.1145/3143361.3143362
Konferenzveröffentlichung, Bibliographie
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017)
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017. London, United Kingdom (04.12.2017-07.12.2017)
Konferenzveröffentlichung, Bibliographie
Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017)
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Konferenzveröffentlichung, Bibliographie
Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017)
I Trust my Zombies: a Trust-enabled Botnet.
London, UK
Konferenzveröffentlichung, Bibliographie
Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias (2017)
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies.
doi: 10.1145/3143361.3143384
Konferenzveröffentlichung, Bibliographie
Müller, Patrick (2017)
Reconstruction of Obfuscated Strings.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. (2017)
Oblivious Neural Network Predictions via MiniONN Transformations.
doi: 10.1145/3133956.3134056
Konferenzveröffentlichung, Bibliographie
Sarangdhar, Ravi (2017)
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017)
CogniCrypt: Supporting Developers in using Cryptography.
Automated Software Engineering (ASE'17). Urbana, Illinois, USA (30.10.2017-03.11.2017)
doi: 10.1109/ASE.2017.8115707
Konferenzveröffentlichung, Bibliographie
Jauernig, Patrick Thomas (2017)
SMOV: Lighweight In-Process Memory Isolation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Afridi, Hassaan Ali Khan (2017)
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Wainakh, Aidmar (2017)
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017)
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
Irvine, California, US
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17). Hong Kong (30.11.2017-02.12.2017)
Konferenzveröffentlichung, Bibliographie
Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
JITGuard: Hardening Just-in-time Compilers with SGX.
Dallas, TX, USA
doi: 10.1145/3133956.3134037
Konferenzveröffentlichung, Bibliographie
Kummer, Florian (2017)
High-fidelity droplet and bubble simulations using local enrichment.
70th Annual Meeting of the APS Division of Fluid Dynamics. Denver, Colorado (19.11.2017-21.11.2017)
Konferenzveröffentlichung, Bibliographie
Lass, Oliver ; Ulbrich, Stefan (2017)
Model Order Reduction Techniques with a Posteriori Error Control for Nonlinear Robust Optimization Governed by Partial Differential Equations.
In: SIAM Journal on Scientific Computing, 39 (5)
doi: 10.1137/16m108269x
Artikel, Bibliographie
Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. (2017)
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
doi: 10.1109/TC.2017.2703808
Konferenzveröffentlichung, Bibliographie
Sitnikov, Konstantin (2017)
A Survey on Post-Quantum Key Exchange.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Kornhuber, Tim (2017)
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Kümpel, Michael (2017)
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Chauhan, Prankur (2017)
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017)
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
Konferenzveröffentlichung, Bibliographie
Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias (2017)
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization. Snowbird, Utah, USA (20.10.2017-20.10.2017)
Konferenzveröffentlichung, Bibliographie
Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
Konferenzveröffentlichung, Bibliographie
Böck, Leon (2017)
On P2P botnet monitoring in adverse conditions.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017)
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017)
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Lucca, Italy (08.10.2017-13.10.2017)
doi: 10.1007/978-3-319-99843-5_10
Konferenzveröffentlichung, Bibliographie
Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017)
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
Snowbird, Utah, USA
doi: 10.1145/3130242.3130244
Konferenzveröffentlichung, Bibliographie
Schreiber, Johannes (2017)
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017)
Password Assistance.
Karlstad, Sweden
Konferenzveröffentlichung, Bibliographie
Späth, Johannes ; Ali, Karim ; Bodden, Eric (2017)
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Maguire, Joseph ; Zimmermann, Verena ; Draper, Steve (2017)
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
Learning from Authoritative Security Experiment Results (LASER). Arlington, VA, USA (18.10.2017-19.10.2017)
Konferenzveröffentlichung, Bibliographie
Wiegärtner, Daniel ; Reuter, Christian ; Müller, Claudia
Hrsg.: Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (2017)
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
Mensch und Computer 2017. Regensburg, Germany (10.09.2017-13.09.2017)
doi: 10.18420/muc2017-ws17-0416
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Klös, Jonas
Hrsg.: Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (2017)
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
Mensch & Computer 2017. Regensburg, Germany (10.09.2017-13.09.2017)
doi: 10.18420/muc2017-ws01-0384
Konferenzveröffentlichung, Bibliographie
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017)
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering.
doi: 10.1145/3106237.3106305
Konferenzveröffentlichung, Bibliographie
Holl, M. ; Rausch, L. ; Pelz, P. F. (2017)
New methods for new systems – How to find the techno-economically optimal hydrogen conversion system.
In: International Journal of Hydrogen Energy, 42 (36)
doi: 10.1016/j.ijhydene.2017.07.061
Artikel, Bibliographie
Zimmermann, Verena ; Henhapl, Birgit ; Gerber, Nina ; Enzmann, Matthias
Hrsg.: Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (2017)
Promoting secure Email communication and authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren
doi: 10.18420/muc2017-ws05-0404
Buchkapitel, Bibliographie
Gerber, Nina ; Zimmermann, Verena
Hrsg.: Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (2017)
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Regensburg, Germany
doi: 10.18420/muc2017-ws05-0405
Konferenzveröffentlichung, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc
Hrsg.: Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (2017)
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings
doi: 10.1007/978-3-319-66402-6
Buchkapitel, Bibliographie
Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017)
Constrained PET Composition for Measuring Enforced Privacy.
doi: 10.1145/3098954.3098968
Konferenzveröffentlichung, Bibliographie
Karuppayah, Shankar ; Böck, Leon ; Grube, Tim ; Manickam, Selvakumar ; Mühlhäuser, Max ; Fischer, Mathias (2017)
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
Reggio Calabria, Italy
doi: 10.1145/3098954.3098991
Konferenzveröffentlichung, Bibliographie
Whitefield, Jorden ; Chen, Liqun ; Kargl, Frank ; Paverd, Andrew ; Schneider, Steve ; Treharne, Helen ; Wesemeyer, Stephan (2017)
Formal Analysis of V2X Revocation Protocols.
doi: 10.1007/978-3-319-68063-7_10
Konferenzveröffentlichung, Bibliographie
Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017)
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Atlanta, Georgia, USA
Konferenzveröffentlichung, Bibliographie
Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Cover Traffic: A Trade of Anonymity and Efficiency.
13th International Workshop on Security and Trust Management. Oslo, Norway
doi: 10.1007/978-3-319-68063-7_15
Konferenzveröffentlichung, Bibliographie
Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017)
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
Konferenzveröffentlichung, Bibliographie
Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017)
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1)
doi: 10.1109/COMST.2017.2748278
Artikel, Bibliographie
Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017)
Using Oblivious RAM in Genomic Studies.
Oslo, Norway
Konferenzveröffentlichung, Bibliographie
Tkachenko, Oleksandr (2017)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Thankamony, Aany Sofia Lilly ; Knoche, Stefan ; Bothe, Sarah ; Drochner, Alfons ; Jagtap, Anil P. ; Sigurdsson, Snorri Th. ; Vogel, Herbert ; Etzold, Bastian J. M. ; Gutmann, Torsten ; Buntkowsky, Gerd (2017)
Characterization of V–Mo–W Mixed Oxide Catalyst Surface Species by 51V Solid-State Dynamic Nuclear Polarization NMR.
In: The Journal of Physical Chemistry C, 121 (38)
doi: 10.1021/acs.jpcc.7b06761
Artikel, Bibliographie
Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2017)
Thin liquid films with time-dependent chemical reactions sheared by an ambient gas flow.
In: Physical Review Fluids, 2 (8)
Artikel, Bibliographie
Cremer, Manuel (2017)
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017)
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST). Calgary, Canada (28.08.2017-30.08.2017)
doi: 10.1109/pst.2017.00040
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Konferenzveröffentlichung, Bibliographie
Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017)
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151325
Artikel, Bibliographie
Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017)
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15
Artikel, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Hrsg.: Katz, Jonathan ; Shacham, Hovav (2017)
PRF-ODH: Relations, Instantiations, and Impossibility Results.
Santa Barbara, CA, USA
Konferenzveröffentlichung, Bibliographie
Butin, Denis (2017)
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151334
Artikel, Bibliographie
Günther, Felix ; Mazaheri, Sogol (2017)
A Formal Treatment of Multi-key Channels.
Santa Barbara, CA, USA
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017)
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
Sydney, Australia (01.08.2017-04.08.2017)
doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.283
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017)
MCMix: Anonymous Messaging via Secure Multiparty Computation.
Vancouver, BC, Canada (16.08.2018-18.08.2018)
Konferenzveröffentlichung, Bibliographie
Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan (2017)
Microblogging in a Privacy-Preserving way.
Reggio Calabria, Italy
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017)
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
26th USENIX Security Symposium. Vancouver, Canada (16.08.2017-18.08.2017)
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017)
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.285
Konferenzveröffentlichung, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017)
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
doi: 10.1145/3098954.3098990
Konferenzveröffentlichung, Bibliographie
Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017)
Reliable Behavioural Factors in the Information Security Context.
doi: 10.1145/3098954.3098986
Konferenzveröffentlichung, Bibliographie
Nauth, Julian (2017)
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Knoche, Stefan ; Heid, Maurice ; Gora, Niklas ; Ohlig, Dominik ; Drochner, Alfons ; Vogel, Herbert ; Etzold, Bastian J. M. (2017)
Activity Hysteresis during Cyclic Temperature-Programmed Reactions in the Partial Oxidation of Acrolein to Acrylic Acid.
In: Chemical Engineering & Technology, 40 (11)
doi: 10.1002/ceat.201700111
Artikel, Bibliographie
Büscher, Niklas ; Katzenbeisser, Stefan (2017)
Compilation for Secure Multi-party Computation.
Buch, Bibliographie
Reuter, Christian ; Pätsch, Katja ; Runft, Elena (2017)
IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, 16 (2)
doi: 10.1515/icom-2017-0013
Artikel, Bibliographie
Ariyanto, Teguh ; Kern, Andreas M. ; Etzold, Bastian J. M. ; Zhang, Gui-Rong (2017)
Carbide-derived carbon with hollow core structure and its performance as catalyst support for methanol electro-oxidation.
In: Electrochemistry Communications, 82
doi: 10.1016/j.elecom.2017.07.010
Artikel, Bibliographie
Kommoß, Björn ; Klemenz, Sebastian ; Schmitt, Fabian ; Hocke, Elisabeth ; Vogel, Kevin ; Drochner, Alfons ; Albert, Barbara ; Etzold, Bastian ; Vogel, Herbert G. (2017)
Heterogeneously Catalyzed Hydrogenation of Supercritical CO2 to Methanol.
In: Chemical Engineering & Technology, 40 (10)
doi: 10.1002/ceat.201600400
Artikel, Bibliographie
Haaf, Martin ; Stroh, Alexander ; Hilz, Jochen ; Helbig, Martin ; Ströhle, Jochen ; Epple, Bernd (2017)
Process Modelling of the Calcium Looping Process and Validation Against 1 MWth Pilot Testing.
In: Energy Procedia, 114
doi: 10.1016/j.egypro.2017.03.1159
Artikel, Bibliographie
Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017)
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
doi: 10.1007/978-3-319-58460-7_46
Konferenzveröffentlichung, Bibliographie
Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017)
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Minneapolis, USA
doi: 10.1515/popets-2017-0030
Konferenzveröffentlichung, Bibliographie
Nguyen Quang Do, Lisa ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017)
Just-in-Time Static Analysis.
Santa Barbara, California, United States
doi: 10.1145/3092703.3092705
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017)
Update-tolerant and Revocable Password Backup.
Auckland, New Zealand
Konferenzveröffentlichung, Bibliographie
Langfeld, Benedikt (2017)
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017)
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Konferenzveröffentlichung, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017)
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day. Nürnberg, Germany (01.06.2017-02.06.2017)
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17). Kanazawa, Japan (10.07.2017-12.07.2017)
doi: 10.1007/978-3-319-61204-1_30
Konferenzveröffentlichung, Bibliographie
Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Commitments via Extractable-Binding Commitments.
Auckland, New Zealand
Konferenzveröffentlichung, Bibliographie
Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Konferenzveröffentlichung, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017)
SeED: Secure Non-Interactive Attestation for Embedded Devices.
Boston, USA
Konferenzveröffentlichung, Bibliographie
Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017)
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4)
doi: 10.1515/popets-2017-0044
Artikel, Bibliographie
Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Artikel, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017)
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3)
doi: 10.1007/s00145-016-9236-6
Artikel, Bibliographie
Bugge, Sebastian (2017)
Solving Learning With Errors Instances Using Quantum Reductions.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Schulz, Matthias ; Gringoli, Francesco ; Koch, Michael ; Steinmetzer, Daniel ; Hollick, Matthias (2017)
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017). Boston, USA (18.07.2017-20.07.2017)
doi: 10.1145/3098243.3098253
Konferenzveröffentlichung, Bibliographie
Schulz, Matthias ; Hollick, Matthias ; Gringoli, Francesco ; Deligeorgopoulos, Efstathios (2017)
DEMO: Demonstrating Reactive Smartphone-Based Jamming.
doi: 10.1145/3098243.3106022
Konferenzveröffentlichung, Bibliographie
Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017)
Redactable Graph Hashing, Revisited.
Konferenzveröffentlichung, Bibliographie
Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017)
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Vancouver, Canada
doi: 10.1007/978-3-319-58460-7
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena ; Gerber, Nina
Hrsg.: Tryfonas, Theo (2017)
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS). Vancouver, BC, Canada (04.07.2017-09.07.2017)
Konferenzveröffentlichung, Bibliographie
Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017)
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
Konferenzveröffentlichung, Bibliographie
Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017)
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615)
Artikel, Bibliographie
Korepanov, Vitaly I. ; Hamaguchi, Hiro-o ; Osawa, Eiji ; Ermolenkov, Vladimir ; Lednev, Igor K. ; Etzold, Bastian J. M. ; Levinson, Olga ; Zousman, Boris ; Epperla, Chandra Prakash ; Chang, Huan-Cheng (2017)
Carbon structure in nanodiamonds elucidated from Raman spectroscopy.
In: Carbon, 121
doi: 10.1016/j.carbon.2017.06.012
Artikel, Bibliographie
Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17).
Konferenzveröffentlichung, Bibliographie
Billes, Marina ; Møller, Anders ; Pradel, Michael (2017)
Systematic Black-Box Analysis of Collaborative Web Applications.
Barcelona, Spain
doi: 10.1145/3062341.3062363
Konferenzveröffentlichung, Bibliographie
Funke, Sebastian
Hrsg.: Daubert, Jörg (2017)
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Konferenzveröffentlichung, Bibliographie
Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017)
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Konferenzveröffentlichung, Bibliographie
Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017)
ORAMs in a Quantum World.
Utrecht, The Netherlands
Konferenzveröffentlichung, Bibliographie
Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017)
A lightweight protocol for privacy preserving division.
Valencia Spain
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Atlanta, GA, USA
doi: 10.1109/ICDCS.2017.284
Konferenzveröffentlichung, Bibliographie
Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017)
Revisiting TESLA in the quantum random oracle model.
Utrecht, the Netherlands
Konferenzveröffentlichung, Bibliographie
Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017)
Transitioning to a Quantum-Resistant Public Key Infrastructure.
Utrecht, the Netherlands
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017)
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
doi: 10.1109/ICDCS.2017.283
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017)
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3)
doi: 10.1109/MSP.2017.70
Artikel, Bibliographie
Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017)
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
Denver, CO, USA
Konferenzveröffentlichung, Bibliographie
Fenner, Andreas ; Stephan, Peter (2017)
Two dye combinations suitable for two‐color/two‐dye laser‐induced fluorescence thermography for ethanol.
In: Experiments in Fluids, 58 (6)
Artikel, Bibliographie
Gielok, Martin ; Lopes, Marcus ; Bonaccurso, Elmar ; Gambaryan-Roisman, Tatiana (2017)
Droplet on an elastic substrate: Finite Element Method coupled with lubrication approximation.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 521
doi: 10.1016/j.colsurfa.2016.08.001
Artikel, Bibliographie
Kumar, Abhijeet ; Dahl, Verena ; Kleinen, Jochen ; Gambaryan-Roisman, Tatiana ; Venzmer, Joachim (2017)
Influence of lipid bilayer phase behavior and substrate roughness on the pathways of intact vesicle deposition: A streaming potential study.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 521
doi: 10.1016/j.colsurfa.2016.07.066
Artikel, Bibliographie
Alam, Ehsanul ; Yadav, S. ; Schneider, J. ; Gambaryan-Roisman, Tatiana (2017)
Imbibition of water into substrates prepared by thermal treatment of polydimethylsiloxane layers.
In: Colloids and Surfaces a-Physicochemical and Engineering Aspects, 521
Artikel, Bibliographie
Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max
Hrsg.: Steghöfer, Jan-Philipp ; Esfandiari, Babak (2017)
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
11th International Conference on Trust Management (IFIPTM 2017). Gothenburg, Sweden (12.06.2017-16.06.2017)
doi: 10.1007/978-3-319-59171-1_8
Konferenzveröffentlichung, Bibliographie
Werschnik, Holger ; Steinhausen, Christoph ; Schiffer, Heinz-Peter (2017)
Robustness of a Turbine Endwall Film Cooling Design to Swirling Combustor Inflow.
In: Journal of Propulsion and Power, 33 (4)
doi: 10.2514/1.B36138
Artikel, Bibliographie
Krause, Dennis ; Kummer, Florian (2017)
An incompressible immersed boundary solver for moving body flows using a cut cell discontinuous Galerkin method.
In: Computers & Fluids, 153
doi: 10.1016/j.compfluid.2017.05.008
Artikel, Bibliographie
Oltmanns, Johannes ; Dammel, Frank ; Stephan, Peter (2017)
Modeling the heat supply system of TU Darmstadt Campus Lichtwiese.
30th International Conference on Efficiency, Cost, Optimization, Simulation and Environmental Impact of Energy Systems (ECOS 2017). San Diego, USA (02.07.2017-06.07.2017)
Konferenzveröffentlichung, Bibliographie
Ulbrich, Stefan ; Ziems, Jan Carsten (2017)
Adaptive multilevel trust-region methods for time-dependent PDE-constrained optimization.
In: Portugaliae Mathematica, 74 (1)
doi: 10.4171/PM/1992
Artikel, Bibliographie
Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira (2017)
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
San Jose, CA, USA
Konferenzveröffentlichung, Bibliographie
Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. (2017)
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
Denver, CO, USA
doi: 10.1145/3025453.3025808
Konferenzveröffentlichung, Bibliographie
Nguyen Quang Do, Lisa ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017)
Cheetah: Just-in-Time Taint Analysis for Android Apps.
Buenos Aires, Argentina
doi: 10.1109/ICSE-C.2017.20
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017)
Election-Dependent Security Evaluation of Internet Voting Schemes.
Rome, Italy
doi: 10.1007/978-3-319-58469-0_25
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017)
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
doi: 10.1088/2058-9565/aa69cd
Artikel, Bibliographie
Bindel, Nina (2017)
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Konferenzveröffentlichung, Bibliographie
Schmitz, Martin ; Steimle, Jürgen ; Huber, Jochen ; Dezfuli, Niloofar ; Mühlhäuser, Max (2017)
Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens.
Denver, Colorado, USA
doi: 10.1145/3025453.3025663
Konferenzveröffentlichung, Bibliographie
Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017)
Internet-Wide Study of DNS Cache Injections.
Atlanta, GA, USA
Konferenzveröffentlichung, Bibliographie
Böhm, A. ; Biesalski, M. (2017)
Paper-based microfluidic devices: A complex low-cost material in high-tech applications.
In: MRS Bulletin, 42 (05)
doi: 10.1557/mrs.2017.92
Artikel, Bibliographie
Baier, Tobias ; Hardt, Steffen ; Shahabi, Vahid ; Roohi, Ehsan (2017)
Knudsen pump inspired by Crookes radiometer with a specular wall.
In: Physical Review Fluids, 2 (3)
doi: 10.1103/PhysRevFluids.2.033401
Artikel, Bibliographie
Trautmann, N. ; Ferenczi, Gergely ; Croke, Sarah ; Barnett, Stephen (2017)
Holographic quantum imaging: reconstructing spatial properties via two-particle interference.
In: Journal of Optics, 19 (5)
doi: 10.1088/2040-8986/aa67b6
Artikel, Bibliographie
Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017)
A Practical Multivariate Blind Signature Scheme.
Malta
Konferenzveröffentlichung, Bibliographie
Mayer, Peter ; Volkamer, Melanie (2017)
Poster: Secure Storage of Masked Passwords.
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017)
Enabling Vote Delegation in Boardroom Voting.
Konferenzveröffentlichung, Bibliographie
Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit (2017)
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41
Artikel, Bibliographie
Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. (2017)
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
doi: 10.1145/3052973.3053006
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Günther, Felix (2017)
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Paris, France
Konferenzveröffentlichung, Bibliographie
Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017)
0-RTT Key Exchange with Full Forward Secrecy.
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017)
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
ASIA CCS '17. Abu Dhabi, UAE (02.04.2017-06.04.2017)
doi: 10.1145/3052973.3053043
Konferenzveröffentlichung, Bibliographie
Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017)
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17). Abu Dhabi United Arab Emirates (02.04.2017-06.04.2017)
doi: 10.1145/3052973.3053025
Konferenzveröffentlichung, Bibliographie
Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017)
Secure Multiparty Computation from SGX.
Konferenzveröffentlichung, Bibliographie
Alexopoulos, Nikolaos (2017)
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Marrakech, Morocco (03.04.2017-06.04.2017)
doi: 10.1145/3019612.3019921
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017)
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
Rabat, Morocco
Konferenzveröffentlichung, Bibliographie
Marson, Giorgia Azzurra ; Poettering, Bertram (2017)
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1)
doi: 10.13154/tosc.v2017.i1.405-426
Artikel, Bibliographie
Holzer, Patrick (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Müller, Björn ; Krämer-Eis, Stephan ; Kummer, Florian ; Oberlack, Martin (2017)
A high-order Discontinuous Galerkin method for compressible flows with immersed boundaries.
In: International Journal for Numerical Methods in Engineering, 110 (1)
doi: 10.1002/nme.5343
Artikel, Bibliographie
Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2017)
A Parallel Variant of LDSieve for the SVP on Lattices.
2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).
doi: 10.1109/PDP.2017.60
Konferenzveröffentlichung, Bibliographie
Dayal, Ram ; Gambaryan-Roisman, Tatiana (2017)
Heat transfer in granular medium for application to selective laser melting: A numerical study.
In: International Journal of Thermal Sciences, 113
Artikel, Bibliographie
Shulman, Haya ; Waidner, Michael (2017)
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
Boston, MA, USA
Konferenzveröffentlichung, Bibliographie
Schurig, Sebastian (2017)
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colonies for Efficient and Anonymous Group Communication Systems.
doi: 10.1109/NetSys.2017.7903958
Konferenzveröffentlichung, Bibliographie
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017)
An Experimental Study of a Bucketing Approach.
Uppsala, Sweden
Konferenzveröffentlichung, Bibliographie
Toteva, Iva (2017)
Advancing Tool Support for the Detection of Side-Channel.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Günther, Felix ; Poettering, Bertram (2017)
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3)
Artikel, Bibliographie
Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017)
Slow TCAM Exhaustion DDoS Attack.
Konferenzveröffentlichung, Bibliographie
Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen (2017)
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters, 118 (5)
doi: 10.1103/PhysRevLett.118.053601
Artikel, Bibliographie
Dietzel, Mathias ; Hardt, Steffen (2017)
Flow and streaming potential of an electrolyte in a channel with an axial temperature gradient.
In: Journal of Fluid Mechanics, 813
Artikel, Bibliographie
Siddique, Asma ; Meckel, Tobias ; Stark, Robert W. ; Narayan, Suman (2017)
Improved cell adhesion under shear stress in PDMS microfluidic devices.
In: Colloids and Surfaces B-Biointerfaces, 150
Artikel, Bibliographie
Ulmer, Alex ; Kohlhammer, Jörn ; Shulman, Haya (2017)
Towards Enhancing the Visual Analysis of Interdomain Routing.
Porto, Portugal
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra (2017)
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71
doi: 10.1016/j.cose.2017.02.004
Artikel, Bibliographie
Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2017)
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
McLean, VA, USA
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Konferenzveröffentlichung, Bibliographie
Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017)
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Konferenzveröffentlichung, Bibliographie
Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017)
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23075
Konferenzveröffentlichung, Bibliographie
Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Konferenzveröffentlichung, Bibliographie
Schmidt, Markus (2017)
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017)
Are We There Yet? On RPKIs Deployment and Security.
San Diego, CA, USA
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El (2017)
LARA - A Design Concept for Lattice-based Encryption.
Report, Bibliographie
Iapichino, L. ; Ulbrich, S. ; Volkwein, S. (2017)
Multiobjective PDE-constrained optimization using the reduced-basis method.
In: Advances in Computational Mathematics, 43 (5)
doi: 10.1007/s10444-016-9512-x
Artikel, Bibliographie
Fischer, Sebastian ; Sahu, R. P. ; Sinha-Ray, S. ; Yarin, A. L. ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2017)
Effect of nano-textured heater surfaces on evaporation at a single meniscus.
In: International Journal of Heat and Mass Transfer, 108
Artikel, Bibliographie
Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan (2017)
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation
Artikel, Bibliographie
Dietsch, Sascha Thorsten (2017)
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew (2017)
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077
Konferenzveröffentlichung, Bibliographie
Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Artikel, Bibliographie
Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017)
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv
Artikel, Bibliographie
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
Las Vegas (USA)
doi: 10.1109/CCNC.2017.7983129
Konferenzveröffentlichung, Bibliographie
Bothe, D. ; Koehne, M. ; Maier, S. ; Saal, J. (2017)
Global strong solutions for a class of heterogeneous catalysis models.
In: Journal of Mathematical Analysis and Applications, 445 (1)
Artikel, Bibliographie
Heß, Julian ; Wang, Yongqi ; Hutter, Kolumban (2017)
Thermodynamically consistent modeling of granular-fluid mixtures incorporating pore pressure evolution and hypoplastic behavior.
In: Continuum Mechanics and Thermodynamics, 29 (1)
doi: 10.1007/s00161-016-0535-9
Artikel, Bibliographie
Weber, P. S. ; Marschall, H. ; Bothe, D. (2017)
Highly accurate two-phase species transfer based on ALE Interface Tracking.
In: International Journal of Heat and Mass Transfer, 104
Artikel, Bibliographie
Reis, Martina Costa ; Wang, Yongqi (2017)
A two-fluid model for reactive dilute solid–liquid mixtures with phase changes.
In: Continuum Mechanics and Thermodynamics, 29 (2)
doi: 10.1007/s00161-016-0546-6
Artikel, Bibliographie
Avdic, Amer ; Kuenne, Guido ; Di Mare, Francesca ; Janicka, J. (2017)
LES combustion modeling using the Eulerian stochastic field method coupled with tabulated chemistry.
In: Combustion and Flame, 175
Artikel, Bibliographie
Cloos, F.-J. ; Stapp, D. ; Pelz, P. F. (2017)
Swirl boundary layer and flow separation at the inlet of a rotating pipe.
In: Journal of Fluid Mechanics, 811
doi: 10.1017/jfm.2016.734
Artikel, Bibliographie
Cloos, F.-J. ; Zimmermann, Anna- L. ; Pelz, P. F. (2017)
Two turbulent flow regimes at the inlet of a rotating pipe.
In: European Journal of Mechanics B-Fluids, 61,2 (1/2)
doi: 10.1016/j.euromechflu.2016.09.003
Artikel, Bibliographie
Cordes, Ulrike ; Kampers, G. ; Meissner, T. ; Tropea, C. ; Peinke, J. ; Hoelling, M. (2017)
Note on the limitations of the Theodorsen and Sears functions.
In: Journal of Fluid Mechanics, 811
Artikel, Bibliographie
Ma, Peter C. ; Ewan, Tim ; Jainski, Christopher ; Lu, Louise ; Dreizler, Andreas ; Sick, Volker ; Ihme, Matthias (2017)
Development and Analysis of Wall Models for Internal Combustion Engine Simulations Using High-speed Micro-PIV Measurements.
In: Flow Turbulence and Combustion, 98 (1)
Artikel, Bibliographie
Alobaid, Falah ; Mertens, Nicolas ; Starkloff, Ralf ; Lanz, Thomas ; Heinze, Christian ; Epple, Bernd (2017)
Progress in dynamic simulation of thermal power plants.
In: Progress in Energy and Combustion Science, 59
Artikel, Bibliographie
Widmann, Alexander ; Tropea, Cameron (2017)
Reynolds number influence on the formation of vortical structures on a pitching flat plate.
In: Interface Focus, 7 (1)
Artikel, Bibliographie
Bork, B. ; Preusche, A. ; Weckenmann, F. ; Lamanna, G. ; Dreizler, A. (2017)
Measurement of species concentration and estimation of temperature in the wake of evaporating n-heptane droplets at trans-critical conditions.
In: Proceedings of the Combustion Institute, 36 (2)
Artikel, Bibliographie
Eslami, Hossein ; Khanjari, Neda ; Mueller-Plathe, Florian (2017)
A Local Order Parameter-Based Method for Simulation of Free Energy Barriers in Crystal Nucleation.
In: Journal of chemical theory and computation, 13 (3)
Artikel, Bibliographie
Horn, Benjamin M. ; Luethen, H. ; Pfetsch, M. E. ; Ulbrich, S. (2017)
Geometry and topology optimization of sheet metal profiles by using a branch-and-bound framework.
In: Materialwissenschaft Und Werkstofftechnik, 48 (1)
Artikel, Bibliographie
Jainski, Christopher ; Rissmann, Martin ; Böhm, Benjamin ; Dreizler, Andreas (2017)
Experimental investigation of flame surface density and mean reaction rate during flame-wall interaction.
In: Proceedings of the Combustion Institute, 36 (2)
Artikel, Bibliographie
Koeser, Jan ; Becker, Lukas G. ; Gossmann, Ann-Kathrin ; Böhm, Benjamin ; Dreizler, Andreas (2017)
Investigation of ignition and volatile combustion of single coal particles within oxygen-enriched atmospheres using high-speed OH-PLIF.
In: Proceedings of the Combustion Institute, 36 (2)
Artikel, Bibliographie
Liu, Shengyuan ; Pfaller, Sebastian ; Rahimi, Mohammad ; Possart, Gunnar ; Steinmann, Paul ; Boehm, Michael C. ; Mueller-Plathe, Florian (2017)
Uniaxial deformation of polystyrene-silica nanocomposites studied by hybrid molecular dynamics-finite element simulations.
In: Computational Materials Science, 129
Artikel, Bibliographie
Schremb, Markus ; Roisman, Ilia V. ; Tropea, Cameron (2017)
Transient effects in ice nucleation of a water drop impacting onto a cold substrate.
In: Physical review. E, 95 (2-1)
Artikel, Bibliographie
Stahler, Thabo ; Geyer, Dirk ; Magnotti, Gaetano ; Trunk, Philipp ; Dunn, Matthew J. ; Barlow, Robert S. ; Dreizler, Andreas (2017)
Multiple conditioned analysis of the turbulent stratified flame A.
In: Proceedings of the Combustion Institute, 36 (2)
Artikel, Bibliographie
Zhang, Jianguo ; Milzetti, Jasmin ; Leroy, Frederic ; Mueller-Plathe, Florian (2017)
Formation of coffee-stain patterns at the nanoscale: The role of nanoparticle solubility and solvent evaporation rate.
In: The Journal of chemical physics, 146 (11)
Artikel, Bibliographie
Meng, Xiannan ; Wang, Yongqi ; Wang, Chun ; Fischer, Jan-Thomas (2017)
Modeling of unsaturated granular flows by a two-layer approach.
In: Acta Geotechnica, 12 (3)
doi: 10.1007/s11440-016-0509-x
Artikel, Bibliographie
Wang, Chun ; Wang, Yongqi ; Peng, Chong ; Meng, Xiannan (2017)
Two-fluid smoothed particle hydrodynamics simulation of submerged granular column collapse.
In: Mechanics Research Communications, 79
doi: 10.1016/j.mechrescom.2016.12.001
Artikel, Bibliographie
Wang, W. N. ; Xu, Y. S. ; Han, H. Y. ; Micciulla, S. ; Backes, S. ; Li, A. ; Xu, J. ; Shen, W. H. ; Klitzing, R. von ; Guo, X. H. (2017)
Odd-even effect during layer-by-layer assembly of polyelectrolytes inspired by marine mussel.
In: Journal of Polymer Science Part B-Polymer Physics, 55 (3)
Artikel, Bibliographie
Madkour, Sherif ; Szymoniak, Paulina ; Heidari, Mojdeh ; Klitzing, R. von ; Schönhals, Andreas (2017)
Unveiling the Dynamics of Self-Assembled Layers of Thin Films of Poly(vinyl methyl ether) (PVME) by Nanosized Relaxation Spectroscopy.
In: Acs Applied Materials & Interfaces, 9 (8)
Artikel, Bibliographie
Schimka, S. ; Lomadze, N. ; Rabe, M. ; Kopyshev, A. ; Lehmann, M. ; Klitzing, R. von ; Rumyantsev, A. M. ; Kramarenko, E. Y. ; Santer, S. (2017)
Photosensitive microgels containing azobenzene surfactants of different charges.
In: Physical Chemistry Chemical Physics, 19 (1)
Artikel, Bibliographie
Bothe, Dieter ; Denk, Robert ; Hieber, Matthias ; Schnaubelt, Roland ; Simonett, Gieri ; Wilke, Mathias ; Zacher, Rico (2017)
Special Issue: Parabolic Evolution Equations, Maximal Regularity, and Applications - Dedicated to Jan Pruss Preface.
In: Journal of Evolution Equations, 17 (1)
Artikel, Bibliographie
Bothe, D. ; Fischer, A. ; Pierre, M. ; Rolland, G. (2017)
Global wellposedness for a class of reaction-advection-anisotropic-diffusion systems.
In: Journal of Evolution Equations, 17 (1)
Artikel, Bibliographie
Bothe, D. ; Kashiwabara, T. ; Koehne, M. (2017)
Strong well-posedness for a class of dynamic outflow boundary conditions for incompressible Newtonian flows.
In: Journal of Evolution Equations, 17 (1)
Artikel, Bibliographie
Dierkes, Dominik ; Oberlack, Martin (2017)
Euler and Navier-Stocks equations in a new time-dependent helically symmetric system: derivation of the fundamental system and new conservation laws.
In: Journal of Fluid Mechanics, 818
Artikel, Bibliographie
Eitel, Felix ; Pareja, Jhon ; Johchi, Ayane ; Böhm, Benjamin ; Geyer, Dirk ; Dreizler, Andreas (2017)
Temporal evolution of auto-ignition of ethylene and methane jets propagating into a turbulent hot air co-flow vitiated with NOx.
In: Combustion and Flame, 177
Artikel, Bibliographie
Han, Haoxue ; Merabia, Samy ; Muller-Plathe, Florian (2017)
Thermal Transport at Solid-Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The journal of physical chemistry letters, 8
Artikel, Bibliographie
Hieber, Matthias ; Saito, Hirokazu (2017)
Strong solutions for two-phase free boundary problems for a class of non-Newtonian fluids.
In: Journal of Evolution Equations, 17 (1)
Artikel, Bibliographie
Krueger, Christian ; Schorr, Juergen ; Nicollet, Franck ; Bode, Johannes ; Dreizler, Andreas ; Böhm, Benjamin (2017)
Cause-and-effect chain from flow and spray to heat release during lean gasoline combustion operation using conditional statistics.
In: International Journal of Engine Research, 18 (1-2)
Artikel, Bibliographie
Kuenne, Guido ; Avdic, Amer ; Janicka, J. (2017)
Assessment of subgrid interpolation for the source term evaluation within premixed combustion simulations.
In: Combustion and Flame, 178
Artikel, Bibliographie
Li, Tao ; Pareja, Jhon ; Becker, Lukas ; Heddrich, Wolfgang ; Dreizler, Andreas ; Böhm, Benjamin (2017)
Quasi-4D laser diagnostics using an acousto-optic deflector scanning system.
In: Applied Physics B, 123 (3)
doi: 10.1007/s00340-017-6663-5
Artikel, Bibliographie
Planchette, C. ; Hinterbichler, H. ; Liu, M. ; Bothe, D. ; Brenn, G. (2017)
Colliding drops as coalescing and fragmenting liquid springs.
In: Journal of Fluid Mechanics, 814
Artikel, Bibliographie
Stritzke, Felix ; van der Kley, Sani ; Feiling, Alexander ; Dreizler, Andreas ; Wagner, Steven (2017)
Ammonia concentration distribution measurements in the exhaust of a heavy duty diesel engine based on limited data absorption tomography.
In: Optics Express, 25 (7)
Artikel, Bibliographie
Franz, Benjamin ; Stephan, Peter (2017)
Numerical simulation of nucleate boiling in microgravity in presence of a shear flow.
Napoli (Italy) (28.05.2017-01.06.2017)
doi: 10.1615/ICHMT.2017.CHT-7.810
Konferenzveröffentlichung, Bibliographie
Winterling, Jella ; Dammel, Frank ; Stephan, Peter (2017)
Exergy analysis of thermally interconnected manufacturing processes.
IEEES 2017 - 9th International Exergy, Energy and Environment Symposium. Split (14.05.2017-17.05.2017)
Konferenzveröffentlichung, Bibliographie
Nejati, Iman ; Franz, Benjamin ; Sielaff, Axel ; Stephan, Peter (2017)
Experimentelle und numerische Untersuchungen von Blasensieden in Schwerelosigkeit im Rahmen des Forschungsprogramms RUBI.
Jahrestreffen der ProcessNet Fachgruppe Wärme- und Stoffübertragung. Bruchsal (16.02.2017-17.02.2017)
Konferenzveröffentlichung, Bibliographie
Sauerwein, D. ; Oltmanns, Johannes (2017)
EnEff:Stadt Campus Lichtwiese, Energieeffiziente Weiterentwicklung durch intelligente Systemvernetzung.
1. Kongress ENERGIEWENDEBAUEN 2017. Berlin, Germany (30.01.2017-31.01.2017)
Konferenzveröffentlichung, Bibliographie
Lang, Jens ; Hundsdorfer, Willem (2017)
Extrapolation-based implicit–explicit Peer methods with optimised stability regions.
In: Journal of Computational Physics, 337
doi: 10.1016/j.jcp.2017.02.034
Artikel, Bibliographie
Schremb, Markus ; Campbell, James M. ; Christenson, Hugo K. ; Tropea, Cameron (2017)
Ice Layer Spreading along a Solid Substrate during Solidification of Supercooled Water: Experiments and Modeling.
In: Langmuir, 33 (19)
doi: 10.1021/acs.langmuir.7b00930
Artikel, Bibliographie
Warncke, K. ; Gepperth, S. ; Sauer, B. ; Sadiki, A. ; Janicka, J. ; Koch, R. ; Bauer, H.-J. (2017)
Experimental and numerical investigation of the primary breakup of an airblasted liquid sheet.
In: International Journal of Multiphase Flow, 91
doi: 10.1016/j.ijmultiphaseflow.2016.12.010
Artikel, Bibliographie
Han, Haoxue ; Mérabia, Samy ; Müller-Plathe, Florian (2017)
Thermal Transport at Solid–Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The Journal of Physical Chemistry Letters, 8 (9)
doi: 10.1021/acs.jpclett.7b00227
Artikel, Bibliographie
Han, Haoxue ; Schlawitschek, Christiane ; Katyal, Naman ; Stephan, Peter ; Gambaryan-Roisman, Tatiana ; Leroy, Frédéric ; Müller-Plathe, Florian (2017)
Solid–Liquid Interface Thermal Resistance Affects the Evaporation Rate of Droplets from a Surface: A Study of Perfluorohexane on Chromium Using Molecular Dynamics and Continuum Theory.
In: Langmuir, 33 (21)
doi: 10.1021/acs.langmuir.7b01410
Artikel, Bibliographie
Becker, Lukas G. ; Kosaka, Hidemasa ; Böhm, Benjamin ; Doost, Samim ; Knappstein, Robert ; Habermehl, Martin ; Kneer, Reinhold ; Janicka, J. ; Dreizler, Andreas (2017)
Experimental investigation of flame stabilization inside the quarl of an oxyfuel swirl burner.
In: Fuel, 201
doi: 10.1016/j.fuel.2016.09.002
Artikel, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2017)
Heat transfer in the film boiling regime: Single drop impact and spray cooling.
In: International Journal of Heat and Mass Transfer, 110
doi: 10.1016/j.ijheatmasstransfer.2017.03.004
Artikel, Bibliographie
Diemel, O. ; Pareja, J. ; Dreizler, A. ; Wagner, S. (2017)
An interband cascade laser-based in situ absorption sensor for nitric oxide in combustion exhaust gases.
In: Applied Physics B, 123 (5)
doi: 10.1007/s00340-017-6741-8
Artikel, Bibliographie
Ding, Carl-Philipp ; Honza, Rene ; Böhm, Benjamin ; Dreizler, Andreas (2017)
“Simultaneous measurement of flame impingement and piston surface temperatures in an optically accessible spark ignition engine”.
In: Applied Physics B, 123 (4)
doi: 10.1007/s00340-017-6694-y
Artikel, Bibliographie
Egger, H. ; Seitz, T. ; Tropea, C. (2017)
Enhancement of flow measurements using fluid-dynamic constraints.
In: Journal of Computational Physics, 344
doi: 10.1016/j.jcp.2017.04.080
Artikel, Bibliographie
Farwig, Reinhard ; Kozono, Hideo ; Wegmann, David (2017)
Existence of strong solutions and decay of turbulent solutions of Navier–Stokes flow with nonzero Dirichlet boundary data.
In: Journal of Mathematical Analysis and Applications, 453 (1)
doi: 10.1016/j.jmaa.2017.03.086
Artikel, Bibliographie
Frigge, Lorenz ; Ströhle, Jochen ; Epple, Bernd (2017)
Release of sulfur and chlorine gas species during coal combustion and pyrolysis in an entrained flow reactor.
In: Fuel, 201
doi: 10.1016/j.fuel.2016.11.037
Artikel, Bibliographie
Gugat, Martin ; Ulbrich, Stefan (2017)
The isothermal Euler equations for ideal gas with source term: Product solutions, flow reversal and no blow up.
In: Journal of Mathematical Analysis and Applications, 454 (1)
doi: 10.1016/j.jmaa.2017.04.064
Artikel, Bibliographie
Han, Haoxue ; Merabia, Samy ; Müller-Plathe, Florian (2017)
Thermal transport at a solid–nanofluid interface: from increase of thermal resistance towards a shift of rapid boiling.
In: Nanoscale, 9 (24)
doi: 10.1039/c7nr01215b
Artikel, Bibliographie
Knappstein, R. ; Kuenne, G. ; Meier, T. ; Sadiki, A. ; Janicka, J. (2017)
Evaluation of coal particle volatiles reaction by using detailed kinetics and FGM tabulated chemistry.
In: Fuel, 201
doi: 10.1016/j.fuel.2016.10.033
Artikel, Bibliographie
Cavalcanti Miranda, Flavia ; Di Mare, F. ; Sadiki, Amsini ; Janicka, J. (2017)
Performance Analysis of Different Solvers for Computing the Radiative Transfer Equation in Complex Geometries Using Finite Volume Method and Block Structured Grids.
In: Computational Thermal Sciences: An International Journal, 9 (3)
doi: 10.1615/ComputThermalScien.2017019001
Artikel, Bibliographie
Batzdorf, Stefan ; Breitenbach, Jan ; Schlawitschek, Christiane ; Roisman, Ilia V. ; Tropea, Cameron ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2017)
Heat transfer during simultaneous impact of two drops onto a hot solid substrate.
In: International Journal of Heat and Mass Transfer, 113
Artikel, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2017)
Drop collision with a hot, dry solid substrate: Heat transfer during nucleate boiling.
In: Physical Review Fluids, 2 (7)
doi: 10.1103/PhysRevFluids.2.074301
Artikel, Bibliographie
Bürkle, Sebastian ; Becker, Lukas G. ; Agizza, Maria Angela ; Dreizler, Andreas ; Ebert, Volker ; Wagner, Steven (2017)
In-situ measurement of residence time distributions in a turbulent oxy-fuel gas-flame combustor.
In: Experiments in Fluids, 58 (7)
doi: 10.1007/s00348-017-2366-2
Artikel, Bibliographie
Dimesso, L. ; Fasel, C. ; Lakus-Wollny, K. ; Mayer, T. ; Jaegermann, W. (2017)
Thermal stability of lead-free CH 3 NH 3 Sn x I 3 systems (0.9 ≤ x ≤ 1.1) for photovoltaics.
In: Materials Science in Semiconductor Processing, 68
doi: 10.1016/j.mssp.2017.06.012
Artikel, Bibliographie
Falcone, Manuel ; Marschall, Holger (2017)
Explicit Radial-Basis-Function-Based Finite-Difference Method for Interfacial Mass-Transfer Problems.
In: Chemical Engineering & Technology, 40 (8)
doi: 10.1002/ceat.201600536
Artikel, Bibliographie
Hansmann, Stefanie ; Schmidts, Volker ; Thiele, Christina M. (2017)
Synthesis of Poly-γ-S -2-methylbutyl-l -glutamate and Poly-γ-S -2-methylbutyl-d -glutamate and Their Use as Enantiodiscriminating Alignment Media in NMR Spectroscopy.
In: Chemistry - A European Journal, 23 (38)
doi: 10.1002/chem.201700699
Artikel, Bibliographie
Heid, Maurice ; Knoche, Stefan ; Gora, Niklas ; Ohlig, Dominik ; Drochner, Alfons ; Etzold, Bastian J. M. ; Vogel, Herbert (2017)
Dynamics of Bulk Oxygen in the Selective Oxidation of Acrolein.
In: ChemCatChem, 9 (12)
doi: 10.1002/cctc.201700124
Artikel, Bibliographie
Herdel, Philipp ; Krause, David ; Peters, Jens ; Kolmorgen, Brigga ; Ströhle, Jochen ; Epple, Bernd (2017)
Experimental investigations in a demonstration plant for fluidized bed gasification of multiple feedstock’s in 0.5 MWth scale.
In: Fuel, 205
doi: 10.1016/j.fuel.2017.05.058
Artikel, Bibliographie
Nayar, Divya ; Folberth, Angelina ; Vegt, Nico F. A. van der (2017)
Molecular origin of urea driven hydrophobic polymer collapse and unfolding depending on side chain chemistry.
In: Phys. Chem. Chem. Phys., 19 (28)
doi: 10.1039/c7cp01743j
Artikel, Bibliographie
Schimka, Selina ; Gordievskaya, Yulia D. ; Lomadze, Nino ; Lehmann, Maren ; Klitzing, R. von ; Rumyantsev, Artem M. ; Kramarenko, Elena Yu. ; Santer, Svetlana (2017)
Communication: Light driven remote control of microgels’ size in the presence of photosensitive surfactant: Complete phase diagram.
In: The Journal of Chemical Physics, 147 (3)
doi: 10.1063/1.4986143
Artikel, Bibliographie
Szuttor, Kai ; Roy, Tamal ; Hardt, Steffen ; Holm, Christian ; Smiatek, Jens (2017)
The stretching force on a tethered polymer in pressure-driven flow.
In: The Journal of Chemical Physics, 147 (3)
doi: 10.1063/1.4993619
Artikel, Bibliographie
Uddin, Md. T. ; Nicolas, Y. ; Olivier, C. ; Jaegermann, W. ; Rockstroh, N. ; Junge, H. ; Toupance, T. (2017)
Band alignment investigations of heterostructure NiO/TiO2 nanomaterials used as efficient heterojunction earth-abundant metal oxide photocatalysts for hydrogen production.
In: Phys. Chem. Chem. Phys., 19 (29)
doi: 10.1039/c7cp01300k
Artikel, Bibliographie
Zabrodiec, D. ; Becker, L. ; Hees, J. ; Maßmeyer, A. ; Habermehl, M. ; Hatzfeld, O. ; Dreizler, A. ; Kneer, R. (2017)
Detailed Analysis of the Velocity Fields from 60 kW Swirl-Stabilized Coal Flames in CO2/O2- and N2/O2-Atmospheres by Means of Laser Doppler Velocimetry and Particle Image Velocimetry.
In: Combustion Science and Technology, 189 (10)
doi: 10.1080/00102202.2017.1332598
Artikel, Bibliographie
Zentgraf, Florian ; Stephan, Michael ; Berrocal, Edouard ; Albert, Barbara ; Böhm, Benjamin ; Dreizler, Andreas (2017)
Application of structured illumination to gas phase thermometry using thermographic phosphor particles: a study for averaged imaging.
In: Experiments in Fluids, 58 (7)
doi: 10.1007/s00348-017-2364-4
Artikel, Bibliographie
Kummer, Florian ; Müller, Björn ; Utz, Thomas (2017)
Time integration for extended discontinuous Galerkin methods with moving domains.
In: International Journal for Numerical Methods in Engineering, 113 (5)
doi: 10.1002/nme.5634
Artikel, Bibliographie
Kumar, Abhijeet ; Kleinen, J. ; Venzmer, Joachim ; Gambaryan-Roisman, Tatiana (2017)
Effect of Geometry on Electrokinetic Characterization of Solid Surfaces.
In: Langmuir, 33 (30)
doi: 10.1021/acs.langmuir.7b00344
Artikel, Bibliographie
Utz, Thomas ; Kummer, Florian (2017)
A high-order discontinuous Galerkin method for extension problems.
In: International Journal for Numerical Methods in Fluids, 86 (8)
doi: 10.1002/fld.4464
Artikel, Bibliographie
He, Chao ; Leudesdorff, Wibke ; Di Mare, Francesca ; Sadiki, Amsini ; Janicka, J. (2017)
Analysis of In-cylinder Flow Field Anisotropy in IC Engine using Large Eddy Simulation.
In: Flow, Turbulence and Combustion, 99 (2)
doi: 10.1007/s10494-017-9812-3
Artikel, Bibliographie
Jainski, Christopher ; Rißmann, Martin ; Böhm, Benjamin ; Janicka, J. ; Dreizler, Andreas (2017)
Sidewall quenching of atmospheric laminar premixed flames studied by laser-based diagnostics.
In: Combustion and Flame, 183
doi: 10.1016/j.combustflame.2017.05.020
Artikel, Bibliographie
Kez, V. ; Consalvi, J.L. ; Liu, F. ; Ströhle, Jochen ; Epple, Bernd (2017)
Assessment of several gas radiation models for radiative heat transfer calculations in a three-dimensional oxy-fuel furnace under coal-fired conditions.
In: International Journal of Thermal Sciences, 120
doi: 10.1016/j.ijthermalsci.2017.06.017
Artikel, Bibliographie
Kumar, Abhijeet ; Kleinen, Jochen ; Venzmer, Joachim ; Gambaryan-Roisman, Tatiana (2017)
Effect of Geometry on Electrokinetic Characterization of Solid Surfaces.
In: Langmuir, 33 (30)
doi: 10.1021/acs.langmuir.7b00344
Artikel, Bibliographie
Piro, M. H. A. ; Wassermann, F. ; Grundmann, S. ; Tensuda, B. ; Kim, S. J. ; Christon, M. ; Berndt, M. ; Nishimura, M. ; Tropea, C. (2017)
Fluid flow investigations within a 37 element CANDU fuel bundle supported by magnetic resonance velocimetry and computational fluid dynamics.
In: International Journal of Heat and Fluid Flow, 66
doi: 10.1016/j.ijheatfluidflow.2017.04.010
Artikel, Bibliographie
Ries, F. ; Obando, P. ; Shevchuck, I. ; Janicka, J. ; Sadiki, A. (2017)
Numerical analysis of turbulent flow dynamics and heat transport in a round jet at supercritical conditions.
In: International Journal of Heat and Fluid Flow, 66
doi: 10.1016/j.ijheatfluidflow.2017.06.007
Artikel, Bibliographie
Zentgraf, Florian ; Stephan, Michael ; Berrocal, Edouard ; Albert, Barbara ; Böhm, Benjamin ; Dreizler, Andreas (2017)
Erratum to: Application of structured illumination to gas phase thermometry using thermographic phosphor particles: a study for averaged imaging.
In: Experiments in Fluids, 58 (8)
doi: 10.1007/s00348-017-2389-8
Artikel, Bibliographie
Izdebska-Podsiadły, Joanna ; Dörsam, Edgar (2017)
Effects of argon low temperature plasma on PLA film surface and aging behaviors.
In: Vacuum, 145
doi: 10.1016/j.vacuum.2017.09.001
Artikel, Bibliographie
Mohassieb, Shaimaa ; Kirah, Khaled ; Dörsam, Edgar ; Khalil, Ahmed ; El-Hennawy, Hadia (2017)
Effect of silver nanoparticle ink drop spacing on the characteristics of coplanar waveguide monopole antennas printed on flexible substrates.
In: IET Microwaves, Antennas & Propagation, 11 (11)
doi: 10.1049/iet-map.2017.0078
Artikel, Bibliographie
Dalgicdir, Cahit ; Rodríguez-Ropero, Francisco ; Vegt, Nico F. A. van der (2017)
Computational Calorimetry of PNIPAM Cononsolvency in Water/Methanol Mixtures.
In: The Journal of Physical Chemistry B, 121 (32)
doi: 10.1021/acs.jpcb.7b05960
Artikel, Bibliographie
Dallavalle, Marco ; Vegt, Nico F. A. van der (2017)
Evaluation of mapping schemes for systematic coarse graining of higher alkanes.
In: Phys. Chem. Chem. Phys., 19 (34)
doi: 10.1039/c7cp03926c
Artikel, Bibliographie
Galdi, Giovanni P. ; Hieber, Matthias ; Kashiwabara, Takahito (2017)
Strong time-periodic solutions to the 3D primitive equations subject to arbitrary large forces.
In: Nonlinearity, 30 (10)
doi: 10.1088/1361-6544/aa8166
Artikel, Bibliographie
Groß, T. F. ; Pöttgen, P. F. ; Pelz, P. F. (2017)
Analytical Approach for the Optimal Operation of Pumps in Booster Systems.
In: Journal of Water Resources Planning and Management, 143 (8)
doi: 10.1061/(asce)wr.1943-5452.0000776
Artikel, Bibliographie
Honza, Rene ; Ding, Carl-Philipp ; Dreizler, Andreas ; Böhm, Benjamin (2017)
Flame imaging using planar laser induced fluorescence of sulfur dioxide.
In: Applied Physics B, 123 (9)
doi: 10.1007/s00340-017-6823-7
Artikel, Bibliographie
Jiang, Hao ; Müller-Plathe, Florian ; Panagiotopoulos, Athanassios Z. (2017)
Contact angles from Young’s equation in molecular dynamics simulations.
In: The Journal of Chemical Physics, 147 (8)
doi: 10.1063/1.4994088
Artikel, Bibliographie
Klingebiel, Marcus ; Ehrlich, André ; Finger, Fanny ; Röschenthaler, Timo ; Jakirlić, Suad ; Voigt, Matthias ; Müller, Stefan ; Maser, Rolf ; Wendisch, Manfred ; Hoor, Peter ; Spichtinger, Peter ; Borrmann, Stephan (2017)
A tandem approach for collocated measurements of microphysical and radiative cirrus properties.
In: Atmospheric Measurement Techniques, 10 (9)
doi: 10.5194/amt-10-3485-2017
Artikel, Bibliographie
Leyendecker, Martin ; Meyer, Nils-Christopher ; Thiele, Christina M. (2017)
Development of New Supramolecular Lyotropic Liquid Crystals and Their Application as Alignment Media for Organic Compounds.
In: Angewandte Chemie International Edition, 56 (38)
doi: 10.1002/anie.201705642
Artikel, Bibliographie
Sacomano Filho, Fernando Luiz ; Kuenne, Guido ; Chrigui, Mouldi ; Sadiki, Amsini ; Janicka, J. (2017)
A consistent Artificially Thickened Flame approach for spray combustion using LES and the FGM chemistry reduction method: Validation in Lean Partially Pre-vaporized flames.
In: Combustion and Flame, 184
doi: 10.1016/j.combustflame.2017.05.031
Artikel, Bibliographie
Welter, Katharina ; Smirnov, Vladimir ; Becker, Jan-Philipp ; Borowski, Patrick ; Hoch, Sascha ; Maljusch, Artjom ; Jaegermann, Wolfram ; Finger, Friedhelm (2017)
The Influence of Operation Temperature and Variations of the Illumination on the Performance of Integrated Photoelectrochemical Water-Splitting Devices.
In: ChemElectroChem, 4 (8)
doi: 10.1002/celc.201700112
Artikel, Bibliographie
Bojničić-Kninski, Clemens von ; Popov, Roman ; Dörsam, Edgar ; Loeffler, Felix F. ; Breitling, Frank ; Nesterov-Mueller, Alexander (2017)
Combinatorial Particle Patterning.
In: Advanced Functional Materials, 27 (42)
doi: 10.1002/adfm.201703511
Artikel, Bibliographie
Braun, Larissa ; Uhlig, Martin ; Klitzing, R. von ; Campbell, Richard A. (2017)
Polymers and surfactants at fluid interfaces studied with specular neutron reflectometry.
In: Advances in Colloid and Interface Science, 247
doi: 10.1016/j.cis.2017.07.005
Artikel, Bibliographie
Christau, Stephanie ; Moeller, Tim ; Genzer, Jan ; Koehler, Ralf ; Klitzing, R. von (2017)
Salt-Induced Aggregation of Negatively Charged Gold Nanoparticles Confined in a Polymer Brush Matrix.
In: Macromolecules, 50 (18)
doi: 10.1021/acs.macromol.7b00866
Artikel, Bibliographie
Forooghi, Pourya ; Stroh, Alexander ; Magagnato, Franco ; Jakirlić, Suad ; Frohnapfel, Bettina (2017)
Toward a Universal Roughness Correlation.
In: Journal of Fluids Engineering, 139 (12)
doi: 10.1115/1.4037280
Artikel, Bibliographie
Freudigmann, H.-A. ; Dörr, Aaron ; Iben, Uwe ; Pelz, P. F. (2017)
Modeling of Cavitation-Induced Air Release Phenomena in Micro-Orifice Flows.
In: Journal of Fluids Engineering, 139 (11)
doi: 10.1115/1.4037048
Artikel, Bibliographie
Grebenev, V. N. ; Wacławczyk, M. ; Oberlack, M. (2017)
Conformal invariance of the Lungren–Monin–Novikov equations for vorticity fields in 2D turbulence.
In: Journal of Physics A: Mathematical and Theoretical, 50 (43)
doi: 10.1088/1751-8121/aa8c69
Artikel, Bibliographie
Groß, M. ; Tupinamba Lima, M. ; Uhlig, M. ; Ebraheme, A. ; Roeber, O. ; Olschewski, B. ; Klitzing, R. von ; Schomäcker, R. ; Schwarze, M. (2017)
Biopolymers for dye removal via foam separation.
In: Separation and Purification Technology, 188
doi: 10.1016/j.seppur.2017.07.025
Artikel, Bibliographie
Angelberger, C. ; Nicollet, Franck ; Krüger, Christian ; Schorr, Jürgen ; Nicoud, Edouard ; Colin, Olivier ; Angelberger, Christian ; Bode, Johannes ; Böhm, Benjamin (2017)
A PIV-Guided Large-Eddy Simulation of In-Cylinder Flows.
In: Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles, 72 (5)
doi: 10.2516/ogst/2017022
Artikel, Bibliographie
Ohlemüller, Peter ; Ströhle, Jochen ; Epple, Bernd (2017)
Chemical looping combustion of hard coal and torrefied biomass in a 1 MW th pilot plant.
In: International Journal of Greenhouse Gas Control, 65
doi: 10.1016/j.ijggc.2017.08.013
Artikel, Bibliographie
Roy, Tamal ; Szuttor, Kai ; Smiatek, Jens ; Holm, Christian ; Hardt, Steffen (2017)
Electric-field-induced stretching of surface-tethered polyelectrolytes in a microchannel.
In: Physical Review E, 96 (3)
doi: 10.1103/PhysRevE.96.032503
Artikel, Bibliographie
Roy, Tamal ; Szuttor, Kai ; Smiatek, Jens ; Holm, Christian ; Hardt, Steffen (2017)
Stretching of surface-tethered polymers in pressure-driven flow under confinement.
In: Soft Matter, 13 (36)
doi: 10.1039/c7sm00306d
Artikel, Bibliographie
Vargas-Ruiz, Salomé ; Lutzki, Jana ; Klitzing, R. von ; Hellweg, Thomas ; Wellert, Stefan (2017)
Wetting of planar solid surfaces by bicontinuous sugar surfactant-based microemulsions.
In: Colloid and Polymer Science, 295 (11)
doi: 10.1007/s00396-017-4188-4
Artikel, Bibliographie
Backes, Sebastian ; Krause, Patrick ; Tabaka, Weronika ; Witt, Marcus U. ; Mukherji, Debashish ; Kremer, Kurt ; Klitzing, R. von (2017)
Poly(N-isopropylacrylamide) Microgels under Alcoholic Intoxication: When a LCST Polymer Shows Swelling with Increasing Temperature.
In: ACS Macro Letters, 6 (10)
doi: 10.1021/acsmacrolett.7b00557
Artikel, Bibliographie
Ganter, Sebastian ; Heinrich, Arne ; Meier, Thorsten ; Kuenne, Guido ; Jainski, Christopher ; Rißmann, Martin C. ; Dreizler, Andreas ; Janicka, J. (2017)
Numerical analysis of laminar methane–air side-wall-quenching.
In: Combustion and Flame, 186
doi: 10.1016/j.combustflame.2017.08.017
Artikel, Bibliographie
Gao, Yangyang ; Müller-Plathe, Florian (2017)
Effect of grafted chains on the heat transfer between carbon nanotubes in a polyamide-6.6 matrix: A molecular dynamics study.
In: Polymer, 129
doi: 10.1016/j.polymer.2017.09.066
Artikel, Bibliographie
Hieber, Matthias ; Prüss, Jan (2017)
Dynamics of the Ericksen–Leslie equations with general Leslie stress I: the incompressible isotropic case.
In: Mathematische Annalen, 369 (3-4)
doi: 10.1007/s00208-016-1453-7
Artikel, Bibliographie
Madkour, Sherif ; Szymoniak, Paulina ; Hertwig, Andreas ; Heidari, Mojdeh ; Klitzing, R. von ; Napolitano, Simone ; Sferrazza, Michele ; Schönhals, Andreas (2017)
Decoupling of Dynamic and Thermal Glass Transition in Thin Films of a PVME/PS Blend.
In: ACS Macro Letters, 6 (10)
doi: 10.1021/acsmacrolett.7b00625
Artikel, Bibliographie
Schwab, Mira ; Herold, Dominik ; Thiele, Christina M. (2017)
Polyaspartates as Thermoresponsive Enantiodifferentiating Helically Chiral Alignment Media for Anisotropic NMR Spectroscopy.
In: Chemistry - A European Journal, 23 (58)
doi: 10.1002/chem.201702884
Artikel, Bibliographie
Truszkowska, D. ; Henrich, F. ; Schultze, J. ; Koynov, K. ; Räder, H. J. ; Butt, H.-J. ; Auernhammer, G. K. (2017)
Forced dewetting dynamics of high molecular weight surfactant solutions.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 521
doi: 10.1016/j.colsurfa.2016.07.073
Artikel, Bibliographie
Ilgen, Julian ; Kaltschnee, Lukas ; Thiele, Christina M. (2017)
A pure shift experiment with increased sensitivity and superior performance for strongly coupled systems.
In: Journal of Magnetic Resonance, 286
doi: 10.1016/j.jmr.2017.11.001
Artikel, Bibliographie
Wang, Chun ; Wang, Yongqi ; Peng, Chong ; Meng, Xiannan (2017)
Dilatancy and compaction effects on the submerged granular column collapse.
In: Physics of Fluids, 29 (10)
doi: 10.1063/1.4986502
Artikel, Bibliographie
Acosta, Matias ; Detsch, Rainer ; Grünewald, Alina ; Rojas, Virginia ; Schultheiß, Jan ; Wajda, Aleksandra ; Stark, Robert W. ; Narayan, Suman ; Sitarz, Maciej ; Koruza, Jurij ; Boccaccini, Aldo R. (2017)
Cytotoxicity, chemical stability, and surface properties of ferroelectric ceramics for biomaterials.
In: Journal of the American Ceramic Society, 101 (1)
doi: 10.1111/jace.15193
Artikel, Bibliographie
Hilz, Jochen ; Helbig, Martin ; Haaf, Martin ; Daikeler, Alexander ; Ströhle, Jochen ; Epple, Bernd (2017)
Long-term pilot testing of the carbonate looping process in 1 MWth scale.
In: Fuel, 210
doi: 10.1016/j.fuel.2017.08.105
Artikel, Bibliographie
Khanjari, Neda ; Eslami, Hossein ; Müller-Plathe, Florian (2017)
Adaptive-numerical-bias metadynamics.
In: Journal of Computational Chemistry, 38 (31)
doi: 10.1002/jcc.25066
Artikel, Bibliographie
Li, Zhiyi ; Cuoci, Alberto ; Sadiki, Amsini ; Parente, Alessandro (2017)
Comprehensive numerical study of the Adelaide Jet in Hot-Coflow burner by means of RANS and detailed chemistry.
In: Energy, 139
doi: 10.1016/j.energy.2017.07.132
Artikel, Bibliographie
Maduta, R. ; Ullrich, M. ; Jakirlic, S. (2017)
Reynolds stress modelling of wake interference of two cylinders in tandem: Conventional vs. eddy-resolving closure.
In: International Journal of Heat and Fluid Flow, 67
doi: 10.1016/j.ijheatfluidflow.2017.07.012
Artikel, Bibliographie
Petzold, Marc ; Röhl, Susanne ; Hohl, Lena ; Stehl, Dmitrij ; Lehmann, Maren ; Klitzing, R. von ; Kraume, Matthias (2017)
Mass Transfer and Drop Size Distributions in Reactive Nanoparticle-Stabilized Multiphase Systems.
In: Chemie Ingenieur Technik, 89 (11)
doi: 10.1002/cite.201700060
Artikel, Bibliographie
Tom, Jessica ; Brilmayer, Robert ; Schmidt, Johannes ; Andrieu-Brunsen, Annette (2017)
Optimisation of Surface-Initiated Photoiniferter-Mediated Polymerisation under Confinement, and the Formation of Block Copolymers in Mesoporous Films.
In: Polymers, 9 (10)
doi: 10.3390/polym9100539
Artikel, Bibliographie
Vegt, Nico F. A. van der ; Nayar, Divya (2017)
The Hydrophobic Effect and the Role of Cosolvents.
In: The Journal of Physical Chemistry B, 121 (43)
doi: 10.1021/acs.jpcb.7b06453
Artikel, Bibliographie
Dimesso, Lucangelo ; Stöhr, Maximilian ; Das, Chittaranjan ; Mayer, Thomas ; Jaegermann, Wolfram (2017)
Investigation on the properties of hybrid CH3NH3SnxI3 (0.9 ≤ x ≤ 1.4) perovskite systems.
In: Journal of Materials Research, 32 (22)
doi: 10.1557/jmr.2017.418
Artikel, Bibliographie
Fischer, Michael ; Lindemann, Florian ; Ulbrich, Michael ; Ulbrich, Stefan (2017)
Fréchet Differentiability of Unsteady Incompressible Navier--Stokes Flow with Respect to Domain Variations of Low Regularity by Using a General Analytical Framework.
In: SIAM Journal on Control and Optimization, 55 (5)
doi: 10.1137/16m1089563
Artikel, Bibliographie
He, Chao ; Kuenne, Guido ; Yildar, Esra ; Oijen, Jeroen van ; Di Mare, Francesca ; Sadiki, Amsini ; Ding, Carl-Philipp ; Baum, Elias ; Peterson, Brian ; Böhm, Benjamin ; Janicka, J. (2017)
Evaluation of the flame propagation within an SI engine using flame imaging and LES.
In: Combustion Theory and Modelling, 21 (6)
doi: 10.1080/13647830.2017.1343498
Artikel, Bibliographie
Hietzschold, Sebastian ; Hillebrandt, Sabina ; Ullrich, Florian ; Bombsch, Jakob ; Rohnacher, Valentina ; Ma, Shuangying ; Liu, Wenlan ; Köhn, Andreas ; Jaegermann, Wolfram ; Pucci, Annemarie ; Kowalsky, Wolfgang ; Mankel, Eric ; Beck, Sebastian ; Lovrincic, Robert (2017)
Functionalized Nickel Oxide Hole Contact Layers: Work Function versus Conductivity.
In: ACS Applied Materials & Interfaces, 9 (45)
doi: 10.1021/acsami.7b12784
Artikel, Bibliographie
Hosseinzadeh, Arash ; Sadiki, Amsini ; Di Mare, Francesca ; Janicka, J. (2017)
Effects of subgrid scale and combustion modelling on flame structure of a turbulent premixed flame within LES and tabulated chemistry framework.
In: Combustion Theory and Modelling, 21 (5)
doi: 10.1080/13647830.2017.1305514
Artikel, Bibliographie
Kaygusuz, Hakan ; Micciulla, Samantha ; Erim, F. Bedia ; Klitzing, R. von (2017)
Effect of anionic surfactant on alginate-chitosan polyelectrolyte multilayer thickness.
In: Journal of Polymer Science Part B: Polymer Physics, 55 (23)
doi: 10.1002/polb.24429
Artikel, Bibliographie
Kaygusuz, Hakan ; Torlak, Emrah ; Akın-Evingür, Gülşen ; Özen, İlhan ; Klitzing, R. von ; Erim, F. Bedia (2017)
Antimicrobial cerium ion-chitosan crosslinked alginate biopolymer films: A novel and potential wound dressing.
In: International Journal of Biological Macromolecules, 105
doi: 10.1016/j.ijbiomac.2017.07.144
Artikel, Bibliographie
Krumbein, Benjamin ; Forooghi, Pourya ; Jakirlić, Suad ; Magagnato, Franco ; Frohnapfel, Bettina (2017)
VLES Modeling of Flow Over Walls with Variably-shaped Roughness by Reference to Complementary DNS.
In: Flow, Turbulence and Combustion, 99 (3-4)
doi: 10.1007/s10494-017-9867-1
Artikel, Bibliographie
Li, Tao ; Pareja, Jhon ; Fuest, Frederik ; Schütte, Manuel ; Zhou, Yihui ; Dreizler, Andreas ; Böhm, Benjamin (2017)
Tomographic imaging of OH laser-induced fluorescence in laminar and turbulent jet flames.
In: Measurement Science and Technology, 29 (1)
doi: 10.1088/1361-6501/aa938a
Artikel, Bibliographie
Niethammer, M. ; Marschall, H. ; Kunkelmann, C. ; Bothe, D. (2017)
A numerical stabilization framework for viscoelastic fluid flow using the finite volume method on general unstructured meshes.
In: International Journal for Numerical Methods in Fluids, 86 (2)
doi: 10.1002/fld.4411
Artikel, Bibliographie
Schneider, Jurek ; Panagiotopoulos, Athanassios Z. ; Müller-Plathe, Florian (2017)
Polymer Chain Collapse upon Rapid Solvent Exchange: Slip-Spring Dissipative Particle Dynamics Simulations with an Explicit-Solvent Model.
In: The Journal of Physical Chemistry C, 121 (49)
doi: 10.1021/acs.jpcc.7b07135
Artikel, Bibliographie
Cai, Xuan ; Wörner, Martin ; Marschall, Holger ; Deutschmann, Olaf (2017)
CFD Simulation of Liquid Back Suction and Gas Bubble Formation in a Circular Tube with Sudden or Gradual Expansion.
In: Emission Control Science and Technology, 3 (4)
doi: 10.1007/s40825-017-0073-3
Artikel, Bibliographie
Weiner, A. ; Bothe, D. (2017)
Advanced subgrid-scale modeling for convection-dominated species transport at fluid interfaces with applicaton to rising bubbles.
In: Journal of Computational Physics, 347
doi: 10.1016/j.jcp.2017.06.040
Artikel, Bibliographie
Krumbein, B. ; Jakirlić, S. ; Tropea, C. (2017)
VLES study of a jet impinging onto a heated wall.
In: International Journal of Heat and Fluid Flow, 68
doi: 10.1016/j.ijheatfluidflow.2017.09.020
Artikel, Bibliographie
Procházková, Eliška ; Čechová, Lucie ; Kind, Jonas ; Janeba, Zlatko ; Thiele, Christina M. ; Dračínský, Martin (2017)
Photoswitchable Intramolecular Hydrogen Bonds in 5-Phenylazopyrimidines Revealed By In Situ Irradiation NMR Spectroscopy.
In: Chemistry - A European Journal, 24 (2)
doi: 10.1002/chem.201705146
Artikel, Bibliographie
Rolfe, A. ; Huang, Y. ; Haaf, M. ; Rezvani, S. ; Dave, A. ; Hewitt, N.J. (2017)
Techno-economic and Environmental Analysis of Calcium Carbonate Looping for CO2 Capture from a Pulverised Coal-Fired Power Plant.
In: Energy Procedia, 142
doi: 10.1016/j.egypro.2017.12.228
Artikel, Bibliographie
Ullrich, Wolfram C. ; Mahmoudi, Yasser ; Lackhove, Kilian ; Fischer, André ; Hirsch, Christoph ; Sattelmayer, Thomas ; Dowling, Ann P. ; Swaminathan, Nedunchezhian ; Sadiki, Amsini ; Staufer, Max (2017)
Prediction of Combustion Noise in a Model Combustor Using a Network Model and a LNSE Approach.
In: Journal of Engineering for Gas Turbines and Power, 140 (4)
doi: 10.1115/1.4038026
Artikel, Bibliographie
Prüss, Jan ; Bothe, Dieter (2017)
Modeling and analysis of reactive multi-component two-phase flows with mass transfer and phase transition -- The isothermal incompressible case.
In: Discrete and Continuous Dynamical Systems - Series S, 10 (4)
doi: 10.3934/dcdss.2017034
Artikel, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
doi: 10.1007/978-3-658-16835-3_8
Konferenzveröffentlichung, Bibliographie
Huang, Shilin ; Gawlitza, Kornelia ; Klitzing, R. von ; Steffen, Werner ; Auernhammer, Günter K. (2017)
Structure and Rheology of Microgel Monolayers at the Water/Oil Interface.
In: Macromolecules, 50 (9)
doi: 10.1021/acs.macromol.6b02779
Artikel, Bibliographie
Han, Haoya ; Li, Li ; Tian, Yuchuan ; Wang, Yunwei ; Ye, Zhishuang ; Yang, Qingsong ; Wang, Yiming ; Klitzing, R. von ; Guo, Xuhong (2017)
Spherical polyelectrolyte nanogels as templates to prepare hollow silica nanocarriers: observation by small angle X-ray scattering and TEM.
In: RSC Adv., 7 (76)
doi: 10.1039/C7RA10011F
Artikel, Bibliographie
Han, Haoya ; Li, Li ; Wang, Weihua ; Tian, Yuchuan ; Wang, Yunwei ; Wang, Junyou ; Klitzing, R. von ; Guo, Xuhong (2017)
Core–Shell–Corona Silica Hybrid Nanoparticles Templated by Spherical Polyelectrolyte Brushes: A Study by Small Angle X-ray Scattering.
In: Langmuir, 33 (38)
doi: 10.1021/acs.langmuir.7b02239
Artikel, Bibliographie
Kesal, D. ; Christau, S. ; Trapp, M. ; Krause, P. ; Klitzing, R. von (2017)
The internal structure of PMETAC brush/gold nanoparticle composites: a neutron and X-ray reflectivity study.
In: Physical Chemistry Chemical Physics, 19 (45)
doi: 10.1039/C7CP04404F
Artikel, Bibliographie
Tundis, Andrea ; Garcia Cordero, Carlos ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max (2017)
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
19th International Conference on Cyber-Physical Systems (ICCPS). Zurich, Switzerland (13.01.2017-14.01.2017)
doi: 10.5281/zenodo.1130542
Konferenzveröffentlichung, Bibliographie
Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan (2017)
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
Oslo, Norway
doi: 10.1007/978-3-319-66399-9_24
Konferenzveröffentlichung, Bibliographie
Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017)
A Systematic Study of Cache Side Channels across AES Implementations.
Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
Konferenzveröffentlichung, Bibliographie
Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017)
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
Konferenzveröffentlichung, Bibliographie
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017)
Towards Accelerated Usage Control based on Access Correlations.
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
Konferenzveröffentlichung, Bibliographie
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017)
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Konferenzveröffentlichung, Bibliographie
Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017)
AVR Processors as a Platform for Language-Based Security.
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
Konferenzveröffentlichung, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017)
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Konferenzveröffentlichung, Bibliographie
Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2017)
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2)
doi: 10.1108/ICS-03-2017-0014
Artikel, Bibliographie
Sharma, Raman ; May, Jan ; Alobaid, Falah ; Ohlemüller, Peter ; Ströhle, Jochen ; Epple, Bernd (2017)
Euler-Euler CFD simulation of the fuel reactor of a 1 MWth chemical-looping pilot plant: Influence of the drag models and specularity coefficient.
In: Fuel, 200
doi: 10.1016/j.fuel.2017.03.076
Artikel, Bibliographie
Shulman, Haya ; Waidner, Michael (2017)
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). Boston, MA, USA (27.03.2017-29.03.2017)
Konferenzveröffentlichung, Bibliographie
Boukoros, Spyros ; Katzenbeisser, Stefan (2017)
Measuring privacy in high dimensional microdata collections.
Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria, Italy (29.08.2017-01.09.2017)
doi: 10.1145/3098954.3098977
Konferenzveröffentlichung, Bibliographie
Hrsg.: Pottebaum, Jens ; Reuter, Christian (2017)
International Journal of Information Systems for Crisis Response and Management (IJISCRAM) : Special Issue on IT-Support for Critical Infrastructure Protection.
9 (4)
Zeitschriftenheft, -band oder -jahrgang, Bibliographie
Pottebaum, Jens ; Reuter, Christian (2017)
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4)
Artikel, Bibliographie
Reinhold, Thomas (2017)
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden
Artikel, Bibliographie
Reinhold, Thomas ; Schulze, Matthias (2017)
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
Anderes, Bibliographie
Drachenfels, Magdalena von ; Riebe, Thea (2017)
Normative Ordnungen des Digitalen - Konferenzbericht.
Anderes, Bibliographie
Riebe, Thea ; Geisse, Jens (2017)
Warum die Cyber-Sicherheitskultur ein Update braucht.
Anderes, Bibliographie
Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar (2017)
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), 102
doi: 10.1016/j.ijhcs.2016.09.008
Artikel, Bibliographie
Leopold, Inken ; Reuter, Christian
Hrsg.: Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (2017)
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
Mensch & Computer 2017. Regensburg, Germany
doi: 10.18420/muc2017-mci-0350
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian (2017)
Integration von Flow in die Mensch-Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Wissenschaft trifft Praxis, 6 (1)
Artikel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah
Hrsg.: Klafft, Michael (2017)
Informing the Population: Mobile Warning Apps.
Workshop on Risk and Crisis Communication for Disaster Prevention and Management. Wilhelmshaven (27.04.2017-27.04.2017)
Konferenzveröffentlichung, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Hrsg.: Eibl, Maximilian ; Gaedke, Martin (2017)
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
INFORMATIK 2017 - 47. Jahrestagung der Gesellschaft für Informatik. Chemnitz, Germany (25.09.2017-29.09.2017)
doi: 10.18420/in2017_133
Konferenzveröffentlichung, Bibliographie
Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar (2017)
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6)
doi: 10.1007/s10606-017-9291-z
Artikel, Bibliographie
Reuter, Christian ; Pätsch, Katja ; Runft, Elena
Hrsg.: Leimeister, J. M. ; Brenner, W. (2017)
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
International Conference on Wirtschaftsinformatik (WI 2017). St. Gallen, Switzerland (12.02.2017-15.02.2017)
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Mentler, Tilo ; Geisler, Stefan ; Herczeg, Michael ; Ludwig, Thomas ; Pipek, Volkmar ; Nestler, Simon
Hrsg.: Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (2017)
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Mensch und Computer 2017. Regensburg, Germany (10.09.2017-13.09.2017)
doi: 10.18420/muc2017-ws01-0380
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas
Hrsg.: Paterno, Fabio ; Wulf, Volker (2017)
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development
doi: 10.1007/978-3-319-60291-2_12
Buchkapitel, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian
Hrsg.: Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (2017)
The Impact of Social Media for Emergency Services: A Case Study with the Fire Department Frankfurt.
14th International Conference on Information Systems for Crisis Response and Management ISCRAM. Albi, France (21.05.2017-24.05.2017)
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker
Hrsg.: Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (2017)
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38)
doi: 10.14220/digo.2017.38.1.207
Buchkapitel, Bibliographie
Reuter, Christian ; Wiegärtner, Daniel ; Müller, Claudia
Hrsg.: Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (2017)
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
Mensch & Computer 2017. Regensburg, Germany
doi: 10.18420/muc2017-mci-0352
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2017)
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
New York, USA
doi: 10.1145/3134725
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian
Hrsg.: Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (2017)
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation
doi: 10.1007/978-3-319-44711-7_7
Buchkapitel, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Hrsg.: Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (2017)
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
Mensch und Computer 2017.
doi: 10.18420/muc2017-ws01-0386
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Spielhofer, Thomas (2017)
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Technological Forecasting and Social Change (TFSC), 121
doi: 10.1016/j.techfore.2016.07.038
Artikel, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah (2017)
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
25th European Conference on Information Systems. Guimaraes, Portugal (05.06.2017-10.06.2017)
Konferenzveröffentlichung, Bibliographie
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
Artikel, Bibliographie
Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian
Hrsg.: Eibl, Maximilian ; Gaedke, Martin (2017)
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
INFORMATIK 2017 - 47. Jahrestagung der Gesellschaft für Informatik. Chemnitz, Germany (25.09.2017-29.09.2017)
doi: 10.18420/in2017_129
Konferenzveröffentlichung, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Steinfort, René
Hrsg.: Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (2017)
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
14th International Conference on Information Systems for Crisis Response And Management ISCRAM. Albi, France (21.05.2017-24.05.2017)
Konferenzveröffentlichung, Bibliographie
Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295
Artikel, Bibliographie
Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017)
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698
Artikel, Bibliographie
Renaud, Karen ; Zimmermann, Verena (2017)
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
Information Security for South Africa (ISSA). Johannesburg, South Africa (16.08.2017-17.08.2017)
Konferenzveröffentlichung, Bibliographie
Gronarz, Tim ; Schulze, Jan ; Laemmerhold, Mischka ; Graeser, Philipp ; Gorewoda, Jeanette ; Kez, Vitali ; Habermehl, Martin ; Schiemann, Martin ; Ströhle, Jochen ; Epple, Bernd ; Scherer, Viktor ; Kneer, Reinhold (2017)
Quantification of the influence of parameters determining radiative heat transfer in an oxy-fuel operated boiler.
In: Fuel Processing Technology, 157
doi: 10.1016/j.fuproc.2016.11.012
Artikel, Bibliographie
Hajian, Soheil ; Hintermüller, Michael ; Ulbrich, Stefan (2017)
Total variation diminishing schemes in optimal control of scalar conservation laws.
In: IMA Journal of Numerical Analysis, 39 (1)
doi: 10.1093/imanum/drx073
Artikel, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon – Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017
doi: 10.1007/978-3-658-16835-3_8
Buchkapitel, Bibliographie
Ries, Florian ; Janicka, J. ; Sadiki, Amsini (2017)
Thermal Transport and Entropy Production Mechanisms in a Turbulent Round Jet at Supercritical Thermodynamic Conditions.
In: Entropy, 19 (8, 404)
doi: 10.3390/e19080404
Artikel, Bibliographie
Huss, Sorin ; Stein, Oliver (2017)
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules.
In: Journal of Low Power Electronics and Applications, 7 (1)
doi: 10.3390/jlpea7010004
Artikel, Bibliographie
Wunderer, Thomas (2016)
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733)
Artikel, Bibliographie
Doost, A. S. ; Ries, E. ; Becker, L. G. ; Buerkle, S. ; Wagner, S. ; Ebert, V. ; Dreizler, A. ; Di Mare, F. ; Sadiki, A. ; Janicka, J. (2016)
Residence time calculations for complex swirling flow in a combustion chamber using large-eddy simulations.
In: Chemical Engineering Science, 156
doi: 10.1016/j.ces.2016.09.001
Artikel, Bibliographie
Raupp, Sebastian ; Daume, Dominik ; Tekoglu, Serpil ; Merklein, Lisa ; Lemmer, Uli ; Hernandez-Sosa, Gerardo ; Sauer, Hans Martin ; Dörsam, Edgar ; Scharfer, Philip ; Schabel, Wilhelm (2016)
Slot Die Coated and Flexo Printed Highly Efficient SMOLEDs.
In: Advanced Materials Technologies, 2 (2)
doi: 10.1002/admt.201600230
Artikel, Bibliographie
Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016)
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1)
doi: 10.1016/j.jisa.2016.10.003
Artikel, Bibliographie
Sang, Bo ; Petri, Gustavo ; Ardekani, Masoud Saeida ; Ravi, Srivatsan ; Eugster, Patrick (2016)
Programming Scalable Cloud Services with AEON.
Trento, Italy
doi: 10.1145/2988336.2988352
Konferenzveröffentlichung, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016)
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
Auckland, New Zealand
Konferenzveröffentlichung, Bibliographie
Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016)
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
doi: 10.1109/PST.2016.7906980
Konferenzveröffentlichung, Bibliographie
Brendel, Jacqueline ; Demirel, Denise (2016)
Efficient Proactive Secret Sharing.
Auckland, New Zealand
Konferenzveröffentlichung, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016)
A security analysis of techniques for long-term integrity protection.
Auckland, New Zealand
Konferenzveröffentlichung, Bibliographie
Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie (2016)
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Konferenzveröffentlichung, Bibliographie
Schroth, Nils (2016)
Demonstrator for Privacy-Preserving Face Recognition.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Lato, Ellen (2016)
Fault Attacks on Lattice-Based Encryption Schemes.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Wang, Weihang ; Zheng, Yunhui ; Xing, Xinyu ; Kwon, Yonghwi ; Zhang, Xiangyu ; Eugster, Patrick (2016)
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Seattle, WA, USA
doi: 10.1145/2950290.2950352
Konferenzveröffentlichung, Bibliographie
Nobach, Leonhard ; Rimac, I. ; Hilt, V. ; Hausheer, David (2016)
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
Singapore, Singapore
doi: 10.1109/ICNP.2016.7784459
Konferenzveröffentlichung, Bibliographie
Wang, Lin ; Jiao, Lei ; Kliazovich, Dzmitry ; Bouvry, Pascal (2016)
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds.
Singapore, Singapore
doi: 10.1109/ICNP.2016.7785317
Konferenzveröffentlichung, Bibliographie
Kogan, Kirill ; Nikolenko, Sergey I. ; Eugster, Patrick ; Shalimov, Alexander ; Rottenstreich, Ori (2016)
FIB efficiency in distributed platforms.
Singapore, Singapore
doi: 10.1109/ICNP.2016.7784452
Konferenzveröffentlichung, Bibliographie
Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016)
DNSSEC Misconfigurations in Popular Domains.
Milano, Italy
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Sturm, Jan (2016)
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
Milan, Italy
Konferenzveröffentlichung, Bibliographie
Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016)
Scalable Secure Computation from ANSI-C.
Konferenzveröffentlichung, Bibliographie
Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Konferenzveröffentlichung, Bibliographie
Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016)
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5)
Artikel, Bibliographie
Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Vienna, Austria
doi: 10.1145/2976749.2989045
Konferenzveröffentlichung, Bibliographie
Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016)
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
Vienna, Austria
doi: 10.1145/2994620.2994621
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016)
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4)
doi: 10.1108/ICS-06-2015-0024
Artikel, Bibliographie
Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016)
Stratum Filtering: Cloud-Based Detection of Attack Sources.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016)
SecureScala: Scala embedding of secure computations.
Konferenzveröffentlichung, Bibliographie
Jawed, Kashif (2016)
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016)
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
Artikel, Bibliographie
Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016)
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
Philadelphia, PA USA
Konferenzveröffentlichung, Bibliographie
Vasilomanolakis, Emmanouil ; Stahn, Michael ; Garcia Cordero, Carlos ; Mühlhäuser, Max (2016)
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
Philadelphia, USA
doi: 10.1109/CNS.2016.7860495
Konferenzveröffentlichung, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016)
SANA: Secure and Scalable Aggregate Network Attestation.
Konferenzveröffentlichung, Bibliographie
Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Konferenzveröffentlichung, Bibliographie
Fojtik, Roman (2016)
Salt Synchronization Service.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Bieber, Julian (2016)
Generalizing Semi-Private Function Evaluation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Holz, Marco (2016)
Effective Protection of Sensitive Metadata in Online Communication Networks.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016)
Analyzing TETRA Location Privacy and Network Availability.
6th Workshop on Security and Privacy in Smartphones and Mobile Devices. Vienna, Austria
doi: 10.1145/2994459.2994463
Konferenzveröffentlichung, Bibliographie
Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd (2016)
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A, 94 (3)
doi: 10.1103/PhysRevA.94.033832
Artikel, Bibliographie
Bekheet, Maged F. ; Svoboda, Ingrid ; Liu, Na ; Bayarjargal, Lkhamsuren ; Irran, Elisabeth ; Dietz, Christian ; Stark, Robert W. ; Riedel, Ralf ; Gurlo, Aleksander (2016)
Ferroelectric InMnO3: Growth of single crystals, structure and high-temperature phase transitions.
In: Journal of Solid State Chemistry, 241
Artikel, Bibliographie
Ghiglieri, Marco ; Stopczynski, Martin (2016)
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
Konferenzveröffentlichung, Bibliographie
Mohamed, Mohamed Saied Emam ; Bansarkhani, Rachid El ; Petzoldt, Albrecht (2016)
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
Honolulu, Hi, USA
Konferenzveröffentlichung, Bibliographie
Kohnhäuser, Florian ; Katzenbeisser, Stefan (2016)
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
Heraklion, Greece
doi: 10.1007/978-3-319-45741-3_17
Konferenzveröffentlichung, Bibliographie
Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016)
Secure Logging Schemes and Certificate Transparency.
Heraklion, Crete, Greece
Konferenzveröffentlichung, Bibliographie
Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016)
Compiling Low Depth Circuits for Practical Secure Computation.
Heraklion, Crete, Greece
Konferenzveröffentlichung, Bibliographie
Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016)
Efficient Third Party Auditing for a Distributed Storage System.
Salzburg, Austria
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016)
Introducing Proxy Voting to Helios.
Salzburg
doi: 10.1109/ARES.2016.38
Konferenzveröffentlichung, Bibliographie
Ali, Azmzt ; Othmane, Lotfi Ben (2016)
Towards effective security assurance for incremental software development - the case of zen cart application,.
Konferenzveröffentlichung, Bibliographie
Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016)
Formal Policy-based Provenance Audit.
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan
Konferenzveröffentlichung, Bibliographie
Reinheimer, Benjamin ; Braun, Kristoffer ; Volkamer, Melanie (2016)
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
Aachen, Germany
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016)
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4)
doi: 10.1108/ICS-07-2015-0032
Artikel, Bibliographie
Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
Report, Bibliographie
Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
Report, Bibliographie
Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016)
ECDSA and QUARTZ in Comparison with RSA.
Report, Bibliographie
Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander (2016)
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
Report, Bibliographie
Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Security aspects and comparison of block ciphers LED and TEA.
Report, Bibliographie
Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016)
A comparison of block ciphers SIMON, SPECK, and KATAN.
Report, Bibliographie
Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Block ciphers for the IoT - SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
Report, Bibliographie
Wang, Xiang ; Venzmer, Joachim ; Bonaccurso, Elmar (2016)
Surfactant-Enhanced Spreading of Sessile Water Drops on
Polypropylene Surfaces.
In: Langmuir, 32 (33)
Artikel, Bibliographie
Bansarkhani, Rachid El ; El Kaafarani, Ali (2016)
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823)
Artikel, Bibliographie
Chagelishvili, George ; Hau, Jan-Niklas ; Khujadze, George ; Oberlack, Martin (2016)
Mechanical picture of the linear transient growth of vortical perturbations in incompressible smooth shear flows.
In: Physical Review Fluids, 1 (4)
Artikel, Bibliographie
Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas (2016)
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Salzburg, Austria
doi: 10.1109/ARES.2016.88
Konferenzveröffentlichung, Bibliographie
Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro (2016)
Capture and Replay: Reproducible Network Experiments in Mininet.
Florianopolis, Brazil
doi: 10.1145/2934872.2959076
Konferenzveröffentlichung, Bibliographie
Klir, Thomas (2016)
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Weinert, Christian (2016)
Building a Modular Long-Term Archiving System.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Hrsg.: Gierlichs, Benedikt ; Poschmann, Axel (2016)
Run-time Accessible DRAM PUFs in Commodity Devices.
Santa Barbara, California, USA
doi: 10.1007/978-3-662-53140-2_21
Konferenzveröffentlichung, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016)
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
Report, Bibliographie
McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016)
State Management for Hash-Based Signatures.
Gaithersburg, USA
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016)
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
ASIA CCS '17. Abu Dhabi, UEA (02.04.2017-06.04.2017)
Konferenzveröffentlichung, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Dynamic and Verifiable Hierarchical Secret Sharing.
Tacoma, Washington, USA
Konferenzveröffentlichung, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016)
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
Santa Barbara, CA, USA
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016)
Obfuscation Combiners.
Santa Barbara, CA, USA
Konferenzveröffentlichung, Bibliographie
Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016)
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE International Conference on Communications (ICC 2016). Kuala Lumpur, Malaysia (22.05.2016-27.05.2016)
doi: 10.1109/ICC.2016.7510885
Konferenzveröffentlichung, Bibliographie
Yu, Tingting ; Pradel, Michael (2016)
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks.
Saarbrücken, Germany
doi: 10.1145/2931037.2931070
Konferenzveröffentlichung, Bibliographie
Ermuth, Markus ; Pradel, Michael (2016)
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
Saarbrücken, Germany
doi: 10.1145/2931037.2931053
Konferenzveröffentlichung, Bibliographie
Späth, Johannes ; Nguyen Quang Do, Lisa ; Ali, Karim ; Bodden, Eric (2016)
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
Rome, Italy
doi: 10.4230/LIPIcs.ECOOP.2016.22
Konferenzveröffentlichung, Bibliographie
Wang, Weihang ; Zheng, Yunhui ; Liu, Peng ; Xu, Lei ; Zhang, Xiangyu ; Eugster, Patrick (2016)
ARROW: automated repair of races on client-side web pages.
Saarbrücken, Germany
doi: 10.1145/2931037.2931052
Konferenzveröffentlichung, Bibliographie
Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016)
Semantic Security and Indistinguishability in the Quantum World.
doi: 10.1007/978-3-662-53015-3_3
Konferenzveröffentlichung, Bibliographie
Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias (2016)
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
Konferenzveröffentlichung, Bibliographie
Zheng, Yao ; Schulz, Matthias ; Lou, Wenjing ; Hou, Thomas ; Hollick, Matthias (2016)
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
doi: 10.1145/2939918.2939933
Konferenzveröffentlichung, Bibliographie
Hrsg.: Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (2016)
Trust Management X.
10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016). Darmstadt, Germany (18.07.2016-22.07.2016)
doi: 10.1007/978-3-319-41354-9
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Requirements Markup Language.
Melbourne, Australia
Konferenzveröffentlichung, Bibliographie
Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016)
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Frankfurt
Konferenzveröffentlichung, Bibliographie
Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016)
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16). Berlin (16.07.2016-16.07.2016)
doi: 10.1145/2959424.2959427
Konferenzveröffentlichung, Bibliographie
Schulz, Matthias ; Loch, Adrian ; Hollick, Matthias (2016)
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
doi: 10.1145/2939918.2942418
Konferenzveröffentlichung, Bibliographie
Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias (2016)
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
doi: 10.1145/2939918.2942419
Konferenzveröffentlichung, Bibliographie
Schulz, Matthias ; Klapper, Patrick ; Hollick, Matthias ; Tews, Erik (2016)
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
doi: 10.1145/2939918.2940650
Konferenzveröffentlichung, Bibliographie
Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Konferenzveröffentlichung, Bibliographie
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Konferenzveröffentlichung, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016)
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Konferenzveröffentlichung, Bibliographie
Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016)
Memorable And Secure: How Do You Choose Your PIN?
Frankfurt
Konferenzveröffentlichung, Bibliographie
Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Konferenzveröffentlichung, Bibliographie
Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016)
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Bonn, Germany
Konferenzveröffentlichung, Bibliographie
Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric (2016)
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
Rome, Italy
Konferenzveröffentlichung, Bibliographie
Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016)
NetCo: Reliable Routing with Unreliable Routers.
Toulouse, France
Konferenzveröffentlichung, Bibliographie
Hardt, Steffen (2016)
Free-molecule heat transfer in a conservative force field between parallel surfaces.
In: Physical Review E, 93 (5)
Artikel, Bibliographie
Dietzel, Mathias ; Hardt, Steffen (2016)
Thermoelectricity in confined liquid electrolytes.
In: Physical Review Letters, 116 (22)
Artikel, Bibliographie
Gründing, Dirk ; Fleckenstein, Stefan ; Bothe, Dieter (2016)
A subgrid-scale model for reactive concentration boundary layers for 3D mass transfer simulations with deformable fluid interfaces.
In: International Journal of Heat and Mass Transfer, 101
doi: 10.1016/j.ijheatmasstransfer.2016.04.119
Artikel, Bibliographie
Taherian, Fereshte ; Marcon, Valentina ; Bonaccurso, Elmar ; Vegt, Nico F. A. van der (2016)
Vortex formation in coalescence of droplets with a reservoir using molecular dynamics simulations.
In: Journal of Colloid and Interface Science, 479
Artikel, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016)
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications
doi: 10.1007/s12243-016-0520-0
Artikel, Bibliographie
Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016)
Survey of Software Protection with Minimal Hardware.
Beer Sheva, Israel
Konferenzveröffentlichung, Bibliographie
Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016)
Towards Automated Measurements of Internets Naming Infrastructure.
Beer Sheva, Israel
Konferenzveröffentlichung, Bibliographie
Mariano, Artur ; Correia, Fabio ; Bischof, Christian (2016)
A vectorized, cache efficient LLL implementation.
Porto, Portugal
Konferenzveröffentlichung, Bibliographie
Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016)
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive
Artikel, Bibliographie
Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16). Austin Texas (05.06.2016-09.06.2016)
doi: 10.1145/2897937.2898027
Konferenzveröffentlichung, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Konferenzveröffentlichung, Bibliographie
Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016)
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Konferenzveröffentlichung, Bibliographie
Roth, Johannes (2016)
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Homomorphic Signature Schemes - A survey.
doi: 10.1007/978-3-319-32115-8
Buch, Bibliographie
Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016)
Coercion-resistant Proxy Voting.
Ghent, Belgium
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016)
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Ghent, Belgium
Konferenzveröffentlichung, Bibliographie
Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016)
Teaching Phishing-Security: Which Way is Best?
Ghent, Belgium
Konferenzveröffentlichung, Bibliographie
Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Selakovic, Marija ; Pradel, Michael (2016)
Performance issues and optimizations in JavaScript: an empirical study.
38th International Conference on Software Engineering. Austin, Texas (14.05.2016-22.05.2016)
doi: 10.1145/2884781.2884829
Konferenzveröffentlichung, Bibliographie
Trautmann, Nils ; Alber, Gernot (2016)
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A, 93
doi: 10.1103/PhysRevA.93.053807
Artikel, Bibliographie
Holl, M. ; Pelz, P. F. (2016)
Multi-pole system analysis (MPSA) - A systematic method towards techno-economic optimal system design.
In: Applied Energy, 169
doi: 10.1016/j.apenergy.2016.02.076
Artikel, Bibliographie
Ghiglieri, Marco ; Waidner, Michael (2016)
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3)
Artikel, Bibliographie
Schmitz, Martin ; Leister, Andreas ; Dezfuli, Niloofar ; Riemann, Jan ; Müller, Florian ; Mühlhäuser, Max (2016)
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion.
San Jose, CA, USA
doi: 10.1145/2851581.2892275
Konferenzveröffentlichung, Bibliographie
Arzt, Steven ; Bodden, Eric (2016)
StubDroid: automatic inference of precise data-flow summaries for the android framework.
doi: 10.1145/2884781.2884816
Konferenzveröffentlichung, Bibliographie
Liu, Hui ; Liu, Qiurong ; Staicu, Cristian-Alexandru ; Pradel, Michael ; Luo, Yue (2016)
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
Austin, Texas
doi: 10.1145/2884781.2884841
Konferenzveröffentlichung, Bibliographie
Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016)
Jumping through hoops: why do Java developers struggle with cryptography APIs?
Austin, Texas
doi: 10.1145/2884781.2884790
Konferenzveröffentlichung, Bibliographie
Taha, Ahmed ; Metzler, Patrick ; Trapero, Ruben ; Luna, Jesus ; Suri, Neeraj (2016)
Identifying and Utilizing Dependencies Across Cloud Security Services.
Xi'an, China
doi: 10.1145/2897845.2897911
Konferenzveröffentlichung, Bibliographie
Salvaneschi, Guido ; Mezini, Mira (2016)
Debugging for reactive programming.
Austin, TX
doi: 10.1145/2884781.2884815
Konferenzveröffentlichung, Bibliographie
Kiss, Ágnes ; Schneider, Thomas (2016)
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016. Wien (08.05.2016-12.05.2016)
doi: 10.1007/978-3-662-49890-3_27
Konferenzveröffentlichung, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report, Bibliographie
Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016)
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
San Jose, California, USA
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016)
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Xi'an, China
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016)
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Xi'an, China
Konferenzveröffentlichung, Bibliographie
Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016)
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
doi: 10.1007/s11623-016-0599-5
Konferenzveröffentlichung, Bibliographie
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Artikel, Bibliographie
Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016)
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Austin, Texas, USA
Konferenzveröffentlichung, Bibliographie
Trautmann, Nils ; Hauke, Philipp (2016)
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics, 18 (4)
doi: 10.1088/1367-2630/18/4/043029
Artikel, Bibliographie
Zerball, M. ; Laschewsky, A. ; Kohler, R. ; Klitzing, R. von (2016)
The Effect of Temperature Treatment on the Structure of Polyelectrolyte Multilayers.
In: Polymers, 8 (4)
Artikel, Bibliographie
Strenzke, Falko (2016)
An Analysis of OpenSSL's Random Number Generator.
Vienna, Austria
doi: 10.1007/978-3-662-49890-3_25
Konferenzveröffentlichung, Bibliographie
Müller, Florian ; Günther, Sebastian ; Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Mühlhäuser, Max (2016)
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
doi: 10.1145/2851581.2892450
Konferenzveröffentlichung, Bibliographie
Classen, Jiska (2016)
Software Defined Radio – Open Source Wireless Hacking.
Anderes, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016)
Privately and Publicly Verifiable Computing Techniques.
Buch, Bibliographie
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Artikel, Bibliographie
Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016)
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Konferenzveröffentlichung, Bibliographie
Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016)
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
doi: 10.1007/978-3-319-43283-0_7
Konferenzveröffentlichung, Bibliographie
Alber, Gernot ; Trautmann, Nils (2016)
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, 672 (1)
doi: 10.1088/1742-6596/672/1/012004
Artikel, Bibliographie
Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016)
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
Artikel, Bibliographie
Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016)
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
San Francisco
Konferenzveröffentlichung, Bibliographie
Mayer, Christoph (2016)
Implementing a Toolkit for Ring-LWE Cryptography.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016)
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Fes, Morocco
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016)
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Fes, Morocco
Konferenzveröffentlichung, Bibliographie
Shulman, Haya ; Waidner, Michael (2016)
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
Louvain La Neuve, Belgium
Konferenzveröffentlichung, Bibliographie
Waidner, Michael ; Kasper, Michael (2016)
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
Dresden, Germany
Konferenzveröffentlichung, Bibliographie
Kogan, Kirill ; Menikkumbura, Danushka ; Petri, Gustavo ; Noh, Youngtae ; Nikolenko, Sergey I. ; Eugster, Patrick (2016)
BASEL (Buffer mAnagement SpEcification Language).
Santa Clara, CA
doi: 10.1145/2881025.2881027
Konferenzveröffentlichung, Bibliographie
Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016)
On the Hardness of Proving CCA-Security of Signed ElGamal.
Taipei, Taiwan
doi: 10.1007/978-3-662-49384-7_3
Konferenzveröffentlichung, Bibliographie
Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016)
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
doi: 10.1109/TIFS.2015.2512534
Artikel, Bibliographie
McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016)
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5)
doi: 10.1109/JPROC.2015.2512235
Artikel, Bibliographie
Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016)
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
Saarbrucken
doi: 10.1109/EuroSP.2016.35
Konferenzveröffentlichung, Bibliographie
Nejati, Iman ; Dietzel, Mathias ; Hardt, Steffen (2016)
Exploiting cellular convection in a thick liquid layer to pattern a thin polymer film.
In: Applied Physics Letters, 108 (051604)
Artikel, Bibliographie
Pandey, Anamika ; Hardt, Steffen ; Klar, Axel ; Tiwari, Sudarshan (2016)
Brownian dynamics of rigid particles in an incompressible fluctuating fluid by a meshfree method.
In: Computers and Fluids, 127
Artikel, Bibliographie
Rasthofer, Siegfried ; Arzt, Steven ; Miltenberger, Marc ; Bodden, Eric (2016)
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
San Diego, CA
doi: 10.14722/ndss.2016.23066
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016)
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
Report, Bibliographie
Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016)
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
Heraklion, Crete, Greece
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Volkamer, Melanie (2016)
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Barbados
Konferenzveröffentlichung, Bibliographie
Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Mariano, Artur ; Bischof, Christian (2016)
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
Heraklion Crete, Greece
Konferenzveröffentlichung, Bibliographie
Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016)
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6)
Artikel, Bibliographie
Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016)
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
San Diego, California
Konferenzveröffentlichung, Bibliographie
Rieß, Susanne (2016)
An Analysis of Lattice-Based Key Exchange Protocols.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016)
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81)
Artikel, Bibliographie
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report, Bibliographie
Tiwari, Sudarshan ; Klar, Axel ; Hardt, Steffen (2016)
Numerical simulation of wetting phenomena by a meshfree particle method.
In: Journal of Computational and Applied Mathematics, 292
Artikel, Bibliographie
Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016)
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Koper, Slovenia
Konferenzveröffentlichung, Bibliographie
Nadi, Sarah ; Krüger, Stefan (2016)
Variability Modeling of Cryptographic Components (Clafer Experience Report).
Tenth International Workshop on Variability Modelling of Software-intensive Systems. Salvador, Brazil (27.01.2016-29.01.2016)
Konferenzveröffentlichung, Bibliographie
Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario
Hrsg.: Curry, Edward ; Wahlster, Wolfgang (2016)
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe
doi: 10.1007/978-3-319-21569-3
Buchkapitel, Bibliographie
Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Konferenzveröffentlichung, Bibliographie
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie
Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
Report, Bibliographie
Sauer, B. ; Sadiki, A. ; Janicka, J. (2016)
Embedded DNS Concept for Simulating the Primary Breakup of an Airblast Atomizer.
In: Atomization and Sprays, 26 (3)
Artikel, Bibliographie
Meng, Xiannan ; Wang, Yongqi (2016)
Modelling and numerical simulation of two-phase debris flows.
In: Acta Geotechnica, 11 (5)
doi: 10.1007/s11440-015-0418-4
Artikel, Bibliographie
Gumprich, Werner ; Synek, B. ; Sadiki, A. (2016)
ASSESSMENT OF THE DIRECT QUADRATURE-BASED SECTIONAL METHOD OF MOMENTS FOR THE SIMULATION OF EVAPORATING POLYDISPERSE SPRAYS.
In: Atomization and Sprays, 26 (2)
Artikel, Bibliographie
Farwig, Reinhard ; Rosteck, Veronika (2016)
Note on Friedrichs' inequality in N-star-shaped domains.
In: Journal of Mathematical Analysis and Applications, 435 (2)
Artikel, Bibliographie
Freystein, Martin ; Kolberg, Felix ; Spiegel, Lucas ; Sinha-Ray, Sumit ; Sahu, Rakesh P. ; Yarin, Alexander L. ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2016)
Trains of Taylor bubbles over hot nano-textured mini-channel surface.
In: International Journal of Heat and Mass Transfer, 93
Artikel, Bibliographie
Mejia, Juan M. ; Chejne, Farid ; Molina, Alejandro ; Sadiki, Amsini (2016)
Scalar Mixing Study at High-Schmidt Regime in a Turbulent Jet Flow Using Large-Eddy Simulation/Filtered Density Function Approach.
In: Journal of Fluids Engineering-Transactions of the Asme, 138 (2)
Artikel, Bibliographie
Mertens, Nicolas ; Alobaid, Falah ; Lanz, Thomas ; Epple, Bernd ; Kim, Hyun-Gee (2016)
Dynamic simulation of a triple-pressure combined-cycle plant: Hot start-up and shutdown.
In: Fuel, 167
Artikel, Bibliographie
Taherian, Fereshte ; Leroy, Frederic ; Heim, Lars-Oliver ; Bonaccurso, Elmar ; Vegt, Nico F. A. van der (2016)
Mechanism for Asymmetric Nanoscale Electrowetting of an Ionic Liquid on Graphene.
In: Langmuir : the ACS journal of surfaces and colloids, 32 (1)
Artikel, Bibliographie
Wegener, Moritz ; Spiehl, Dieter ; Sauer, Hans Martin ; Mikschl, Florian ; Liu, Xinxin ; Kölpin, Nadja ; Schmidt, Michael ; Jank, Michael ; Dörsam, Edgar ; Roosen, Andreas (2016)
Flexographic printing of nanoparticulate tin-doped indium oxide inks on PET foils and glass substrates.
In: Journal of Materials Science, 51 (9)
Artikel, Bibliographie
Farwig, Reinhard ; Riechwald, Paul Felix (2016)
REGULARITY CRITERIA FOR WEAK SOLUTIONS OF THE NAVIER-STOKES SYSTEM IN GENERAL UNBOUNDED DOMAINS.
In: Discrete and Continuous Dynamical Systems-Series S, 9 (1)
Artikel, Bibliographie
Janassek, Patrick ; Hartmann, Sebastien ; Molitor, Andreas ; Michel, Florian ; Elsaesser, Wolfgang (2016)
Investigations of the polarization behavior of quantum cascade lasers by Stokes parameters.
In: Optics Letters, 41 (2)
Artikel, Bibliographie
Jumpertz, L. ; Michel, F. ; Pawlus, R. ; Elsaesser, W. ; Schires, K. ; Carras, M. ; Grillot, F. (2016)
Measurements of the linewidth enhancement factor of mid-infrared quantum cascade lasers by different optical feedback techniques.
In: Aip Advances, 6 (1)
Artikel, Bibliographie
Litterscheid, C. ; Krueger, S. ; Euler, M. ; Dreizler, A. ; Wickleder, C. ; Albert, Barbara (2016)
Solid solution between lithium-rich yttrium and europium molybdate as new efficient red-emitting phosphors.
In: Journal of Materials Chemistry C, 4 (3)
Artikel, Bibliographie
Liu, M. ; Bothe, D. (2016)
Numerical study of head-on droplet collisions at high Weber numbers.
In: Journal of Fluid Mechanics, 789
Artikel, Bibliographie
Rahimi, Mahshid ; Singha, Jayant K. ; Mueller-Plathe, Florian (2016)
Adsorption and separation of binary and ternary mixtures of SO2, CO2 and N-2 by ordered carbon nanotube arrays: grand-canonical Monte Carlo simulations.
In: Physical Chemistry Chemical Physics, 18 (5)
Artikel, Bibliographie
Al-Maliki, Wisam Abed Kattea ; Alobaid, Falah ; Kez, Vitali ; Epple, Bernd (2016)
Modelling and dynamic simulation of a parabolic trough power plant.
In: Journal of Process Control, 26
Artikel, Bibliographie
Doerr, Aaron ; Hardt, Steffen ; Masoud, Hassan ; Stone, Howard A. (2016)
Drag and diffusion coefficients of a spherical particle attached to a fluid-fluid interface.
In: Journal of Fluid Mechanics, 790
Artikel, Bibliographie
Gao, Yangyang ; Mueller-Plathe, Florian (2016)
Increasing the Thermal Conductivity of Graphene-Polyamide-6,6 Nanocomposites by Surface-Grafted Polymer Chains: Calculation with Molecular Dynamics and Effective-Medium Approximation.
In: Journal of Physical Chemistry B, 120 (7)
Artikel, Bibliographie
Geissert, Matthias ; Hieber, Matthias ; Thieu Huy, Nguyen (2016)
A General Approach to Time Periodic Incompressible Viscous Fluid Flow Problems.
In: Archive for Rational Mechanics and Analysis, 220 (3)
Artikel, Bibliographie
Kuehnreich, Benjamin ; Hoeh, Matthias ; Wagner, Steven ; Ebert, Volker (2016)
Direct single-mode fibre-coupled miniature White cell for laser absorption spectroscopy.
In: Review of Scientific Instruments, 87 (2)
Artikel, Bibliographie
Molitor, Andreas ; Mohr, Till ; Hartmann, Sebastien ; Elsasser, Wolfgang (2016)
Investigations on Spectro-Temporally Resolved Stokes Polarization Parameters of Transverse Multi-Mode Vertical-Cavity Surface-Emitting Lasers.
In: Ieee Journal of Quantum Electronics, 52 (2)
Artikel, Bibliographie
Blume, Niels Goeran ; Ebert, Volker ; Dreizler, Andreas ; Wagner, Steven (2016)
Broadband fitting approach for the application of supercontinuum broadband laser absorption spectroscopy to combustion environments.
In: Measurement Science and Technology, 27 (1)
doi: 10.1088/0957-0233/27/1/015501
Artikel, Bibliographie
Farwig, Reinhard ; Rosteck, Veronika (2016)
RESOLVENT ESTIMATES OF THE STOKES SYSTEM WITH NAVIER BOUNDARY CONDITIONS IN GENERAL UNBOUNDED DOMAINS.
In: Advances in Differential Equations, 21 (5-6)
Artikel, Bibliographie
Golzke, Hendrik ; Leick, Philippe ; Dreizler, Andreas (2016)
Differential infrared thermography of gasoline direct injection sprays.
In: Quantitative Infrared Thermography Journal, 13 (1)
Artikel, Bibliographie
Hieber, Matthias ; Nesensohn, Manuel ; Pruess, Jan ; Schade, Katharina (2016)
Dynamics of nematic liquid crystal flows: The quasilinear approach.
In: Annales De L Institut Henri Poincare-Analyse Non Lineaire, 33 (2)
Artikel, Bibliographie
Kez, Vitali ; Liu, F. ; Consalvi, J. L. ; Ströhle, Jochen ; Epple, Bernd (2016)
A comprehensive evaluation of different radiation models in a gas turbine combustor under conditions of oxy-fuel combustion with dry recycle.
In: Journal of Quantitative Spectroscopy & Radiative Transfer, 172
Artikel, Bibliographie
Piro, M. H. A. ; Wassermann, F. ; Grundmann, S. ; Leitch, B. W. ; Tropea, C. (2016)
Progress in on-going experimental and computational fluid dynamic investigations within a CANDU fuel channel.
In: Nuclear Engineering and Design, 299
Artikel, Bibliographie
Rane, Kaustubh ; Vegt, Nico F. A. van der (2016)
Understanding the influence of capillary waves on solvation at the liquid-vapor interface.
In: Journal of Chemical Physics, 144 (11)
Artikel, Bibliographie
Bruschewski, Martin ; Scherhag, Christian ; Grundmann, Sven ; Schiffer, Heinz-Peter (2016)
Influence of Channel Geometry and Flow Variables on Cyclone Cooling of Turbine Blades.
In: ASME Journal of Turbomachinery, 138 (6)
Artikel, Bibliographie
Daubert, Jörg (2016)
Anonymous Publish-Subscribe Overlays.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Babu, Deepu J. ; Kuehl, Frank G. ; Yadav, Sandeep ; Markert, Daniel ; Bruns, Michael ; Hampe, Manfred J. ; Schneider, Joerg J. (2016)
Adsorption of pure SO2 on nanoscaled graphene oxide.
In: Rsc Advances, 6 (43)
Artikel, Bibliographie
Bachmann, Svenja ; Schulze, Marcus ; Morasch, Jan ; Hesse, Sabine ; Hussein, Laith ; Krell, Lisa ; Schnagl, Johann ; Stark, Robert W. ; Narayan, Suman (2016)
Aging of oxygen and hydrogen plasma discharge treated a-C:H and ta-C coatings.
In: Applied Surface Science, 371
Artikel, Bibliographie
Kintea, D. M. ; Roisman, I. V. ; Tropea, C. (2016)
Transport processes in a wet granular ice layer: Model for ice accretion and shedding.
In: International Journal of Heat and Mass Transfer, 97
Artikel, Bibliographie
Kumar, Abhijeet ; Gilson, Laurent ; Henrich, Franziska ; Dahl, Verena ; Kleinen, Jochen ; Gambaryan-Roisman, Tatiana ; Venzmer, Joachim (2016)
Intact deposition of cationic vesicles on anionic cellulose fibers: Role of vesicle size, polydispersity, and substrate roughness studied via streaming potential measurements.
In: Journal of Colloid and Interface Science, 473
Artikel, Bibliographie
Starkloff, Ralf ; Postler, Ralf ; Al-Maliki, Wisam Abed Kattea ; Alobaid, Falah ; Epple, Bernd (2016)
Investigation into gas dynamics in an oxyfuel coal fired boiler during master fuel trip and blackout.
In: Journal of Process Control, 41
Artikel, Bibliographie
Waclawczyk, Marta ; Janocha, Daniel D. ; Oberlack, Martin (2016)
Reply to Frewer et al. Comments on Janocha et al. Lie Symmetry Analysis of the Hopf Functional-Differential Equation. Symmetry 2015, 7, 1536-1566.
In: Symmetry-Basel, 8 (4)
Artikel, Bibliographie
Yang, Yong-Biao ; Rahimi, Mahshid ; Singh, Jayant K. ; Boehm, Michael C. ; Mueller-Plathe, Florian (2016)
Adsorption and Condensation of SO2 in Double-Walled Carbon Nanotube Arrays Studied by Monte Carlo Simulations and Simple Analytical Models.
In: Journal of Physical Chemistry C, 120 (14)
Artikel, Bibliographie
Bruschewski, Martin ; Freudenhammer, Daniel ; Buchenberg, Waltraud B. ; Schiffer, Heinz-Peter ; Grundmann, Sven (2016)
Estimation of the measurement uncertainty in magnetic resonance velocimetry based on statistical models.
In: Experiments in Fluids, 57 (5)
Artikel, Bibliographie
Falconi, C. J. ; Lehrenfeld, C. ; Marschall, H. ; Meyer, C. ; Abiev, R. ; Bothe, D. ; Reusken, A. ; Schlueter, M. ; Woerner, M. (2016)
Numerical and experimental analysis of local flow phenomena in laminar Taylor flow in a square mini-channel.
In: Physics of Fluids, 28 (1)
Artikel, Bibliographie
Hosseinzadeh, A. ; Sadiki, A. ; Janicka, J. (2016)
Assessment of the Dynamic SGS Wrinkling Combustion Modeling Using the Thickened Flame Approach Coupled with FGM Tabulated Detailed Chemistry.
In: Flow Turbulence and Combustion, 96 (4)
Artikel, Bibliographie
Jakirlic, S. ; Maduta, R. (2016)
"Steady" RANS Modeling for Improved Prediction of Wall-Bounded Separation.
In: Aiaa Journal, 54 (5)
Artikel, Bibliographie
Kintea, D. M. ; Breitenbach, J. ; Gurumurthy, V. Thammanna ; Roisman, I. V. ; Tropea, C. (2016)
On the influence of surface tension during the impact of particles on a liquid-gaseous interface.
In: Physics of Fluids, 28 (1)
Artikel, Bibliographie
Pfaller, Sebastian ; Possart, Gunnar ; Steinmann, Paul ; Rahimi, Mohammad ; Mueller-Plathe, Florian ; Boehm, Michael C. (2016)
Investigation of interphase effects in silica-polystyrene nanocomposites based on a hybrid molecular-dynamics-finite-element simulation framework.
In: Physical Review E, 93 (5)
Artikel, Bibliographie
Simon, Bernhard ; Filius, Adrian ; Tropea, Cameron ; Grundmann, Sven (2016)
IR thermography for dynamic detection of laminar-turbulent transition.
In: Experiments in Fluids, 57 (5)
Artikel, Bibliographie
Stegmann, Patrick G. ; Tropea, Cameron ; Jaervinen, Emma ; Schnaiter, Martin (2016)
Comparison of measured and computed phase functions of individual tropospheric ice crystals.
In: Journal of Quantitative Spectroscopy & Radiative Transfer, 178
Artikel, Bibliographie
Hidouri, A. ; Yahya, N. ; Boushaki, T. ; Sadiki, A. ; Sautet, J. C. (2016)
Numerical and experimental investigation of turbulent three separated jets.
In: Applied Thermal Engineering, 104
Artikel, Bibliographie
Kadoch, Benjamin ; Reimann, Thorsten ; Schneider, Kai ; Schaefer, Michael (2016)
Comparison of a spectral method With volume penalization and a finite volume method with body fitted grids for turbulent flows.
In: Computers & Fluids, 133
Artikel, Bibliographie
Knappstein, Robert ; Kuenne, Guido ; Ketelheun, Anja ; Koeser, Jan ; Becker, Lukas ; Heuer, Sebastian ; Schiemann, Martin ; Scherer, Viktor ; Dreizler, Andreas ; Sadiki, Amsini ; Janicka, J. (2016)
Devolatilization and volatiles reaction of individual coal particles in the context of FGM tabulated chemistry.
In: Combustion and Flame, 169
Artikel, Bibliographie
Kuhn, Simone ; Hartmann, Sebastien ; Elsaesser, Wolfgang (2016)
Photon-statistics-based classical ghost imaging with one single detector.
In: Optics Letters, 41 (12)
Artikel, Bibliographie
Zentgraf, Florian ; Baum, Elias ; Böhm, Benjamin ; Dreizler, Andreas ; Peterson, Brian (2016)
On the turbulent flow in piston engines: Coupling of statistical theory quantities and instantaneous turbulence.
In: Physics of Fluids, 28 (4)
Artikel, Bibliographie
Chen, X. ; Focke, C. ; Marschall, H. ; Bothe, D.
Hrsg.: Fritsching, Udo (2016)
Investigation of Elementary Processes of Non-Newtonian Droplets Inside Spray Processes by Means of Direct Numerical Simulation.
In: Process-Spray
Buchkapitel, Bibliographie
Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2016)
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: International Journal of Thermodynamics, 19 (1)
doi: 10.5541/ijot.5000156078
Artikel, Bibliographie
Falk, Paul Michael ; Meggers, F. ; Stephan, Peter ; Dammel, Frank (2016)
Comparison of District Heating Systems and Distributed Geothermal Network for Optimal Exergetic Performance.
Sustainable Built Environment (SBE) Regional Conference.
Konferenzveröffentlichung, Bibliographie
Siol, Sebastian ; Hellmann, Jan C. ; Tilley, S. David ; Graetzel, Michael ; Morasch, Jan ; Deuermeier, Jonas ; Jaegermann, Wolfram ; Klein, Andreas (2016)
Band Alignment Engineering at Cu2O/ZnO Heterointerfaces.
In: ACS Applied Materials & Interfaces, 8 (33)
doi: 10.1021/acsami.6b07325
Artikel, Bibliographie
Farwig, Reinhard ; Giga, Yoshikazu ; Hsu, Pen-Yuan (2016)
Initial Values for the Navier-Stokes Equations in Spaces with Weights in Time.
In: Funkcialaj Ekvacioj-Serio Internacia, 59 (2)
Artikel, Bibliographie
Junk, Markus ; Reitz, Michael ; Ströhle, Jochen ; Epple, Bernd (2016)
Technical and Economical Assessment of the Indirectly Heated Carbonate Looping Process.
In: Journal of Energy Resources Technology-Transactions of the Asme, 138 (4)
Artikel, Bibliographie
Ohlemüller, Peter ; Busch, Jan-Peter ; Reitz, Michael ; Stroehle, Jochen ; Epple, Bernd (2016)
Chemical-Looping Combustion of Hard Coal: Autothermal Operation of a 1 MWth Pilot Plant.
In: Journal of Energy Resources Technology-Transactions of the Asme, 138 (4)
Artikel, Bibliographie
Vegt, Nico F. A. van der ; Haldrup, Kristoffer ; Roke, Sylvie ; Zheng, Junrong ; Lund, Mikael ; Bakker, Huib J. (2016)
Water-Mediated Ion Pairing: Occurrence and Relevance.
In: Chemical Reviews, 116 (13)
Artikel, Bibliographie
Tehrani, Arash Hakimi ; Dörsam, Edgar ; Neumann, Jann (2016)
Improving Automation and Process Control of an Indirect Gravure (pad) Printing Machine.
In: Acta Polytechnica Hungarica, 13 (4)
Artikel, Bibliographie
Ganguly, Pritam ; Vegt, Nico F. A. van der ; Shea, Joan-Emma (2016)
Hydrophobic Association in Mixed Urea-TMAO Solutions.
In: Journal of Physical Chemistry Letters, 7 (15)
Artikel, Bibliographie
Guan, Lulu ; Yu, Haitao ; Shen, Jianqi ; Tropea, Cameron (2016)
Simulation of optical caustics associated with the tertiary rainbow of oblate droplets.
In: Applied Optics, 55 (23)
Artikel, Bibliographie
Rodriguez-Ropero, Francisco ; Roetzscher, Philipp ; Vegt, Nico F. A. van der (2016)
Comparison of Different TMAO Force Fields and Their Impact on the Folding Equilibrium of a Hydrophobic Polymer.
In: The journal of physical chemistry. B, 120 (34)
Artikel, Bibliographie
Roehrig, R. ; Jakirlic, S. ; Tropea, C. (2016)
Large eddy simulation of a light gas stratification break-up by an entraining turbulent fountain.
In: Journal of Turbulence, 17 (9)
Artikel, Bibliographie
Wang, Xiang ; Venzmer, Joachim ; Bonaccurso, Elmar (2016)
Surfactant-Enhanced Spreading of Sessile Water Drops on Polypropylene Surfaces.
In: Langmuir, 32 (33)
Artikel, Bibliographie
Rane, Kaustubh ; Vegt, Nico F. A. van der (2016)
Using Grand Canonical Monte Carlo Simulations to Understand the Role of Interfacial Fluctuations on Solvation at the Water-Vapor Interface.
In: Journal of Physical Chemistry B, 120 (36)
Artikel, Bibliographie
Ullmann, Sebastian ; Rotkvic, Marko ; Lang, Jens (2016)
POD-Galerkin reduced-order modeling with adaptive finite element snapshots.
In: Journal of Computational Physics, 325
Artikel, Bibliographie
Voyiatzis, Evangelos ; Mueller-Plathe, Florian ; Boehm, Michael C. (2016)
Influence of nanoparticle inclusion on the cavity size distribution and accessible volume in polystyrene - Silica nanocomposites.
In: Polymer, 101
Artikel, Bibliographie
Weber, Paul S. ; Bothe, Dieter (2016)
Applicability of the Linearized Theory of the Maxwell-Stefan Equations.
In: Aiche Journal, 62 (8)
Artikel, Bibliographie
Yang, Hua ; Zhang, Jianguo ; Mueller-Plathe, Florian (2016)
Extending reverse nonequilibrium molecular dynamics to the calculation of mutual diffusion coefficients in molecular fluid mixtures.
In: Molecular Simulation, 42 (16)
Artikel, Bibliographie
Karimi, Nader ; McGrath, Stephen ; Brown, Philip ; Weinkauff, Johannes ; Dreizler, Andreas (2016)
Generation of adverse pressure gradient in the circumferential flashback of a premixed flame.
In: Flow Turbulence and Combustion, 97 (2)
doi: 10.1007/s10494-015-9695-0
Artikel, Bibliographie
Buchenberg, Waltraud B. ; Wassermann, Florian ; Grundmann, Sven ; Jung, Bernd ; Simpson, Robin (2016)
Acquisition of 3D Temperature Distributions in Fluid Flow Using Proton Resonance Frequency Thermometry.
In: Magnetic Resonance in Medicine, 76 (1)
Artikel, Bibliographie
Dayal, Ram ; Gambaryan-Roisman, Tatiana (2016)
A novel numerical method for radiation exchange in granular medium.
In: Heat and Mass Transfer, 52 (11)
Artikel, Bibliographie
De Nicola, Antonio ; Kawakatsu, Toshihiro ; Mueller-Plathe, Florian ; Milano, Giuseppe (2016)
Fast relaxation of coarse-grained models of polymer interphases by hybrid particle-field molecular dynamics: Polystyrene-silica nanocomposites as an example.
In: European Physical Journal-Special Topics, 225 (8-9)
Artikel, Bibliographie
Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2016)
Global strong L-P well-posedness of the 3D primitive equations with heat and salinity diffusion.
In: Journal of Differential Equations, 261 (12)
Artikel, Bibliographie
Huang, Weizhang ; Kamenski, Lennard ; Lang, Jens (2016)
STABILITY OF EXPLICIT ONE-STEP METHODS FOR P1-FINITE ELEMENT APPROXIMATION OF LINEAR DIFFUSION EQUATIONS ON ANISOTROPIC MESHES.
In: Siam Journal on Numerical Analysis, 54 (3)
Artikel, Bibliographie
Kirillova, Alina ; Ionov, Leonid ; Roisman, Ilia V. ; Synytska, Alla (2016)
Hybrid Hairy Janus Particles for Anti-Icing and De-Icing Surfaces: Synergism of Properties and Effects.
In: Chemistry of Materials, 28 (19)
Artikel, Bibliographie
Liu, Shengyuan ; Böhm, Michael C. ; Müller-Plathe, Florian (2016)
Role of the interfacial area for structure and dynamics in polymer nanocomposites: molecular dynamics simulations of polystyrene with silica nanoparticles of different shapes.
In: Materials Research Express, 3 (10)
Artikel, Bibliographie
Metya, Atanu K. ; Singh, Jayant K. ; Mueller-Plathe, Florian (2016)
Ice nucleation on nanotextured surfaces: the influence of surface fraction, pillar height and wetting states.
In: Physical Chemistry Chemical Physics, 18 (38)
Artikel, Bibliographie
Rosenberger, David ; Hanke, Martin ; Vegt, Nico F. A. van der (2016)
Comparison of iterative inverse coarse-graining methods.
In: European Physical Journal-Special Topics, 225 (8-9)
Artikel, Bibliographie
Zhang, Ran ; Vegt, Nico F. A. van der (2016)
Study of Hydrophobic Clustering in Partially Sulfonated Polystyrene Solutions with a Systematic Coarse-Grained Model.
In: Macromolecules, 49 (19)
Artikel, Bibliographie
Reif, Michael ; Eichberg, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2016)
Call graph construction for Java libraries.
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering.
doi: 10.1145/2950290.2950312
Konferenzveröffentlichung, Bibliographie
Chen, Jian ; Dörsam, Edgar ; Spiehl, Dieter ; Hakimi Tehrani, Arash (2016)
Elastic model of paper stacks by considering the paper structure.
In: Nordic Pulp & Paper Research Journal (NPPRJ), 31 (4)
Artikel, Bibliographie
Göpfert, Florian (2016)
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Avdic, A. ; Kuenne, G. ; Janicka, J. (2016)
Flow Physics of a Bluff-Body Swirl Stabilized Flame and their Prediction by Means of a Joint Eulerian Stochastic Field and Tabulated Chemistry Approach.
In: Flow Turbulence and Combustion, 97 (4)
Artikel, Bibliographie
Maden, I. ; Maduta, R. ; Hofmann, J. ; Jakirlic, S. ; Kriegseis, J. ; Tropea, C. ; Grundmann, S. (2016)
Modelling the Plasma-actuator-related Turbulence Production in RANS Closures by Reference to Complementary Experimental Investigations.
In: Flow Turbulence and Combustion, 97 (4)
Artikel, Bibliographie
Pelz, P. F. ; Holl, M. ; Platzer, M. (2016)
Analytical method towards an optimal energetic and economical wind-energy converter.
In: Energy, 94
doi: 10.1016/j.energy.2015.10.128
Artikel, Bibliographie
Reitz, Michael ; Junk, Markus ; Stroehle, Jochen ; Epple, Bernd (2016)
Design and operation of a 300 kWth indirectly heated carbonate looping pilot plant.
In: International Journal of Greenhouse Gas Control, 54
Artikel, Bibliographie
Schremb, Markus ; Tropea, Cameron (2016)
Solidification of supercooled water in the vicinity of a solid wall.
In: Physical Review E, 94 (5)
Artikel, Bibliographie
Simon, Bernhard ; Fabbiane, Nicolo ; Nemitz, Timotheus ; Bagheri, Shervin ; Henningson, Dan S. ; Grundmann, Sven (2016)
In-flight active wave cancelation with delayed-x-LMS control algorithm in a laminar boundary layer.
In: Experiments in Fluids, 57 (10)
Artikel, Bibliographie
Stiehl, Roman ; Bode, Johannes ; Schorr, Juergen ; Krueger, Christian ; Dreizler, Andreas ; Böhm, Benjamin (2016)
Influence of intake geometry variations on in-cylinder flow and flow-spray interactions in a stratified direct-injection spark-ignition engine captured by time-resolved particle image velocimetry.
In: International Journal of Engine Research, 17 (9)
Artikel, Bibliographie
Masubuchi, Yuichi ; Langeloth, Michael ; Boehm, Michael C. ; Inoue, Tadashi ; Mueller-Plathe, Florian (2016)
A Multichain Slip-Spring Dissipative Particle Dynamics Simulation Method for Entangled Polymer Solutions.
In: Macromolecules, 49 (23)
Artikel, Bibliographie
Hutter, Kolumban ; Wang, Yongqi (2016)
Fluid and Thermodynamics. Volume 1: Basic Fluid Mechanics.
Buch, Bibliographie
Hutter, Kolumban ; Wang, Yongqi (2016)
Fluid and Thermodynamics. Volume 2: Advanced Fluid Mechanics and Thermodynamic Fundamentals.
Buch, Bibliographie
Wang, Chun ; Wang, Yongqi ; Peng, Chong ; Meng, Xiannan (2016)
Smoothed Particle Hydrodynamics Simulation of Water-Soil Mixture Flows.
In: Journal of Hydraulic Engineering, 142 (10)
doi: 10.1061/(ASCE)HY.1943-7900.0001163
Artikel, Bibliographie
Peng, Chong ; Guo, Xiaogang ; Wu, Wei ; Wang, Yongqi (2016)
Unified modelling of granular media with Smoothed Particle Hydrodynamics.
In: Acta Geotechnica, 11 (6)
doi: 10.1007/s11440-016-0496-y
Artikel, Bibliographie
Guo, Xiaogang ; Peng, Chong ; Wu, Wei ; Wang, Yongqi (2016)
A hypoplastic constitutive model for debris materials.
In: Acta Geotechnica, 11 (6)
doi: 10.1007/s11440-016-0494-0
Artikel, Bibliographie
Wang, W. N. ; Xu, Y. S. ; Backes, S. ; Li, A. ; Micciulla, S. ; Kayitmazer, A. B. ; Li, L. ; Guo, X. H. ; Klitzing, R. von (2016)
Construction of Compact Polyelectrolyte Multilayers Inspired by Marine Mussel: Effects of Salt Concentration and pH As Observed by QCM-D and AFM.
In: Langmuir, 32 (14)
Artikel, Bibliographie
Christau, S. ; Moller, T. ; Brose, F. ; Genzer, J. ; Soltwedel, O. ; Klitzing, R. von (2016)
Effect of gold nanoparticle hydrophobicity on thermally induced color change of PNIPAM brush/gold nanoparticle hybrids.
In: Polymer, 98
Artikel, Bibliographie
Dietrich, Axel ; Fraunholz, Christoph ; Dammel, Frank ; Stephan, Peter (2016)
Exergoeconomic Analysis of Concepts for Pumped Heat Electricity Storage Systems.
Joint Conference “Thermal Energy Storage – Perspectives and Applications in an Industrial Environment”. Frankfurt (01.05.2016-01.05.2016)
Konferenzveröffentlichung, Bibliographie
Winterling, Jella ; Dammel, Frank ; Stephan, Peter (2016)
Exergetische Analysen von thermisch vernetzten Fabrikprozessen.
Thermodynamik Kolloquium. Kaiserslautern (05.10.2016-07.10.2016)
Konferenzveröffentlichung, Bibliographie
Cai, Xuan ; Wörner, Martin ; Marschall, Holger ; Deutschmann, Olaf (2016)
Numerical study on the wettability dependent interaction of a rising bubble with a periodic open cellular structure.
In: Catalysis Today, 273
doi: 10.1016/j.cattod.2016.03.053
Artikel, Bibliographie
Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016)
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Darmstadt, Germany
Konferenzveröffentlichung, Bibliographie
Fleisch, Gilbert (2016)
Towards policy checks on passwords via fully homomorphic encryption.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016)
Computational Security of Quantum Encryption.
In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016
Buchkapitel, Bibliographie
Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016)
Towards a Unified Security Model for Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Konferenzveröffentlichung, Bibliographie
Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Konferenzveröffentlichung, Bibliographie
Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016)
LoT: a Reputation-based Trust System for Long-term Archiving.
Nice, France
Konferenzveröffentlichung, Bibliographie
Krohm, F. ; Kind, J. ; Savka, R. ; Alcaraz Janßen, M. ; Herold, D. ; Plenio, Herbert ; Thiele, C. M. ; Andrieu-Brunsen, A. (2016)
Photochromic spiropyran- and spirooxazine-homopolymers in mesoporous thin films by surface initiated ROMP.
In: Journal of Materials Chemistry C, 4 (18)
doi: 10.1039/C5TC04054J
Artikel, Bibliographie
Gerber, Nina
Hrsg.: Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (2016)
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Konferenzveröffentlichung, Bibliographie
Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2015)
Universality in random quantum networks.
In: Physical Review A, 92 (6)
doi: 10.1103/PhysRevA.92.062335
Artikel, Bibliographie
Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015)
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Physical Review A, 92 (6)
doi: 10.1103/PhysRevA.92.062322
Artikel, Bibliographie
Fath, Anja ; Bothe, Dieter (2015)
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, 77
Artikel, Bibliographie
Fath, Anja ; Bothe, Dieter (2015)
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, 77
Artikel, Bibliographie
Köser, J. ; Becker, L. G. ; Vorobiev, N. ; Schiemann, M. ; Scherer, V. ; Böhm, B. ; Dreizler, A. (2015)
Characterization of single coal particle combustion within oxygen-enriched environments using high-speed OH-PLIF.
In: Applied Physics B-Lasers and Optics, 121 (4)
doi: 10.1007/s00340-015-6253-3
Artikel, Bibliographie
Pellegrino, Giancarlo ; Tschürtz, Constantin ; Bodden, Eric ; Rossow, Christian
Hrsg.: Bos, Herbert ; Monrose, Fabian ; Blanc, Gregory (2015)
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Kyoto, Japan
doi: 10.1007/978-3-319-26362-5
Konferenzveröffentlichung, Bibliographie
Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias (2015)
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
Los Angeles, CA, USA
doi: 10.1145/2818000.2818028
Konferenzveröffentlichung, Bibliographie
Classen, Jiska (2015)
Building and Breaking Wireless Security.
Anderes, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Buch, Bibliographie
Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015)
Automated Software Diversity.
doi: 10.2200/S00686ED1V01Y201512SPT014
Buch, Bibliographie
Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015)
Certification of ICTs in Elections.
Buch, Bibliographie
Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015)
Detection and Forensics of Domains Hijacking.
San Diego, CA, USA
Konferenzveröffentlichung, Bibliographie
Mayer, Peter ; Volkamer, Melanie (2015)
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Los Angeles, CA, USA
doi: 10.1145/2818000.2818043
Konferenzveröffentlichung, Bibliographie
Schlipf, Mario (2015)
Password Policy Crawler.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
De, Simanta ; Bhattacharyya, Somnath ; Hardt, Steffen (2015)
Electroosmotic flow in a slit nanochannel with superhydrophobic walls.
In: Microfluidics and Nanofluidics, 19 (6)
Artikel, Bibliographie
Hajian, Ramin ; Hardt, Steffen (2015)
Formation and lateral migration of nanodroplets via solvent shifting in a microfluidic device.
In: Microfluidics and Nanofluidics, 19 (6)
Artikel, Bibliographie
Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015)
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on. Lincoln, Nebraska, USA (09.11.2015-13.11.2015)
Konferenzveröffentlichung, Bibliographie
Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015)
Design Principles for HFEv- based Signature Schemes.
Auckland, New Zealand
Konferenzveröffentlichung, Bibliographie
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Artikel, Bibliographie
Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Konferenzveröffentlichung, Bibliographie
Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max (2015)
Rating Decomposition with Conjoint Analysis and Machine Learning.
Barcelona, Spain
Konferenzveröffentlichung, Bibliographie
Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie
Nejati, I. ; Dietzel, M. ; Hardt, Steffen (2015)
Conjugated liquid layers driven by the short-wavelength Bénard–Marangoni
instability: experiment and numerical simulation.
In: J. Fluid Mech., 783
Artikel, Bibliographie
Mohr, Till ; Breuer, Stefan ; Giuliani, G. ; Elsäßer, Wolfgang (2015)
Two-dimensional tomographic terahertz imaging by homodyne self-mixing.
In: Optics Express, 23 (21)
doi: 10.1364/OE.23.027221
Artikel, Bibliographie
Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
Hrsg.: Gill, Andy (2015)
Performance problems you can fix: a dynamic analysis of memoization opportunities.
Pittsburgh, PA, USA
doi: 10.1145/2814270.2814290
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Mazaheri, Sogol (2015)
Notions of Deniable Message Authentication.
Denver, Colorado, USA
doi: 10.1145/2808138.2808143
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Konferenzveröffentlichung, Bibliographie
Saissi, Habib ; Bokor, Peter ; Suri, Neeraj (2015)
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
Konferenzveröffentlichung, Bibliographie
Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le (2015)
Formal Accountability for Biometric Surveillance: A Case Study.
Luxembourg
Konferenzveröffentlichung, Bibliographie
Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan (2015)
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
Denver, Colorado, USA
doi: 10.1145/2808414.2808417
Konferenzveröffentlichung, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015)
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Denver, Colorado, USA
Konferenzveröffentlichung, Bibliographie
Shulman, Haya ; Waidner, Michael (2015)
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16)
Artikel, Bibliographie
Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Konferenzveröffentlichung, Bibliographie
Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015)
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11)
doi: 10.1007/s11623-015-0512-7
Artikel, Bibliographie
Albert, C. ; Kromer, Johannes ; Robertson, A. M. ; Bothe, D. (2015)
Dynamic behaviour of buoyant high viscosity droplets rising in a quiescent liquid.
In: Journal of Fluid Mechanics, 778
Artikel, Bibliographie
Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2015)
Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP.
44th International Conference on Parallel Processing (ICPP 2015). Beijing, China (01.09.2015-04.09.2015)
doi: 10.1109/ICPP.2015.68
Konferenzveröffentlichung, Bibliographie
Shulman, Haya ; Waidner, Michael
Hrsg.: Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (2015)
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
Vienna, Austria
doi: 10.1007/978-3-319-24174-6_1
Konferenzveröffentlichung, Bibliographie
Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015)
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS). Florence, Italy (28.09.2015-30.09.2015)
doi: 10.1109/CNS.2015.7346895
Konferenzveröffentlichung, Bibliographie
Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2015)
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
Florence
doi: 10.1109/CNS.2015.7346844
Konferenzveröffentlichung, Bibliographie
Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015)
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Konferenzveröffentlichung, Bibliographie
Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas (2015)
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
Konferenzveröffentlichung, Bibliographie
Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015)
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35)
Artikel, Bibliographie
Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015)
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
Paris, France
Konferenzveröffentlichung, Bibliographie
Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015)
Practical Covert Channels for WiFi Systems.
Florence, Italy
Konferenzveröffentlichung, Bibliographie
Shulman, Haya ; Waidner, Michael (2015)
Towards Security of Internet's Naming Infrastructure.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Hide And Seek: Detecting Sensors in P2P Botnets.
Florence, Italy
doi: 10.1109/CNS.2015.7346908
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Hrsg.: Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (2015)
Extending Helios Towards Private Eligibility Verifiability.
Bern, Switzerland
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Hrsg.: Foresti, Sara (2015)
A Socio-Technical Investigation into Smartphone Security.
Konferenzveröffentlichung, Bibliographie
Mantel, Heiko ; Starostin, Artem (2015)
Transforming Out Timing Leaks, More or Less.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Weinkauff, J. ; Greifenstein, M. ; Dreizler, A. ; Böhm, B. (2015)
Time resolved three-dimensional flamebase imaging of a lifted jet flame by laser scanning.
In: Measurement Science and Technology, 26 (10)
doi: 10.1088/0957-0233/26/10/105201
Artikel, Bibliographie
Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015-25.10.2015)
Konferenzveröffentlichung, Bibliographie
Gong, Liang ; Pradel, Michael ; Sen, Koushik (2015)
JITProf: pinpointing JIT-unfriendly JavaScript code.
Bergamo, Italy
doi: 10.1145/2786805.2786831
Konferenzveröffentlichung, Bibliographie
Nyman, Thomas ; McGillion, Brian ; Asokan, N. (2015)
On Making Emerging Trusted Execution Environments Accessible to Developers.
Heraklion, Crete, Greece
doi: 10.1007/978-3-319-22846-4_4
Konferenzveröffentlichung, Bibliographie
Tamrakar, Sandeep ; Ekberg, Jan-Erik ; Laitinen, Pekka (2015)
On Rehoming the Electronic Id to TEEs.
Helsinki, Finland
Konferenzveröffentlichung, Bibliographie
Mineraud, Julien ; Lancerin, Federico ; Balasubramaniam, Sasitharan ; Conti, Mauro ; Tarkoma, Sasu (2015)
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
Helsinki, Finland
Konferenzveröffentlichung, Bibliographie
Meskanen, Tommi ; Ramezanian, Sara ; Liu, Jian ; Niemi, Valtteri (2015)
Private Membership Test for Bloom Filters.
Helsinki, Finland
Konferenzveröffentlichung, Bibliographie
Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015)
Capacity and Data Complexity in Multidimensional Linear Attack.
Konferenzveröffentlichung, Bibliographie
Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj (2015)
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015)
PALPAS - PAsswordLess PAssword Synchronization.
Université Paul Sabatier, Toulouse, France
Konferenzveröffentlichung, Bibliographie
Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan (2015)
PUF-based Software Protection for Low-end Embedded Devices.
Heraklion, Crete, Greece
doi: 10.1007/978-3-319-22846-4_1
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015)
Data Is a Stream: Security of Stream-Based Channels.
Santa Barbara, CA, USA
Konferenzveröffentlichung, Bibliographie
Buescher, Niklas ; Katzenbeisser, Stefan (2015)
Faster Secure Computation through Automatic Parallelization.
Washington, D.C., USA
Konferenzveröffentlichung, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015)
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15). Austin, TX (10.08.2016-12.08.2016)
Konferenzveröffentlichung, Bibliographie
Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015)
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15). Heraklion, Greece (24.08.2015-26.08.2015)
doi: 10.1007/978-3-319-22846-4_11
Konferenzveröffentlichung, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie
Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric (2015)
How Current Android Malware Seeks to Evade Automated Code Analysis.
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Toulouse, France
doi: 10.1109/ARES.2015.75
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Hrsg.: Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (2015)
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Heraklion, Crete, Greece
doi: 10.1007/978-3-319-22846-4_7
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015)
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
Report, Bibliographie
Schönecker, Clarissa ; Hardt, Steffen (2015)
Assessment of drag reduction at slippery, topographically structured surfaces.
In: Microfluidics and Nanofluidics, 19 (1)
Artikel, Bibliographie
Sinn, N. ; Alishahi, M. ; Hardt, Steffen (2015)
Detachment of particles and particle clusters from liquid/liquid interfaces.
In: J. Colloid Interface Science, 458
Artikel, Bibliographie
Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015)
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755)
Artikel, Bibliographie
Prangemeier, Tim ; Nejati, Iman ; Müller, Andreas ; Endres, Philip ; Fratzl, Mario ; Dietzel, Mathias (2015)
Optimized thermoelectric sensitivity measurement for differential thermometry with thermopiles.
In: Experimental Thermal and Fluid Science, 65
doi: 10.1016/j.expthermflusci.2015.01.018
Artikel, Bibliographie
Janko, Marek ; Jocher, Michael ; Boehm, Alexander ; Babel, Laura ; Bump, Steven ; Biesalski, Markus ; Meckel, Tobias ; Stark, Robert W. (2015)
Cross-Linking Cellulosic Fibers with Photoreactive Polymers: Visualization with Confocal Raman and Fluorescence Microscopy.
In: Biomacromolecules, 16 (7)
Artikel, Bibliographie
Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015)
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20
doi: 10.1016/j.pmcj.2014.09.001
Artikel, Bibliographie
Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko (2015)
Hybrid Monitors for Concurrent Noninterference.
Verona, Italy
doi: 10.1109/CSF.2015.17
Konferenzveröffentlichung, Bibliographie
Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik (2015)
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
Baltimore, MD, USA
doi: 10.1145/2771783.2771809
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015)
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
Dreseden
Konferenzveröffentlichung, Bibliographie
Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil (2015)
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
Konferenzveröffentlichung, Bibliographie
Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015)
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
Artikel, Bibliographie
Nguyen Quang Do, Lisa ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015)
Toward a Just-in-Time Static Analysis.
Artikel, Bibliographie
Letzkus, Fabian (2015)
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit (2015)
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
Prague, Czech Republic
Konferenzveröffentlichung, Bibliographie
Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015)
Stream ciphers in the IoT: Grain and Trivium.
Report, Bibliographie
Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015)
Block ciphers PRESENT and SEA in comparison.
Report, Bibliographie
Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015)
Comparing Lightweight Hash Functions – PHOTON & Quark.
Report, Bibliographie
Pini, Cesare ; Baier, Tobias ; Dietzel, Mathias (2015)
Energy conversion by surface-tension-driven charge separation.
In: Microfluidics and Nanofluidics, 19 (3)
Artikel, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558)
Artikel, Bibliographie
Kornhaas, Michael ; Sternel, Dörte C. ; Schäfer, Michael (2015)
Efficient numerical simulation of aeroacoustics for low Mach number flows interacting with structures.
In: Computational Mechanics, 55 (6)
Artikel, Bibliographie
Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015)
A View on Privacy & Trust in IoT.
First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC). London, UK
doi: 10.1109/ICCW.2015.7247581
Konferenzveröffentlichung, Bibliographie
Voss, Agnieszka ; Dietz, Christian ; Stocker, Annika ; Stark, Robert W. (2015)
Quantitative measurement of the mechanical properties of human antibodies with sub-10-nm resolution in a liquid environment.
In: Nano Research, 8 (6)
Artikel, Bibliographie
Schäfer, Marcel ; Mair, Sebastian ; Berchtold, Waldemar ; Steinebach, Martin (2015)
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
Portland, Oregon
doi: 10.1145/2756601.2756611
Konferenzveröffentlichung, Bibliographie
Wilk, Stefan ; Schönherr, Sophie ; Stohr, Denny ; Effelsberg, Wolfgang (2015)
EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System.
Brussels, Belgium
doi: 10.1145/2745197.2745205
Konferenzveröffentlichung, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
DAC '15: The 52nd Annual Design Automation Conference 2015. San Francisco, California (07.06.2015-11.06.2015)
Konferenzveröffentlichung, Bibliographie
Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015)
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
Konferenzveröffentlichung, Bibliographie
Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015)
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Konferenzveröffentlichung, Bibliographie
Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Konferenzveröffentlichung, Bibliographie
Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Hrsg.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Buchkapitel, Bibliographie
Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report, Bibliographie
Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report, Bibliographie
Günther, Felix ; Poettering, Bertram (2015)
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
Queensland University of Technology (QUT), Brisbane, Australia
Konferenzveröffentlichung, Bibliographie
Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015)
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
Vancouver, Canada
doi: 10.4108/icst.tridentcom.2015.259694
Konferenzveröffentlichung, Bibliographie
Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias (2015)
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
New York
doi: 10.1145/2766498.2766514
Konferenzveröffentlichung, Bibliographie
Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Konferenzveröffentlichung, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015)
Security and Privacy Challenges in Industrial Internet of Things.
Konferenzveröffentlichung, Bibliographie
Struck, Patrick (2015)
On the difference between hardness and security: a comparison of lattice-based signature schemes.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Metzler, M. ; Pelz, P. F. (2015)
Draft Tube Design Method for Operation at optimal Coefficient of Performance in Low Head Hydropower.
In: WasserWirtschaftExtra, 105 (13)
Artikel, Bibliographie
Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. (2015)
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: Physical Review Letters, 114 (17)
doi: 10.1103/PhysRevLett.114.173601
Artikel, Bibliographie
Pradel, Michael ; Schuh, Parker ; Sen, Koushik (2015)
TypeDevil: dynamic type inconsistency analysis for JavaScript.
Florence, Italy
doi: 10.1109/ICSE.2015.51
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Müller, Jan (2015)
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Oswald, Florian (2015)
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
Konferenzveröffentlichung, Bibliographie
Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15). San Jose, California (18.05.2015-20.05.2015)
doi: 10.1109/SP.2015.32
Konferenzveröffentlichung, Bibliographie
Winter, Stefan ; Piper, Thorsten ; Schwahn, Oliver ; Natella, Roberto ; Suri, Neeraj ; Cotroneo, Domenico (2015)
GRINDER: On Reusability of Fault Injection Tools.
Konferenzveröffentlichung, Bibliographie
Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia (2015)
Tor Experimentation Tools.
FAIRMONT, SAN JOSE, CA
Konferenzveröffentlichung, Bibliographie
Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015)
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50
Artikel, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Konferenzveröffentlichung, Bibliographie
Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015)
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Konferenzveröffentlichung, Bibliographie
Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Konferenzveröffentlichung, Bibliographie
Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah (2015)
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
Florence, Italy
Konferenzveröffentlichung, Bibliographie
Hartmann, S. ; Friedrich, F. ; Molitor, A. ; Reichert, M. ; Elsaesser, W. ; Walser, R. (2015)
Tailored quantum statistics from broadband states of light.
In: New Journal of Physics, 17
doi: 10.1088/1367-2630/17/4/043039
Artikel, Bibliographie
Dörr, A. ; Hardt, Steffen (2015)
Driven particles at fluid interfaces acting as capillary dipoles.
In: Journal of Fluid Mechanics, 770
Artikel, Bibliographie
Eifert, Alexander ; Petit, Julien ; Baier, Tobias ; Bonaccurso, Elmar ; Hardt, Steffen (2015)
Inscribing wettability gradients onto polymer substrates with different stiffness using corona discharge in point-to-plane geometry.
In: Applied Surface Science, 330
Artikel, Bibliographie
Shrestha, S. ; Tiwari, S. ; Klar, A. ; Hardt, Steffen (2015)
Numerical simulation of a moving rigid body in a rarefied gas.
In: Journal of Computational Physics, 292
Artikel, Bibliographie
Winter, Matthias (2015)
Heat Transfer Mechanisms During Spray Cooling of Electronic Devices.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Acosta, Matias ; Liu, Na ; Deluca, Marco ; Heidt, Sabrina ; Ringl, Ines ; Dietz, Christian ; Stark, Robert W. ; Jo, Wook (2015)
Tailoring ergodicity through selective A-site doping in the Bi1/2Na1/2TiO3–Bi1/2K1/2TiO3 system.
In: Journal of Applied Physics, 117 (13)
doi: 10.1063/1.4916719
Artikel, Bibliographie
Tancreti, Matthew ; Sundaram, Vinaitheerthan ; Bagchi, Saurabh ; Eugster, Patrick (2015)
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks.
14th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN 2015). Seattle, WA, USA
doi: 10.1145/2737095.2737096
Konferenzveröffentlichung, Bibliographie
Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_17
Konferenzveröffentlichung, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_26
Konferenzveröffentlichung, Bibliographie
Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Konferenzveröffentlichung, Bibliographie
Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric (2015)
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.
Report, Bibliographie
Schiwek, Simon ; Heim, Lars-Oliver ; Stark, Robert W. ; Dietz, Christian (2015)
Manipulation of polystyrene nanoparticles on a silicon wafer in the peak force tapping mode in water: pH-dependent friction and adhesion force.
In: Journal of Applied Physics, 117 (10)
doi: 10.1063/1.4914354
Artikel, Bibliographie
Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja (2015)
Ask The Experts: Cybersecurity.
Report, Bibliographie
Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Hrsg.: Dodis, Yevgeniy ; Nielsen, Arno Buus (2015)
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
Warsaw, Poland
doi: 10.1007/978-3-662-46497-7_17
Konferenzveröffentlichung, Bibliographie
Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015)
Evaluation of User Feedback in Smart Home for Situational Context Identification.
St. Louis, MO, USA
doi: 10.1109/PERCOMW.2015.7133987
Konferenzveröffentlichung, Bibliographie
Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf (2015)
A Concept for a C2X-based Crossroad Assistant.
St. Louis, MO, USA
doi: 10.1109/PERCOMW.2015.7134063
Konferenzveröffentlichung, Bibliographie
Nguyen, The An Binh ; Englert, Frank ; Farr, Simon ; Gottron, Christian ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015)
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
Konferenzveröffentlichung, Bibliographie
Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität Darmstadt
Diplom- oder Magisterarbeit, Bibliographie
Lang, Sebastian ; Kazdal, Timur J. ; Kuehl, Frank ; Hampe, Manfred J. (2015)
Experimental investigation and numerical simulation of the electrolyte loss in a HT-PEM fuel cell.
In: International Journal of Hydrogen Energy, 40 (2)
Artikel, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22nd Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, USA (08.02.2015-11.02.2015)
doi: 10.14722/ndss.2015.23113
Konferenzveröffentlichung, Bibliographie
Mohr, Till ; Breuer, Stefan ; Blömer, Dominik ; Simonetta, Marcello ; Patel, Sanketkumar ; Schlosser, Malte ; Deninger, Anselm ; Birkl, Gerhard ; Giuliani, Guido ; Elsäßer, Wolfgang (2015)
Terahertz homodyne self-mixing transmission spectroscopy.
In: Applied Physics Letters, 106 (6)
doi: 10.1063/1.4908059
Artikel, Bibliographie
Rauch, Simon ; Drzewietzki, Lukas ; Klehr, Andreas ; Sacher, Joachim ; Elsäßer, Wolfgang ; Breuer, Stefan (2015)
Experimental Study of the Timing Jitter of a Passively Mode-Locked External-Cavity Semiconductor Laser Subject to Repetition Rate Transitions and Optical Feedback.
In: IEEE Journal of Quantum Electronics, 51 (4)
doi: 10.1109/JQE.2015.2402431
Artikel, Bibliographie
Waidner, Michael (2015)
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.
Report, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Konferenzveröffentlichung, Bibliographie
Herzberg, Amir ; Shulman, Haya (2015)
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19)
Artikel, Bibliographie
Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Konferenzveröffentlichung, Bibliographie
Gerber, Paul ; Volkamer, Melanie (2015)
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2)
doi: 10.1007/s11623-015-0375-y
Artikel, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015)
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1)
doi: 10.1145/2738210.2738214
Artikel, Bibliographie
Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015)
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, 48 (2)
doi: 10.1088/0953-4075/48/2/025501
Artikel, Bibliographie
Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco (2015)
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
Las Vegas, NV
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Artikel, Bibliographie
Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015)
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015
Artikel, Bibliographie
Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Konferenzveröffentlichung, Bibliographie
Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015)
Zertifizierte Apps.
Bad-Godesberg in Bonn Gau-Algesheim
Konferenzveröffentlichung, Bibliographie
Abele, Eberhard ; Stoffregen, Hanns Alexander ; Kniepkamp, Michael ; Lang, Sebastian ; Hampe, Manfred (2015)
Selective laser melting for manufacturing of thin-walled porous elements.
In: Journal of Materials Processing Technology, 215
Artikel, Bibliographie
Klein, Benedikt ; Kummer, Florian ; Keil, Markus ; Oberlack, Martin (2015)
An extension of the SIMPLE based discontinuous Galerkin solver to unsteady incompressible flows.
In: International Journal for Numerical Methods in Fluids, 77 (10)
doi: 10.1002/fld.3994
Artikel, Bibliographie
Maric, Tomislav ; Marschall, H. ; Bothe, D. (2015)
lentFoam - A hybrid Level Set / Front Tracking method on unstructured meshes.
In: Computers and Fluids, (113)
doi: 10.1016/j.compfluid.2014.12.019
Artikel, Bibliographie
Bohlin, Alexis ; Mann, Markus ; Patterson, Brian D. ; Dreizler, Andreas ; Kliewer, Christopher J. (2015)
Development of two-beam femtosecond/picosecond one-dimensional rotational coherent anti-Stokes Raman spectroscopy: Time-resolved probing of flame wall interactions.
In: Proceedings of the Combustion Institute, 35
Artikel, Bibliographie
Dreizler, A. ; Böhm, B. (2015)
Advanced laser diagnostics for an improved understanding of premixed flame-wall interactions.
In: Proceedings of the Combustion Institute, 35 (1)
doi: 10.1016/j.proci.2014.08.014
Artikel, Bibliographie
Peterson, B. ; Baum, E. ; Böhm, B. ; Dreizler, A. (2015)
Early flame propagation in a spark-ignition engine measured with quasi 4D-diagnostics.
In: Proceedings of the Combustion Institute, 35 (3)
doi: 10.1016/j.proci.2014.05.131
Artikel, Bibliographie
Peterson, Brian ; Baum, Elias ; Böhm, Benjamin ; Sick, Volker ; Dreizler, Andreas (2015)
Spray-induced temperature stratification dynamics in a gasoline direct-injection engine.
In: Proceedings of the Combustion Institute, 35
Artikel, Bibliographie
Weber, Christoph ; Drzewietzki, Lukas ; Rossetti, Mattia ; Xu, Tianhong ; Bardella, Paolo ; Simos, Hercules ; Mesaritakis, Charis ; Ruiz, Mike ; Krestnikov, Igor ; Livshits, Daniil ; Krakowski, Michel ; Syvridis, Dimitris ; Montrosset, Ivo ; Rafailov, Edik U. ; Elsaesser, Wolfgang ; Breuer, Stefan (2015)
Picosecond pulse amplification up to a peak power of 42 W by a quantum-dot tapered optical amplifier and a mode-locked laser emitting at 1.26 mu m.
In: Optics Letters, 40 (3)
Artikel, Bibliographie
Ganguly, Pritam ; Hajari, Timir ; Shea, Joan-Emma ; Vegt, Nico F. A. van der (2015)
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment.
In: Journal of Physical Chemistry Letters, 6 (4)
Artikel, Bibliographie
Bolkart, Martin ; Hieber, Matthias (2015)
Pointwise upper bounds for the solution of the Stokes equation on L-sigma(infinity)(Omega) and applications.
In: Journal of Functional Analysis, 268 (7)
Artikel, Bibliographie
Debrabant, Kristian ; Lang, Jens (2015)
On asymptotic global error estimation and control of finite difference solutions for semilinear parabolic equations.
In: Computer Methods in Applied Mechanics and Engineering, 288
Artikel, Bibliographie
Hieber, Matthias ; Murata, Miho (2015)
THE L-P-APPROACH TO THE FLUID-RIGID BODY INTERACTION PROBLEM FOR COMPRESSIBLE FLUIDS.
In: Evolution Equations and Control Theory, 4 (1)
Artikel, Bibliographie
Liu, Shengyuan ; Gerisch, Alf ; Rahimi, Mohammad ; Lang, Jens ; Boehm, Michael C. ; Mueller-Plathe, Florian (2015)
Robustness of a new molecular dynamics-finite element coupling approach for soft matter systems analyzed by uncertainty quantification.
In: Journal of Chemical Physics, 142 (10)
Artikel, Bibliographie
Rodriguez-Ropero, Francisco ; Vegt, Nico F. A. van der (2015)
On the urea induced hydrophobic collapse of a water soluble polymer.
In: Physical Chemistry Chemical Physics, 17 (13)
Artikel, Bibliographie
Bogris, A. ; Juretzka, C. ; Simos, H. ; Syvridis, D. ; Roditi, E. ; Elsasser, W. ; Carras, M. (2015)
Experimental investigation of intensity noise in injection locked mid-infrared quantum cascade lasers.
In: Proceedings of the SPIE, 9382
Artikel, Bibliographie
Chen, Xingyuan ; Schäfer, Michael ; Bothe, Dieter (2015)
Numerical modeling and investigation of viscoelastic fluid-structure interaction applying an implicit partitioned coupling algorithm.
In: Journal of Fluids and Structures, 54
Artikel, Bibliographie
Domschke, Pia ; Kolb, Oliver ; Lang, Jens (2015)
Adjoint-based error control for the simulation and optimization of gas and water supply networks.
In: Applied Mathematics and Computation, 259
doi: 10.1016/j.amc.2015.03.029
Artikel, Bibliographie
Hajari, Timir ; Vegt, Nico F. A. van der (2015)
Publisher's Note: "Solvation thermodynamics of amino acid side chains on a short peptide backbone" J. Chem. Phys. 142, 144502 (2015).
In: The Journal of chemical physics, 142 (16)
Artikel, Bibliographie
Hajari, Timir ; Vegt, Nico F. A. van der (2015)
Solvation thermodynamics of amino acid side chains on a short peptide backbone.
In: Journal of Chemical Physics, 142 (14)
Artikel, Bibliographie
Juretzka, Carsten ; Simos, Hercules ; Bogris, Adonis ; Syvridis, Dimitris ; Elsaesser, Wolfgang ; Carras, Mathieu (2015)
Intensity Noise Properties of Midinfrared Injection Locked Quantum Cascade Lasers: II. Experiments.
In: Ieee Journal of Quantum Electronics, 51 (1)
Artikel, Bibliographie
Karimi, Nader ; Heeger, Christoph ; Christodoulou, Loizos ; Dreizler, Andreas (2015)
Experimental and Theoretical Investigation of the Flashback of a Swirling, Bluff-Body Stabilised, Premixed Flame.
In: Zeitschrift Fur Physikalische Chemie-International Journal of Research in Physical Chemistry & Chemical Physics, 229 (5)
Artikel, Bibliographie
Kuenne, Guido ; Euler, Matthias ; Ketelheun, Anja ; Avdic, Amer ; Dreizler, Andreas ; Janicka, J. (2015)
A Numerical Study of the Flame Stabilization Mechanism Being Determined by Chemical Reaction Rates Submitted to Heat Transfer Processes.
In: Zeitschrift Fur Physikalische Chemie-International Journal of Research in Physical Chemistry & Chemical Physics, 229 (5)
Artikel, Bibliographie
Mertens, Nicolas ; Alobaid, Falah ; Starkloff, Ralf ; Epple, Bernd ; Kim, Hyun-Gee (2015)
Comparative investigation of drum-type and once-through heat recovery steam generator during start-up.
In: Applied Energy, 144
Artikel, Bibliographie
Pfaff, Sebastian ; Ulbrich, Stefan (2015)
Optimal Boundary Control of Nonlinear Hyperbolic Conservation Laws with Switched Boundary Data.
In: SIAM Journal on Control and Optimization, 53 (3)
Artikel, Bibliographie
Taherian, Fereshte ; Leroy, Frederic ; Vegt, Nico F. A. van der (2015)
Interfacial tension does not drive asymmetric nanoscale electrowetting on graphene.
In: Langmuir : the ACS journal of surfaces and colloids, 31 (16)
Artikel, Bibliographie
Yang, Hua ; Zhang, Jianguo ; Mueller-Plathe, Florian ; Yang, Yongbiao (2015)
A reverse nonequilibrium molecular dynamics method for calculating the mutual diffusion coefficient for binary fluids.
In: Chemical Engineering Science, 130
Artikel, Bibliographie
Fath, Anja ; Horn, Tobias ; Gambaryan-Roisman, Tatiana ; Stephan, Peter ; Bothe, Dieter (2015)
Numerical and experimental analysis of short-scale Marangoni convection on heated structured surfaces.
In: International Journal of Heat and Mass Transfer, 86
Artikel, Bibliographie
Fischer, Sebastian ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2015)
On the development of a thin evaporating liquid film at a receding liquid/vapour-interface.
In: International Journal of Heat and Mass Transfer, 88
Artikel, Bibliographie
Recklin, Viktor ; Pattamatta, Arvind ; Stephan, Peter (2015)
Experimental investigation on the thermo-hydrodynamics of oscillatory meniscus in a capillary tube using FC-72 as a working fluid.
In: International Journal of Multiphase Flow, 75
Artikel, Bibliographie
Bothe, D. ; Dreyer, W. (2015)
Continuum thermodynamics of chemically reacting fluid mixtures.
In: Acta Mechanica, 226 (6)
Artikel, Bibliographie
Farwig, Reinhard ; Nakatsuka, Tomoyuki ; Taniuchi, Yasushi (2015)
Existence of solutions on the whole time axis to the Navier-Stokes equations with precompact range in L (3).
In: Archiv Der Mathematik, 104 (6)
Artikel, Bibliographie
Seidel, A. ; Wagner, S. ; Dreizler, A. ; Ebert, V. (2015)
Robust, spatially scanning, open-path TDLAS hygrometer using retro-reflective foils for fast tomographic 2-D water vapor concentration field measurements.
In: Atmospheric Measurement Techniques, 8 (5)
Artikel, Bibliographie
Schäfer, C. G. ; Winter, T. ; Heidt, S. ; Dietz, C. ; Ding, T. ; Baumberg, J. J. ; Gallei, M. (2015)
Smart polymer inverse-opal photonic crystal films by melt-shear organization for hybrid core–shell architectures.
In: J. Mater. Chem. C, 3 (10)
doi: 10.1039/C4TC02788D
Artikel, Bibliographie
Barckmann, K. ; Tropea, Cameron ; Grundmann, S. (2015)
Attenuation of Tollmien-Schlichting Waves Using Plasma Actuator Vortex Generators.
In: Aiaa Journal, 53 (5)
Artikel, Bibliographie
Criscione, A. ; Roisman, Ilia V. ; Jakirlić, Suad ; Tropea, Cameron (2015)
Towards modelling of initial and final stages of supercooled water solidification.
In: International Journal of Thermal Sciences, 92
Artikel, Bibliographie
Fabbiane, Nicolo ; Simon, Bernhard ; Fischer, Felix ; Grundmann, Sven ; Bagheri, Shervin ; Henningson, Dan S. (2015)
On the role of adaptivity for robust laminar flow control.
In: Journal of Fluid Mechanics, 767
Artikel, Bibliographie
Gatti, Davide ; Guettler, Andreas ; Frohnapfel, Bettina ; Tropea, Cameron (2015)
Experimental assessment of spanwise-oscillating dielectric electroactive surfaces for turbulent drag reduction in an air channel flow.
In: Experiments in Fluids, 56 (5)
Artikel, Bibliographie
Jakirlić, Suad ; Maduta, R. (2015)
Extending the bounds of 'steady' RANS closures: Toward an instability-sensitive Reynolds stress model.
In: International Journal of Heat and Fluid Flow, 51
Artikel, Bibliographie
Reeh, Andreas D. ; Tropea, Cameron (2015)
Behaviour of a natural laminar flow aerofoil in flight through atmospheric turbulence.
In: Journal of Fluid Mechanics, 767
Artikel, Bibliographie
Widmann, A. ; Tropea, Cameron (2015)
Parameters influencing vortex growth and detachment on unsteady aerodynamic profiles.
In: Journal of Fluid Mechanics, 773
Artikel, Bibliographie
Alobaid, Falah ; Starkloff, Ralf ; Pfeiffer, Stefan ; Karner, Karl ; Epple, Bernd ; Kim, Hyun-Gee (2015)
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part A: Part loads and off-design operation.
In: Fuel, 153
Artikel, Bibliographie
Alobaid, Falah ; Starkloff, Ralf ; Pfeiffer, Stefan ; Karner, Karl ; Epple, Bernd ; Kim, Hyun-Gee (2015)
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part B: Start-up procedure.
In: Fuel, 153
Artikel, Bibliographie
Farwig, Reinhard ; Riechwald, Paul Felix (2015)
Very weak solutions to the Navier-Stokes system in general unbounded domains.
In: Journal of Evolution Equations, 15 (2)
Artikel, Bibliographie
Molitor, Andreas ; Hartmann, Sebastien ; Elsaesser, Wolfgang (2015)
Investigations on spatio-spectrally resolved Stokes polarization parameters of oxide-confined vertical-cavity surface-emitting lasers.
In: Optics Letters, 40 (13)
Artikel, Bibliographie
Stroh, Alexander ; Alobaid, Falah ; Busch, Jan-Peter ; Ströhle, Jochen ; Epple, Bernd (2015)
3-D numerical simulation for co-firing of torrefied biomass in a pulverized-fired 1 MWth combustion chamber.
In: Energy, 85
Artikel, Bibliographie
Tone, Robert ; Bornemann, Nils ; Mechau, Norman ; Doersam, Edgar (2015)
Impedance spectroscopy: A method for determining the degree of intermixing in stacks of organic semiconductors.
In: Physica Status Solidi B-Basic Solid State Physics, 252 (6)
Artikel, Bibliographie
Zhang, Jianguo ; Mueller-Plathe, Florian ; Leroy, Frederic (2015)
Pinning of the Contact Line during Evaporation on Heterogeneous Surfaces: Slowdown or Temporary Immobilization? Insights from a Nanoscale Study.
In: Langmuir : the ACS journal of surfaces and colloids, 31 (27)
Artikel, Bibliographie
Fuest, Frederik ; Barlow, Robert S. ; Magnotti, Gaetano ; Dreizler, Andreas ; Ekoto, Isaac W. ; Sutton, Jeffrey A. (2015)
Quantitative acetylene measurements in laminar and turbulent flames using 1D Raman/Rayleigh scattering.
In: Combustion and Flame, 162 (5)
Artikel, Bibliographie
Gambaryan-Roisman, Tatiana (2015)
Modulation of Marangoni convection in liquid films.
In: Advances in colloid and interface science, 222
Artikel, Bibliographie
Kriegseis, J. ; Maden, I. ; Schwarz, C. ; Tropea, Cameron ; Grundmann, S. (2015)
velocity-information based force-term estimation of dielectric barrier discharge plasma actuators (vol 46, 055202, 2013).
In: Journal of Physics D-Applied Physics, 48 (32)
Artikel, Bibliographie
Leroy, Frederic ; Mueller-Plathe, Florian (2015)
Dry-Surface Simulation Method for the Determination of the Work of Adhesion of Solid-Liquid Interfaces.
In: Langmuir : the ACS journal of surfaces and colloids, 31 (30)
Artikel, Bibliographie
Rahimi, Mahshid ; Singh, Jayant K. ; Mueller-Plathe, Florian (2015)
CO2 Adsorption on Charged Carbon Nanotube Arrays: A Possible Functional Material for Electric Swing Adsorption.
In: Journal of Physical Chemistry C, 119 (27)
Artikel, Bibliographie
Roisman, Ilia V. ; Criscione, Antonio ; Tropea, Cameron ; Mandal, Deepak Kumar ; Amirfazli, Alidad (2015)
Dislodging a sessile drop by a high-Reynolds-number shear flow at subfreezing temperatures.
In: Physical Review E, 92 (2)
Artikel, Bibliographie
Roisman, Ilia V. ; Lembach, Andreas ; Tropea, Cameron (2015)
Drop splashing induced by target roughness and porosity: The size plays no role.
In: Advances in colloid and interface science, 222
Artikel, Bibliographie
Bernardin, John ; Chiaramonte, Francis ; Dhir, Vijay ; Galloway, Jesse ; Goodson, Ken ; Incropera, Frank ; Kabov, Oleg ; Kaviany, Massoud ; Kazimi, Mujid ; Khusid, Boris ; Kim, Jungho ; Kim, Sung-Min ; Lee, Jaeseon ; Minkowycz, W. J. ; Qu, Weilin ; Rose, John ; Sammakia, Bahgat ; Stephan, Peter ; Vafai, Kambiz ; Wen, Chang-Da (2015)
Professor Issam Mudawar on his 60th birthday.
In: International Journal of Heat and Mass Transfer, 89
Artikel, Bibliographie
Farwig, Reinhard ; Nakatsuka, Tomoyuki ; Taniuchi, Yasushi (2015)
Uniqueness of Solutions on the Whole Time Axis to the Navier-Stokes Equations in Unbounded Domains.
In: Communications in Partial Differential Equations, 40 (10)
Artikel, Bibliographie
Spiehl, Dieter ; Häming, Marc ; Sauer, Hans Martin ; Bonrad, Klaus ; Dörsam, Edgar (2015)
Engineering of Flexo- and Gravure-Printed Indium-Zinc-Oxide Semiconductor Layers for High-Performance Thin-Film Transistors.
In: IEEE Transactions on Electron Devices, 62 (9)
Artikel, Bibliographie
Weickgenannt, C. ; Roisman, Ilia V. ; Tropea, Cameron (2015)
Pinch-off of a stretching viscous filament and drop transport.
In: New Journal of Physics, 17 (8)
Artikel, Bibliographie
Meng, Xiannan ; Wang, Yongqi
Hrsg.: Wu, Wei (2015)
Investigations of gravity-driven two-phase debris flows.
In: Recent Advances in Modeling Landslides and Debris Flows
doi: 10.1007/978-3-319-11053-0_11
Buchkapitel, Bibliographie
Wassermann, Florian (2015)
Magnetic Resonance Imaging Techniques for Thermofluid Applications.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Aghajari, Nima ; Schaefer, Michael (2015)
Efficient shape optimization for fluid-structure interaction problems.
In: Journal of Fluids and Structures, 57
Artikel, Bibliographie
Farwig, Reinhard ; Riechwald, Paul Felix (2015)
Very weak solutions and the Fujita-Kato approach to the Navier-Stokes system in general unbounded domains.
In: Nodea-Nonlinear Differential Equations and Applications, 22 (5)
Artikel, Bibliographie
Fleckenstein, Stefan ; Bothe, Dieter (2015)
A Volume-of-Fluid-based numerical method for multi-component mass transfer with local volume changes.
In: Journal of Computational Physics, 301
Artikel, Bibliographie
Hosseinzadeh, A. ; Schmitt, T. ; Sadiki, A. ; Janicka, J. (2015)
Application of the Dynamic F-TACLES Combustion Model to a Lean Premixed Turbulent Flame.
In: Flow Turbulence and Combustion, 95 (2-3)
Artikel, Bibliographie
Maden, I. ; Maduta, R. ; Kriegseis, J. ; Jakirlic, S. ; Grundmann, S. ; Tropea, C. (2015)
Plasma-actuated Manipulation of Secondary Flow Towards Pressure Recovery Enhancement in a 3D Diffuser Modelled by an Eddy-resolving Second-moment Closure.
In: Flow Turbulence and Combustion, 95 (2-3)
Artikel, Bibliographie
Rahimi, Mahshid ; Babu, Deepu J. ; Singh, Jayant K. ; Yang, Yong-Biao ; Schneider, Joerg J. ; Mueller-Plathe, Florian (2015)
Double-walled carbon nanotube array for CO2 and SO2 adsorption.
In: Journal of Chemical Physics, 143 (12)
Artikel, Bibliographie
Sugii, Taisuke ; Ishii, Eiji ; Mueller-Plathe, Florian (2015)
Solubility of Carbon Dioxide in Pentaerythritol Hexanoate: Molecular Dynamics Simulation of a Refrigerant-Lubricant Oil System.
In: Journal of Physical Chemistry B, 119 (37)
Artikel, Bibliographie
Voyiatzis, Evangelos ; Boehm, Michael C. ; Mueller-Plathe, Florian (2015)
A geometric approach to identify cavities in particle systems.
In: Computer Physics Communications, 196
Artikel, Bibliographie
Abe, Ken ; Giga, Yoshikazu ; Hieber, Matthias (2015)
STOKES RESOLVENT ESTIMATES IN SPACES OF BOUNDED FUNCTIONS.
In: Annales Scientifiques De L Ecole Normale Superieure, 48 (3)
Artikel, Bibliographie
Eitel, Felix ; Pareja, Jhon ; Geyer, Dirk ; Johchi, Ayane ; Michel, Florian ; Elsaesser, Wolfgang ; Dreizler, Andreas (2015)
A novel plasma heater for auto-ignition studies of turbulent non-premixed flows.
In: Experiments in Fluids, 56 (10)
Artikel, Bibliographie
Fiorina, B. ; Mercier, R. ; Kuenne, G. ; Ketelheun, Anja ; Avdic, Amer ; Janicka, J. ; Geyer, D. ; Dreizler, A. ; Alenius, E. ; Duwig, C. ; Trisjono, P. ; Kleinheinz, K. ; Kang, S. ; Pitsch, H. ; Proch, F. ; Marincola, F. Cavallo ; Kempf, A. (2015)
Challenging modeling strategies for LES of non-adiabatic turbulent stratified combustion.
In: Combustion and Flame, 162 (11)
Artikel, Bibliographie
Hauk, T. ; Bonaccurso, E. ; Roisman, I. V. ; Tropea, C. (2015)
Ice crystal impact onto a dry solid wall. Particle fragmentation.
In: Proceedings of the Royal Society a-Mathematical Physical and Engineering Sciences, 471 (2181)
Artikel, Bibliographie
Linder, Nicklas ; Criscione, Antonio ; Roisman, Ilia V. ; Marschall, Holger ; Tropea, Cameron (2015)
3D computation of an incipient motion of a sessile drop on a rigid surface with contact angle hysteresis.
In: Theoretical and Computational Fluid Dynamics, 29 (5-6)
Artikel, Bibliographie
Lyngfelt, Anders ; Epple, Bernd ; Adanez, Juan ; Yan, Jinyue (2015)
The 3rd International Conference on Chemical Looping 2014.
In: Applied Energy, 157
Artikel, Bibliographie
Ohlemueller, Peter ; Alobaid, Falah ; Gunnarsson, Adrian ; Ströhle, Jochen ; Epple, Bernd (2015)
Development of a process model for coal chemical looping combustion and validation against 100 kWth tests.
In: Applied Energy, 157
Artikel, Bibliographie
Pattamatta, Arvind ; Sielaff, Axel ; Stephan, Peter (2015)
A numerical study on the hydrodynamic and heat transfer characteristics of oscillating Taylor bubble in a capillary tube.
In: Applied Thermal Engineering, 89
Artikel, Bibliographie
Rahimi, Mahshid ; Babu, Deepu J. ; Singh, Jayant K. ; Yang, Yong-Biao ; Schneider, Joerg J. ; Mueller-Plathe, Florian (2015)
Double-walled carbon nanotube array for CO2 and SO2 adsorption (vol 143, 124701, 2015).
In: Journal of Chemical Physics, 143 (16)
Artikel, Bibliographie
Schlueter, Michael ; Bothe, Dieter ; Terasaka, Koichi (2015)
Multiscale Multiphase Process Engineering.
In: Chemical Engineering & Technology, 38 (11)
Artikel, Bibliographie
Ströhle, Jochen ; Orth, Matthias ; Epple, Bernd (2015)
Chemical looping combustion of hard coal in a 1 MWth pilot plant using ilmenite as oxygen carrier.
In: Applied Energy, 157
Artikel, Bibliographie
Wang, Xiang ; Bonaccurso, Elmar ; Venzmer, Joachim ; Garoff, Stephen (2015)
Deposition of drops containing surfactants on liquid pools: Movement of the contact line, Marangoni ridge, capillary waves and interfacial particles.
In: Colloids and Surfaces a-Physicochemical and Engineering Aspects, 486
Artikel, Bibliographie
Hau, Jan-Niklas ; Chagelishvili, George ; Khujadze, George ; Oberlack, Martin ; Tevzadze, Alexander (2015)
A comparative numerical analysis of linear and nonlinear aerodynamic sound generation by vortex disturbances in homentropic constant shear flows.
In: Physics of Fluids, 27 (12)
doi: 10.1063/1.4936137
Artikel, Bibliographie
Ganguly, Pritam ; Hajari, Timir ; Shea, Joan-Emma ; Vegt, Nico F. A. van der (2015)
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment (vol 6, pg 581, 2015).
In: Journal of Physical Chemistry Letters, 6 (23)
Artikel, Bibliographie
Kintea, Daniel M. ; Hauk, Tobias ; Roisman, Ilia V. ; Tropea, Cameron (2015)
Shape evolution of a melting nonspherical particle.
In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 92 (3)
Artikel, Bibliographie
Nejati, Iman ; Dietzel, Mathias ; Hardt, Steffen (2015)
Conjugated liquid layers driven by the short-wavelength Benard-Marangoni instability: experiment and numerical simulation.
In: Journal of Fluid Mechanics, 783
Artikel, Bibliographie
Perez-Macia, M. A. ; Curco, D. ; Bringue, R. ; Iborra, M. ; Rodriguez-Ropero, F. ; Vegt, N. F. A. van der ; Aleman, Carlos (2015)
1-Butanol absorption in poly(styrene-divinylbenzene) ion exchange resins for catalysis.
In: Soft Matter, 11 (47)
Artikel, Bibliographie
Rodriguez-Ropero, Francisco ; Hajari, Timir ; Vegt, Nico F. A. van der (2015)
Mechanism of Polymer Collapse in Miscible Good Solvents.
In: Journal of Physical Chemistry B, 119 (51)
Artikel, Bibliographie
Starkloff, Ralf ; Alobaid, Falah ; Karner, Karl ; Epple, Bernd ; Schmitz, Martin ; Boehm, Felix (2015)
Development and validation of a dynamic simulation model for a large coal-fired power plant.
In: Applied Thermal Engineering, 91
Artikel, Bibliographie
Janocha, Daniel D. ; Waclawczyk, Marta ; Oberlack, Martin (2015)
Lie Symmetry Analysis of the Hopf Functional-Differential Equation.
In: Symmetry, 7 (3)
Artikel, Bibliographie
Klewicki, J. ; Oberlack, Martin (2015)
Finite Reynolds number properties of a turbulent channel flow similarity solution.
In: Physics of Fluids, 27 (9)
Artikel, Bibliographie
Nold, Andreas ; Oberlack, Martin ; Cheviakov, Alexei F. (2015)
On new stability modes of plane canonical shear flows using symmetry classification.
In: Journal of Mathematical Physics, 56 (11)
Artikel, Bibliographie
Alobaid, Falah ; Ohlemueller, Peter ; Stroehle, Jochen ; Epple, Bernd (2015)
Extended Euler-Euler model for the simulation of a 1 MWth chemical-looping pilot plant.
In: Energy, 93
Artikel, Bibliographie
Ardham, Vikram Reddy ; Deichmann, Gregor ; Vegt, Nico F. A. van der ; Leroy, Frederic (2015)
Solid-liquid work of adhesion of coarse-grained models of n-hexane on graphene layers derived from the conditional reversible work method.
In: The Journal of chemical physics, 143 (24)
Artikel, Bibliographie
Hartmann, Sebastien ; Molitor, Andreas ; Elsaesser, Wolfgang (2015)
Ultrabroadband ghost imaging exploiting optoelectronic amplified spontaneous emission and two-photon detection.
In: Optics Letters, 40 (24)
Artikel, Bibliographie
Langeloth, Michael ; Sugii, Taisuke ; Böhm, Michael C. ; Müller-Plathe, Florian (2015)
The glass transition in cured epoxy thermosets: A comparative molecular dynamics study in coarse-grained and atomistic resolution.
In: The Journal of chemical physics, 143 (24)
Artikel, Bibliographie
Pareja, Jhon ; Litterscheid, Christian ; Molina, Alejandro ; Albert, Barbara ; Kaiser, Bernhard ; Dreizler, Andreas (2015)
Effects of doping concentration and co-doping with cerium on the luminescence properties of Gd3Ga5O12:Cr3+ for thermometry applications.
In: Optical Materials, 47
doi: 10.1016/j.optmat.2015.05.052
Artikel, Bibliographie
Farwig, Reinhard ; Sohr, Hermann ; Varnhorn, Werner (2015)
LOCAL STRONG SOLUTIONS OF THE NONHOMOGENEOUS NAVIER-STOKES SYSTEM WITH CONTROL OF THE INTERVAL OF EXISTENCE.
In: Topological Methods in Nonlinear Analysis, 46 (2)
Artikel, Bibliographie
Roisman, I. V. ; Tropea, C. (2015)
Impact of a crushing ice particle onto a dry solid wall.
In: Proceedings of the Royal Society a-Mathematical Physical and Engineering Sciences, 471 (2183)
Artikel, Bibliographie
Dietz, Christian ; Schulze, Marcus ; Voss, Agnieszka ; Riesch, Christian ; Stark, Robert W. (2015)
Bimodal frequency-modulated atomic force microscopy with small cantilevers.
In: Nanoscale, 7 (5)
doi: 10.1039/C4NR05907G
Artikel, Bibliographie
Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2015)
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: Proceedings of ECOS 2015 - The 28th International Conference on Efficiency, COST, Optimization, Simulation and Environmental Impact of Energy Systems, June 30 - July 3, 2015, Pau, France
Artikel, Bibliographie
Wacławczyk, Marta ; Oberlack, Martin (2015)
Reply to "Comment on 'Statistical symmetries of the Lundgren-Monin-Novikov hierarchy'".
In: Physical Review E, 92 (6)
doi: 10.1103/PhysRevE.92.067002
Artikel, Bibliographie
Kallendorf, Christina ; Fath, Anja ; Oberlack, Martin ; Wang, Yongqi (2015)
Exact solutions to the interfacial surfactant transport equation on a droplet in a Stokes flow regime.
In: Physics of Fluids, 27 (8)
Artikel, Bibliographie
Wang, W. N. ; Xu, Y. S. ; Li, A. ; Li, T. ; Liu, M. M. ; Klitzing, R. von ; Ober, C. K. ; Kayitmazer, A. B. ; Li, L. ; Guo, X. H. (2015)
Zinc induced polyelectrolyte coacervate bioadhesive and its transition to a self-healing hydrogel.
In: Rsc Advances, 5 (82)
Artikel, Bibliographie
Wellert, S. ; Kesal, D. ; Schon, S. ; Klitzing, R. von ; Gawlitza, K. (2015)
Ethylene Glycol-Based Microgels at Solid Surfaces: Swelling Behavior and Control of Particle Number Density.
In: Langmuir, 31 (7)
Artikel, Bibliographie
Wellert, S. ; Radulescu, A. ; Carl, A. ; Klitzing, R. von ; Gawlitza, K. (2015)
Evolution of Size and Structure during the Polymerization Process: A SANS Study on EG-Based Microgels.
In: Macromolecules, 48 (14)
Artikel, Bibliographie
Kumar, Abhijeet ; Kleinen, J. ; Gambaryan-Roisman, Tatiana ; Venzmer, J. (2015)
Interaction of cationic complex fluids with anionic substrates.
Droplets Conference. Twente (06.10.2015-08.10.2015)
Konferenzveröffentlichung, Bibliographie
Kumar, Abhijeet ; Kleinen, J. ; Venzmer, J. ; Gambaryan-Roisman, Tatiana (2015)
A streaming potential study of cationic vesicle deposition on anionic porous substrates.
International Conference on Complex Fluid Flow in Porous Media (ComFlowPore15). Bordeaux, France (12.10.2015-14.10.2015)
Konferenzveröffentlichung, Bibliographie
Bothe, Dieter ; Rolland, Guillaume (2015)
Global Existence for a Class of Reaction-Diffusion Systems with Mass Action Kinetics and Concentration-Dependent Diffusivities.
In: Acta Applicandae Mathematicae, 139 (1)
doi: 10.1007/s10440-014-9968-y
Artikel, Bibliographie
Krauß, Christoph ; Waidner, Michael (2015)
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39 (6)
Artikel, Bibliographie
Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015)
Authenticated Key Exchange from Ideal Lattices.
Sofia, Bulgaria
Konferenzveröffentlichung, Bibliographie
Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Konferenzveröffentlichung, Bibliographie
Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Konferenzveröffentlichung, Bibliographie
Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Konferenzveröffentlichung, Bibliographie
Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015)
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
Konferenzveröffentlichung, Bibliographie
Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie (2015)
Über die Wirksamkeit von Anti-Phishing-Training.
Stuttgart
Konferenzveröffentlichung, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015)
I know where you are: Proofs of Presence resilient to malicious provers.
Konferenzveröffentlichung, Bibliographie
Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015)
An Automatic Inference of Minimal Security Types.
Konferenzveröffentlichung, Bibliographie
Fehr, Victoria ; Fischlin, Marc (2015)
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Artikel, Bibliographie
Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. (2014)
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: Physical Review A, 90 (6)
doi: 10.1103/PhysRevA.90.063814
Artikel, Bibliographie
Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Hrsg.: Prakash, Atul ; Shyamasundar, Rudrapatna (2014)
Authentication Schemes - Comparison and Effective Password Spaces.
International Conference on Information Systems Security (ICISS). Hyderabad, India (16.12.2014-20.12.2014)
doi: 10.1007/978-3-319-13841-1_12
Konferenzveröffentlichung, Bibliographie
Brzuska, Christina ; Mittelbach, Arno
Hrsg.: Sarkar, Palash ; Iwata, Tetsu (2014)
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings.
doi: 10.1007/978-3-662-45608-8_8
Buchkapitel, Bibliographie
Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2014)
Hot-Hardening: Getting More Out of Your Security Settings.
New Orleans, Louisiana, USA
doi: 10.1145/2664243.2664246
Konferenzveröffentlichung, Bibliographie
Culhane, William ; Jayaram, K. R. ; Eugster, Patrick (2014)
Fast, Expressive Top-k Matching.
Bordeaux, France
doi: 10.1145/2663165.2663326
Konferenzveröffentlichung, Bibliographie
Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014)
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
doi: 10.2200/S00622ED1V01Y201412SPT012
Buch, Bibliographie
Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014)
An efficient time-stamping solution for long-term digital archiving.
Austin, TX, USA
doi: 10.1109/PCCC.2014.7017099
Konferenzveröffentlichung, Bibliographie
Günther, Felix ; Manulis, Mark ; Peter, Andreas
Hrsg.: Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (2014)
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Heraklion, Crete, Greece
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Günther, Felix (2014)
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Scottsdale, Arizona, USA
Konferenzveröffentlichung, Bibliographie
Herzberg, Amir ; Shulman, Haya (2014)
DNS Authentication as a Service: Preventing Amplifikation Attacks.
New Orleans, LA, USA
Konferenzveröffentlichung, Bibliographie
Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014)
Less is More: Cipher-Suite Negotiation for DNSSEC.
New Orleans, Louisiana, U.S.
Konferenzveröffentlichung, Bibliographie
Müller, Jan (2014)
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Hrsg.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Konferenzveröffentlichung, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014)
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11)
doi: 10.1002/sec.748
Artikel, Bibliographie
Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014)
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
doi: 10.1145/2664168.2664173
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014)
SAML Privacy-Enhancing Profile.
Stuttgart, Germany
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco
Hrsg.: Schiele, Otto ; Schön, Willi (2014)
HbbTV – aktueller Stand 2014.
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (07.11.2014-07.11.2014)
doi: 10.1145/2664168.2664181
Konferenzveröffentlichung, Bibliographie
Shirazi, Fatemeh ; Volkamer, Melanie (2014)
What Deters Jane from Preventing Identification and Tracking on the Web?
Scottsdale, Arizona, USA
doi: 10.1145/2665943.2665963
Konferenzveröffentlichung, Bibliographie
Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014)
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Scottsdale, AZ, USA
Konferenzveröffentlichung, Bibliographie
Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014)
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
Scottsdale, AZ, USA
doi: 10.1145/2665943.2665962
Konferenzveröffentlichung, Bibliographie
Shulman, Haya ; Ezra, Shiran (2014)
Poster: On the Resilience of DNS Infrastructure.
Scottsdale, Arizona, USA
Konferenzveröffentlichung, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (03.11.2014-07.11.2014)
doi: 10.1145/2660267.2662387
Konferenzveröffentlichung, Bibliographie
Vieten, Jannik (2014)
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014)
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
doi: 10.1145/2660267.2660334
Konferenzveröffentlichung, Bibliographie
Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014)
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
24th International Conference on Field Programmable Logic and Applications (FPL). München, Deutschland (02.09.2014-04.09.2014)
Konferenzveröffentlichung, Bibliographie
Mitschke, Ralf ; Erdweg, Sebastian ; Köhler, Mirko ; Mezini, Mira ; Salvaneschi, Guido (2014)
i3QL: Language-Integrated Live Data Views.
Portland, Oregon, USA
doi: 10.1145/2714064.2660242
Konferenzveröffentlichung, Bibliographie
Pradel, Michael ; Schuh, Parker ; Necula, George ; Sen, Koushik (2014)
EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation.
Portland, OR, USA
doi: 10.1145/2714064.2660233
Konferenzveröffentlichung, Bibliographie
Stopczynski, Martin ; Zugelder, Michael (2014)
Reducing User Tracking through Automatic Web Site State Isolations.
doi: 10.1007/978-3-319-13257-0_18
Konferenzveröffentlichung, Bibliographie
Suri, Neeraj ; Germanus, Daniel ; Roos, Stefanie ; Strufe, Thorsten (2014)
Mitigating Eclipse Attacks in Peer-to-Peer Networks.
San Francisco, CA, USA
Konferenzveröffentlichung, Bibliographie
Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Konferenzveröffentlichung, Bibliographie
Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Konferenzveröffentlichung, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014)
Pretty Understandable Democracy 2.0.
Lochau
Konferenzveröffentlichung, Bibliographie
Schlipf, Mario (2014)
Passwort-Richtlinien.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Konferenzveröffentlichung, Bibliographie
Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Hrsg.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Konferenzveröffentlichung, Bibliographie
Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014)
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Lochau
doi: 10.1109/EVOTE.2014.7001142
Konferenzveröffentlichung, Bibliographie
Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Hrsg.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Coercion-Resistant Internet Voting in Practice.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.09.2014-26.09.2014)
Konferenzveröffentlichung, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Hrsg.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.09.2014-26.09.2014)
Konferenzveröffentlichung, Bibliographie
Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz (2014)
Method and system for secure access of a first computer to a second computer.
Norm, Patent, Standard, Bibliographie
Lillack, Max ; Kästner, Christian ; Bodden, Eric (2014)
Tracking Load-time Configuration Option.
Vasteras, Sweden
doi: 10.1145/2642937.2643001
Konferenzveröffentlichung, Bibliographie
Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar (2014)
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
Fribourg, Switzerland
doi: 10.1109/ARES.2014.32
Konferenzveröffentlichung, Bibliographie
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Hrsg.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Buchkapitel, Bibliographie
Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
Hrsg.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Hrsg.: Kö, Andrea ; Francesconi, Enrico (2014)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
München
Konferenzveröffentlichung, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Konferenzveröffentlichung, Bibliographie
Riecker, Michael ; Yuan, Dingwen ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Patrolling wireless sensor networks: Randomized intrusion detection.
Montreal, QC, Canada
Konferenzveröffentlichung, Bibliographie
Geihs, Matthias ; Cabarcas, Daniel
Hrsg.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Konferenzveröffentlichung, Bibliographie
Herzberg, Amir ; Shulman, Haya (2014)
DNS Security: Past, Present and Future.
Berlin, Germany
Konferenzveröffentlichung, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Hrsg.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Konferenzveröffentlichung, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Hrsg.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014)
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Fribourg, Switzerland
Konferenzveröffentlichung, Bibliographie
Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Konferenzveröffentlichung, Bibliographie
Kogan, Kirill ; Nikolenko, Sergey I. ; Rottenstreich, Ori ; Culhane, William ; Eugster, Patrick (2014)
SAX-PAC (scalable and expressive packet classification).
ACM SIGCOMM Computer Communication Review. Chicago, Illinois, USA
doi: 10.1145/2619239.2626294
Konferenzveröffentlichung, Bibliographie
Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik (2014)
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
San Diego, CA, USA
Konferenzveröffentlichung, Bibliographie
Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Hrsg.: Garay, Arno A. ; Gennaro, Rosario (2014)
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
Santa Barbara, CA, USA
doi: 10.1007/978-3-662-44371-2_11
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Konferenzveröffentlichung, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014)
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (20.08.2014-22.08.2014)
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, USA (20.08.2014-22.08.2014)
Konferenzveröffentlichung, Bibliographie
Suri, Neeraj ; Vateva-Gurova, Tsvetoslava ; Luna, Jesus ; Pellegrino, Giancarlo (2014)
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Vienna, Austria
Konferenzveröffentlichung, Bibliographie
Oswald, Florian (2014)
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Artikel, Bibliographie
Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. (2014)
Citizen Electronic Identities using {TPM} 2.0.
Konferenzveröffentlichung, Bibliographie
Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. (2014)
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4)
doi: 10.1109/MSP.2014.38
Artikel, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Artikel, Bibliographie
Suri, Neeraj ; Lanzaro, Anna ; Natella, Roberto ; Winter, Stefan ; Cotroneo, Domenico (2014)
An Empirical Study of Injected versus Actual Interface Errors.
San Jose, CA, USA
Konferenzveröffentlichung, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Konferenzveröffentlichung, Bibliographie
Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie (2014)
Shake hands to bedevil: Securing email with wearable technology.
Raleigh
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne (2014)
Why doesn't Jane protect her privacy?
Amsterdam, The Netherlands
doi: 10.1007/978-3-319-08506-7_13
Konferenzveröffentlichung, Bibliographie
Lagerspetz, E. ; Truong, Hien Thi Thu ; Tarkoma, S. ; Asokan, N. (2014)
MDoctor: A Mobile Malware Prognosis Application.
doi: 10.1109/ICDCSW.2014.36
Konferenzveröffentlichung, Bibliographie
Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014)
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Konferenzveröffentlichung, Bibliographie
Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014)
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Artikel, Bibliographie
Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (11.06.2014-13.06.2014)
doi: 10.1145/2600918.2600922
Konferenzveröffentlichung, Bibliographie
Schneider, Matthias ; Schneider, Thomas (2014)
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (11.06.2014-13.06.2014)
doi: 10.1145/2600918.2600927
Konferenzveröffentlichung, Bibliographie
Schmachtenberg, Max ; Strufe, Thorsten ; Paulheim, Heiko (2014)
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
Konferenzveröffentlichung, Bibliographie
Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
doi: 10.1145/2568225.2568243
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014)
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Kyoto, Japan
doi: 10.1145/2590296.2590337
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Konferenzveröffentlichung, Bibliographie
Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014)
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Heraklion, Greece
doi: 10.1007/978-3-319-07620-1_16
Konferenzveröffentlichung, Bibliographie
Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Hrsg.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph (2014)
ACCESS: Describing and Contrasting Authentication Mechanisms.
Heraklion, Crete
doi: 10.1007/978-3-319-07620-1_17
Konferenzveröffentlichung, Bibliographie
Brzuska, Christina ; Mittelbach, Arno (2014)
Using Indistinguishability Obfuscation via UCEs.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security.
doi: 10.1007/978-3-662-45608-8
Buchkapitel, Bibliographie
Mittelbach, Arno
Hrsg.: Oswald, Elisabeth ; Nguyen, Arno Q. (2014)
Salvaging Indifferentiability in a Multi-stage Setting.
Copenhagen, Denmark
doi: 10.1007/978-3-642-55220-5_33
Konferenzveröffentlichung, Bibliographie
Kremer, Steve ; Künnemann, Robert (2014)
Automated analysis of security protocols with global state.
San Jose, CA, USA
doi: 10.1109/SP.2014.18
Konferenzveröffentlichung, Bibliographie
Budurushi, Jurlind ; Volkamer, Melanie
Hrsg.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco (2014)
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
Report, Bibliographie
Ghiglieri, Marco (2014)
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy. San Jose, California (18.05.2014-18.05.2014)
Konferenzveröffentlichung, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report, Bibliographie
Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014)
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Buchkapitel, Bibliographie
Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014)
TrustLite: A Security Architecture for Tiny Embedded Devices.
Amsterdam, Netherlands
doi: 10.1145/2592798.2592824
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Artikel, Bibliographie
Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen (2014)
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
New York
Konferenzveröffentlichung, Bibliographie
Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf (2014)
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815157
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014)
Personal DLP for Facebook.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815279
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Konferenzveröffentlichung, Bibliographie
Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Konferenzveröffentlichung, Bibliographie
Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014)
MoP-2-MoP - Mobile private microblogging.
Konferenzveröffentlichung, Bibliographie
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report, Bibliographie
Sohr, Karsten ; Bartsch, Steffen ; Volkamer, Melanie ; Berger, Bernhard ; Bodden, Eric ; Brucker, Achim ; Maseberg, Sönke ; Kus, Mehmet ; Heider, Jens (2014)
Zertifizierte Datensicherheit für mobile Anwendungen.
Wien
Konferenzveröffentlichung, Bibliographie
Schneider, Markus ; Enzmann, Matthias ; Stopczynski, Martin (2014)
Web-Tracking-Report 2014.
Report, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014)
Key2Share for Authentication Services.
Konferenzveröffentlichung, Bibliographie
Inel, Miray (2014)
Entwurf und Implementierung von Plug-ins für JCrypTool.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Konferenzveröffentlichung, Bibliographie
Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Voter, What Message Will Motivate You to Verify Your Vote?
San Diego
doi: 10.14722/usec.2014.23038
Konferenzveröffentlichung, Bibliographie
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Artikel, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Tews, Erik (2014)
A Privacy Protection System for HbbTV in Smart TVs.
Las Vegas, NV
doi: 10.1109/CCNC.2014.6866595
Konferenzveröffentlichung, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Report, Bibliographie
Weinkauff, J. ; Trunk, P. ; Frank, J. H. ; Dunn, M. ; Dreizler, A. ; Böhm, B. (2014)
Investigation of flame propagation in a partially premixed jet by high-speed-Stereo-PIV and acetone-PLIF.
In: Proceedings of the Combustion Institute, 35
doi: 10.1016/j.proci.2014.05.022
Artikel, Bibliographie
Wellert, S. ; Hertle, Y. ; Richter, M. ; Medebach, M. ; Magerl, D. ; Wang, W. ; Deme, B. ; Radulescu, A. ; Muller-Buschbaum, P. ; Hellweg, T. ; Klitzing, R. von (2014)
Inner Structure of Adsorbed Ionic Microgel Particles.
In: Langmuir, 30 (24)
Artikel, Bibliographie
Sahami Shirazi, Alireza ; Abdelrahman, Yomna ; Henze, Niels ; Schneegass, Stefan ; Khalilbeigi, Mohammadreza ; Schmidt, Albrecht (2014)
Exploiting thermal reflection for interactive systems.
Konferenzveröffentlichung, Bibliographie
Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014)
Interaction Techniques for Co-located Collaborative TV.
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014)
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4)
doi: 10.1007/s11623-014-0098-5
Artikel, Bibliographie
Suri, Neeraj ; Taha, Ahmed ; Trapero, Ruben ; Luna, Jesus (2014)
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security.
Beijing, China
Konferenzveröffentlichung, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Konferenzveröffentlichung, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014)
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327
Artikel, Bibliographie
Roos, Stefanie ; Strufe, Thorsten (2014)
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165
Artikel, Bibliographie
Shulman, Haya ; Waidner, Michael (2014)
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Konferenzveröffentlichung, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Konferenzveröffentlichung, Bibliographie
Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014)
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Konferenzveröffentlichung, Bibliographie
Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014)
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP)
Artikel, Bibliographie
Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar (2014)
Covert Computation - Hiding code in code through compile-time obfuscation.
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
Hrsg.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Konferenzveröffentlichung, Bibliographie
Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014)
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Konferenzveröffentlichung, Bibliographie
Schaller, André ; Arul, Tolga ; Leest, Vincent van der ; Katzenbeisser, Stefan (2014)
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014)
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Konferenzveröffentlichung, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014)
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
Konferenzveröffentlichung, Bibliographie
Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014)
Robust Multi-Property Combiners for Hash Functions.
doi: 10.1007/s00145-013-9148-7
Konferenzveröffentlichung, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Konferenzveröffentlichung, Bibliographie
Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes (2014)
A performance analysis of long-term archiving techniques.
Paris, France
Konferenzveröffentlichung, Bibliographie
Riecker, Michael ; Biedermann, Sebastian ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2)
Artikel, Bibliographie
Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Hrsg.: Chen, Liqun ; Mitchell, Chris (2014)
Unpicking PLAID.
1st International Conference on Research in Security Standardisation. London, United Kingdom (16.12.2014-17.12.2014)
doi: 10.1007/978-3-319-14054-4_1
Konferenzveröffentlichung, Bibliographie
Shulman, Haya (2014)
Pretty Bad Privacy: Pitfalls of DNS Encryption.
Scottsdale, Arizona, USA
Konferenzveröffentlichung, Bibliographie
Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014)
Scalable Offline Monitoring.
Proceedings of the 14th International Conference on Runtime Verification (RV). Heidelberg, Germany
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Hrsg.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Buchkapitel, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Artikel, Bibliographie
Neumann, Stephan ; Volkamer, Melanie
Hrsg.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
A Holistic Framework for the Evaluation of Internet Voting Systems.
Buchkapitel, Bibliographie
Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014)
Mutant Differential Fault Analysis of Trivium MDFA.
Konferenzveröffentlichung, Bibliographie
Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2013)
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9
doi: 10.1016/j.pmcj.2013.07.014
Artikel, Bibliographie
Klos, Christian (2013)
Design and deployment of a public key infrastructure.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Jayalath, Chamikara ; Stephen, Julian James ; Eugster, Patrick (2013)
Atmosphere: A Universal Cross-Cloud Communication Infrastructure.
Beijing, China
doi: 10.1007/978-3-642-45065-5_9
Konferenzveröffentlichung, Bibliographie
Stephen, Julian James ; Eugster, Patrick
Hrsg.: Eyers, David ; Schwan, Karsten (2013)
Assured Cloud-Based Data Analysis with ClusterBFT.
In: Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Proceedings
doi: 10.1007/978-3-642-45065-5_5
Buchkapitel, Bibliographie
Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013)
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
New Orleans, Loouisiana, USA
Konferenzveröffentlichung, Bibliographie
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Buch, Bibliographie
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Buch, Bibliographie
Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Hrsg.: Horbach, Matthias (2013)
Towards A Practical JCJ / Civitas Implementation.
Koblenz
Konferenzveröffentlichung, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19th Crypto-Day. Stuttgart, Germany (14.11.2013 - 15.11.2013)
Konferenzveröffentlichung, Bibliographie
Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. (2013)
Security analysis of a widely deployed locking system.
Konferenzveröffentlichung, Bibliographie
Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko (2013)
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
Berlin, Germany
doi: 10.1145/2508859.2516750
Konferenzveröffentlichung, Bibliographie
Tasharofi, Samira ; Pradel, Michael ; Lin, Yu ; Johnson, Ralph (2013)
Bita: Coverage-Guided, Automatic Testing of Actor Programs.
Palo Alto, CA, USA
doi: 10.1109/ASE.2013.6693072
Konferenzveröffentlichung, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Konferenzveröffentlichung, Bibliographie
Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013)
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37
doi: 10.1007/s11623-013-0300-1
Artikel, Bibliographie
Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Renaud, Karen
Hrsg.: Fischlin, Marc ; Katzenbeisser, Stefan (2013)
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography
doi: 10.1007/978-3-642-42001-6_18
Buchkapitel, Bibliographie
Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013)
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Hrsg.: Schiele, Otto ; Schön, Willi (2013)
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
Konferenzveröffentlichung, Bibliographie
Weinert, Christian (2013)
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21.10.2013-23.10.2013)
Konferenzveröffentlichung, Bibliographie
Herzberg, Amir ; Shulman, Haya (2013)
Limiting MitM to MitE Covert-Channels.
Regensburg, Germany
doi: 10.1109/ARES.2013.138
Konferenzveröffentlichung, Bibliographie
Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia (2013)
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
Miami, FL, USA
doi: 10.1145/2500423.2504583
Konferenzveröffentlichung, Bibliographie
Wachsmann, Christian (2013)
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
Dissertation, Bibliographie
Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Hrsg.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Konferenzveröffentlichung, Bibliographie
Yousfi Alaoui, Sidi Mohamed el ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013)
Code based Identification and Signature Schemes in Software.
University of Regensburg, Regensburg, Germany
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hrsg.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Buchkapitel, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2013)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Koblenz
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Hrsg.: Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (2013)
Modeling the German Legal Latitude Principles.
Koblenz, Germany
Konferenzveröffentlichung, Bibliographie
Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph (2013)
Are Graphical Authentication Mechanisms As Strong As Passwords?
Krakow
Konferenzveröffentlichung, Bibliographie
Tews, Erik (2013)
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
Report, Bibliographie
Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013)
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security
Buchkapitel, Bibliographie
Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013)
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
Konferenzveröffentlichung, Bibliographie
Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013)
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8)
doi: 10.1007/s11623-013-0209-8
Artikel, Bibliographie
Rynkowski, Gregor (2013)
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
Hrsg.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Konferenzveröffentlichung, Bibliographie
Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Konferenzveröffentlichung, Bibliographie
Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
Konferenzveröffentlichung, Bibliographie
Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013)
ConXsense – Context Sensing for Adaptive Usable Access Control.
Report, Bibliographie
Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013)
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464)
Artikel, Bibliographie
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Melbourne, Australia
doi: 10.1109/TrustCom.2013.58
Konferenzveröffentlichung, Bibliographie
Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes (2013)
Assessing Trust in the Long-Term Protection of Documents.
Split, Croatia
Konferenzveröffentlichung, Bibliographie
Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Hrsg.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Konferenzveröffentlichung, Bibliographie
Hamann, Tobias (2013)
The BKZ Simulation Algorithm.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Hrsg.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Konferenzveröffentlichung, Bibliographie
Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Hrsg.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Konferenzveröffentlichung, Bibliographie
Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Hrsg.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Mental Models of Verifiability in Voting.
University of Surrey, Guildford, UK
Konferenzveröffentlichung, Bibliographie
Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Hrsg.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Konferenzveröffentlichung, Bibliographie
Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Hrsg.: Horbach, Matthias (2013)
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Koblenz
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013)
Towards a Practical Mobile Application for Election Authorities (Demo).
Konferenzveröffentlichung, Bibliographie
Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013)
Poster: On the Usability of Secure GUIs.
Menlo Park, California
Konferenzveröffentlichung, Bibliographie
Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013)
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California
Konferenzveröffentlichung, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Hrsg.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17.06.2013-19.06.2013)
Konferenzveröffentlichung, Bibliographie
Simo-Fhom, Hervais (2013)
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
Artikel, Bibliographie
Winter, Stefan ; Tretter, Michael ; Sattler, Benjamin ; Suri, Neeraj (2013)
simFI: From Single to Simultaneous Software Fault Injections.
Budapest, Hungary
doi: 10.1109/DSN.2013.6575310
Konferenzveröffentlichung, Bibliographie
Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Konferenzveröffentlichung, Bibliographie
Hrsg.: Buchmann, Johannes (2013)
Internet Privacy: Options for adequate realization.
Buch, Bibliographie
Strenzke, Falko (2013)
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
Limoges, France
Konferenzveröffentlichung, Bibliographie
Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013)
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
New Orleans, LA, USA
doi: 10.1109/STAST.2013.12
Konferenzveröffentlichung, Bibliographie
Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013)
Vertrauenswürdige Smartphones: Technologien und Lösungen.
Konferenzveröffentlichung, Bibliographie
Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013)
Identification element-based authentication and identification with decentralised service use.
Norm, Patent, Standard, Bibliographie
Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013)
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
Artikel, Bibliographie
Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Mühlhäuser, Max (2013)
EarPut: Augmenting Behind-the-Ear Devices for Ear-based Interaction.
doi: 10.1145/2468356.2468592
Konferenzveröffentlichung, Bibliographie
Lissermann, Roman ; Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2013)
Permulin: Personal In- and Output on Interactive Surfaces.
Konferenzveröffentlichung, Bibliographie
Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar (2013)
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
Hangzhou, China
doi: 10.1145/2484313.2484384
Konferenzveröffentlichung, Bibliographie
Pradel, Michael ; Gross, Thomas R. (2013)
Automatic testing of sequential and concurrent substitutability.
San Francisco, CA, USA
doi: 10.1109/ICSE.2013.6606574
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Hrsg.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Konferenzveröffentlichung, Bibliographie
Hülsing, Andreas ; Braun, Johannes (2013)
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Bonn
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013)
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Konferenzveröffentlichung, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Artikel, Bibliographie
Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
Hrsg.: University Plymouth (2013)
Contextualized Security Interventions in Password Transmission Scenarios.
Lisbon, Spain
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013)
HbbTV - I Know What You Are Watching.
Konferenzveröffentlichung, Bibliographie
Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013)
Automatic Protocol Selection in Secure Two-Party Computations.
20th Network and Distributed System Security Symposium (NDSS'13). San Diego, USA (24.02.2013-27.02.2013)
Konferenzveröffentlichung, Bibliographie
Felzer, Torsten ; Rinderknecht, Stephan (2013)
Mouse mode of OnScreenDualScribe: Three types of keyboard-driven mouse replacement.
In: CHI '13 Extended Abstracts on Human Factors in Computing Systems
doi: 10.1145/2468356.2468641
Buchkapitel, Bibliographie
Funke, Sebastian (2013)
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Artikel, Bibliographie
Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
Hrsg.: Marinos, Louis ; Askoxylakis, Ioannis (2013)
A Comparison of American and German Folk Models of Home Computer Security.
First International Conference, HAS 2013, Held as Part of HCI International 2013. Las Vegas, USA (21.07.2013-26.07.2013)
Konferenzveröffentlichung, Bibliographie
Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt (2013)
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
San Diego, CA, USA
doi: 10.1109/PerComW.2013.6529448
Konferenzveröffentlichung, Bibliographie
Zöller, Sebastian ; Reinhardt, Andreas ; Wachtel, Markus ; Steinmetz, Ralf (2013)
Integrating Wireless Sensor Nodes and Smartphones for Energy - Efficient Data Exchange in Smart Environments.
San Diego, CA, USA
doi: 10.1109/PerComW.2013.6529574
Konferenzveröffentlichung, Bibliographie
Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013)
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Konferenzveröffentlichung, Bibliographie
Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin (2013)
Smashing WEP in a Passive Attack.
Konferenzveröffentlichung, Bibliographie
Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes (2013)
Instantiating Treeless Signature Schemes.
In: Cryptology ePrint Archive, 2013 (65)
Artikel, Bibliographie
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Artikel, Bibliographie
Olembo, Maina ; Volkamer, Melanie
Hrsg.: Saeed, Saqib ; Reddick, Christopher (2013)
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
doi: 10.4018/978-1-4666-3640-8.ch011
Buchkapitel, Bibliographie
Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013)
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Salzburg, Austria
Konferenzveröffentlichung, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Konferenzveröffentlichung, Bibliographie
Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013)
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13)
Artikel, Bibliographie
Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Hrsg.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Konferenzveröffentlichung, Bibliographie
Wälde, Julian (2013)
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2013)
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21
doi: 10.1108/09685221311314419
Artikel, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Artikel, Bibliographie
Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Konferenzveröffentlichung, Bibliographie
Schneider, Michael (2013)
Sieving for Shortest Vectors in Ideal Lattices.
Cairo, Egypt
Konferenzveröffentlichung, Bibliographie
Hülsing, Andreas (2013)
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Cairo, Egypt
Konferenzveröffentlichung, Bibliographie
Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Hrsg.: Gaborit, Philippe (2013)
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
Limoges, France
Konferenzveröffentlichung, Bibliographie
Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
Hrsg.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Konferenzveröffentlichung, Bibliographie
Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes (2013)
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
Artikel, Bibliographie
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Buchkapitel, Bibliographie
Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013)
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
Regensburg, Germany
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Hrsg.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Konferenzveröffentlichung, Bibliographie
Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe (2013)
A User-Centric Digital Signature Scheme.
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Konferenzveröffentlichung, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Konferenzveröffentlichung, Bibliographie
Egert, Rolf (2013)
Lattice-based Signatures.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report, Bibliographie
Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013)
k-anonymous reputation.
Hangzhou, China
doi: 10.1145/2484313.2484361
Konferenzveröffentlichung, Bibliographie
Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013)
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
Konferenzveröffentlichung, Bibliographie
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13). Coimbra, Portugal (18.03.2013-22.03.2013)
doi: 10.1145/2480362.2480727
Konferenzveröffentlichung, Bibliographie
Jeutter, Bennet (2013)
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
Hrsg.: University, Plymouth (2013)
Developing and Testing a Visual Hash Scheme.
Konferenzveröffentlichung, Bibliographie
Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander (2013)
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), 7 (3)
doi: 10.4018/jisp.2013070102
Artikel, Bibliographie
Tschofenig, Hannes ; Volkamer, Melanie ; Jentzsch, Nicola ; Fischer-Hübner, Simone ; Schiffner, Stefan ; Tirtea, Rodica (2013)
On the security, privacy and usability of online seals.
Report, Bibliographie
Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013)
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Artikel, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report, Bibliographie
Katzenbeisser, Stefan ; Schaller, André (2012)
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit
Artikel, Bibliographie
Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan (2012)
Privacy-Preserving Architecture for Forensic Image Recognition.
doi: 10.1109/WIFS.2012.6412629
Konferenzveröffentlichung, Bibliographie
Oswald, Florian (2012)
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Konferenzveröffentlichung, Bibliographie
Vigil, Martín ; Custódio, Ricardo Felipe (2012)
Cleaning up the PKI for Long-term Signatures.
Curitiba PR, Brazil
Konferenzveröffentlichung, Bibliographie
Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012)
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4)
Artikel, Bibliographie
Stopczynski, Martin ; Ghiglieri, Marco (2012)
Smart Home Dashboard – Das intelligente Energiemanagement.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie
Mühlbach, Sascha ; Koch, Andreas (2012)
Malacoda: towards high-level compilation of network security applications on reconfigurable hardware.
Austin, Texas, USA
doi: 10.1145/2396556.2396604
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Hrsg.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012)
Decoupling Authentication from the Usage of Services.
Report, Bibliographie
Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012)
Secure Two-Party Computations in ANSI C.
doi: 10.1145/2382196.2382278
Konferenzveröffentlichung, Bibliographie
Heinrich, Markus (2012)
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Olembo, Maina ; Volkamer, Melanie (2012)
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
Report, Bibliographie
Schläpfer, Michael ; Volkamer, Melanie (2012)
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Albany, NY, USA
doi: 10.1145/2463728.2463807
Konferenzveröffentlichung, Bibliographie
Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012)
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Amsterdam, The Netherlands
doi: 10.1109/SocialCom-PASSAT.2012.60
Konferenzveröffentlichung, Bibliographie
Rodenhausen, Thomas ; Anjorin, Mojisola ; Dominguez Garcia, Renato ; Rensing, Christoph (2012)
Context determines content: an approach to resource recommendation in folksonomies.
In: Proceedings of the 4th ACM RecSys workshop on Recommender systems and the social web
doi: 10.1145/2365934.2365938
Buchkapitel, Bibliographie
Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Hrsg.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
Hrsg.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Konferenzveröffentlichung, Bibliographie
Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
Hrsg.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
Pisa, Italy
Konferenzveröffentlichung, Bibliographie
Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Hrsg.: Buchmann, Johannes (2012)
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE)
Buchkapitel, Bibliographie
Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Artikel, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2012)
Towards the Systematic Development of Contextualized Security Interventions.
Birmingham, UK
Konferenzveröffentlichung, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Konferenzveröffentlichung, Bibliographie
Kirchbuchner, Florian (2012)
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Hrsg.: Knudsen, Lars ; Wu, Huapeng (2012)
Forward Secure Signatures on Smart Cards.
Windsor, Canada
doi: 10.1007/978-3-642-35999-6_5
Konferenzveröffentlichung, Bibliographie
Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes (2012)
A Grid security architecture for AliEn.
Taipei, Taiwan
Konferenzveröffentlichung, Bibliographie
Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Volkamer, Melanie (2012)
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Prague, Czech Republic
doi: 10.1109/ARES.2012.75
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
Report, Bibliographie
Wilhelmi, Klaus (2012)
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012)
Practical Security in E-Mail Applications.
Las Vegas, USA
Konferenzveröffentlichung, Bibliographie
Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Hrsg.: Kripp, Melanie J. ; Volkamer, Melanie ; Grimm, Rüdiger (2012)
Partial Verifiability in POLYAS for the GI Elections.
Castle Hofen, Bregenz, Austria
Konferenzveröffentlichung, Bibliographie
Kelm, David (2012)
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Engels, Heinrich-Alexander (2012)
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Henß, Stefan ; Monperrus, Martin ; Mezini, Mira (2012)
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
Zurich, Switzerland
Konferenzveröffentlichung, Bibliographie
Pradel, Michael ; Jaspan, Ciera ; Aldrich, Jonathan ; Gross, Thomas R. (2012)
Statically checking API protocol conformance with mined multi-object specifications.
Zurich, Switzerland
doi: 10.1109/ICSE.2012.6227127
Konferenzveröffentlichung, Bibliographie
Pradel, Michael ; Gross, Thomas R. (2012)
Leveraging test generation and specification mining for automated bug detection without false positives.
Zurich, Switzerland
doi: 10.1109/ICSE.2012.6227185
Konferenzveröffentlichung, Bibliographie
Piper, Thorsten ; Winter, Stefan ; Manns, Paul ; Suri, Neeraj (2012)
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework.
Boston, MA, USA
doi: 10.1109/DSN.2012.6263913
Konferenzveröffentlichung, Bibliographie
Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012)
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
doi: 10.1007/978-3-642-30921-2
Buch, Bibliographie
Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012)
Converse PUF-Based Authentication.
Konferenzveröffentlichung, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2012)
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security
doi: 10.1108/09685221311314419
Artikel, Bibliographie
Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Konferenzveröffentlichung, Bibliographie
Tse, Edward ; Marentette, Lynn ; Ahmed, Syed Ishtiaque ; Thayer, Alex ; Huber, Jochen ; Kim, Si Jung ; Brown, Quincy ; Mühlhäuser, Max (2012)
Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy.
30th ACM Conference on Human Factors in Computing Systems. Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2212776.2212697
Konferenzveröffentlichung, Bibliographie
Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012)
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2212776.2223823
Konferenzveröffentlichung, Bibliographie
Lissermann, Roman ; Olberding, Simon ; Steimle, Jürgen ; Mühlhäuser, Max (2012)
Interacting with Videos On Paper-like Displays.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2212776.2223839
Konferenzveröffentlichung, Bibliographie
Ständer, Marcus (2012)
Massively distributed authorship of academic papers.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2212776.2212779
Konferenzveröffentlichung, Bibliographie
Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max (2012)
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2208276.2208328
Konferenzveröffentlichung, Bibliographie
Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max (2012)
Occlusion-aware Interaction Techniques for Tabletop Systems.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2212776.2223831
Konferenzveröffentlichung, Bibliographie
Braun, Johannes ; Buchmann, Johannes
Hrsg.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Konferenzveröffentlichung, Bibliographie
Neumann, Stephan ; Volkamer, Melanie (2012)
Formal Treatment of Distributed Trust in Electronic Voting.
Stuttgart. Germany
Konferenzveröffentlichung, Bibliographie
Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Artikel, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report, Bibliographie
Hrsg.: Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (2012)
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
doi: 10.1007/978-3-642-30057-8
Konferenzveröffentlichung, Bibliographie
Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza (2012)
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
Konferenzveröffentlichung, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS: colors for privacy settings.
Lyon, France
doi: 10.1145/2187980.2188139
Konferenzveröffentlichung, Bibliographie
Hauke, Sascha ; Volk, Florian ; Habib, Sheikh Mahbub ; Mühlhäuser, Max
Hrsg.: Dimitrakos, Theo ; Moona, Rajat ; Patel, Dhiren ; McKnight, D. Harrison (2012)
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models.
Proceedings of the 6th International Conference on Trust Management (IFIPTM 2012). Surat, India (21.05.2012-25.05.2012)
doi: 10.1007/978-3-642-29852-3_11
Konferenzveröffentlichung, Bibliographie
Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max (2012)
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.05.2012-10.05.2012)
doi: 10.1145/2212776.2223828
Konferenzveröffentlichung, Bibliographie
Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Walter, Michael (2012)
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012)
Unsafe Exposure Analysis of Mobile In-App Advertisements.
Konferenzveröffentlichung, Bibliographie
Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012)
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications
Buchkapitel, Bibliographie
Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay (2012)
Tetherway: A Framework for Tethering Camouflage.
Tuscon, Arizona
Konferenzveröffentlichung, Bibliographie
Faber, Natalie (2012)
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Konferenzveröffentlichung, Bibliographie
Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
Hrsg.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Buchkapitel, Bibliographie
Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Hrsg.: Suri, Neeraj ; Waidner, Michael (2012)
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
Sicherheit 2012. Sicherheit, Schutz und Zuverlässigkeit . Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Darmstadt, Germany (07.03.2012-09.03.2012)
Konferenzveröffentlichung, Bibliographie
Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Artikel, Bibliographie
Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
Hrsg.: Waldmann, Ulrich (2012)
Post-Quantum Signaturverfahren Heute.
Konferenzveröffentlichung, Bibliographie
Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Konferenzveröffentlichung, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Konferenzveröffentlichung, Bibliographie
Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas (2012)
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
Konferenzveröffentlichung, Bibliographie
Fuhrmann, Tino (2012)
Ansatz zur Erkennung von HTTPS Stripping Attacken.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012)
Technical Aspects of Online Privacy.
Report, Bibliographie
Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
Hrsg.: Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von ; Max-Planck Institut für ausländisches und internationales Strafrecht (2012)
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie
Buchkapitel, Bibliographie
Zeng, Y. ; Klitzing, R. von (2012)
Scaling of layer spacing of charged particles under slit-pore confinement: an effect of concentration or of effective particle diameter?
In: Journal of Physics-Condensed Matter, 24 (46)
Artikel, Bibliographie
Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2012)
The Mobile Data Challenge: Big Data for Mobile Computing Research.
Konferenzveröffentlichung, Bibliographie
Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre (2012)
PeerSense: Who is near you?
Lugano, Switzerland
doi: 10.1109/PerComW.2012.6197553
Konferenzveröffentlichung, Bibliographie
Meziani, Mohammed (2012)
SBS: A Fast and Secure Syndrome Based Stream Cipher.
Anderes, Bibliographie
Fehr, Victoria (2012)
Sophisticated Public-Key Encryption.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012)
On the design and implementation of the Open eCard App.
Darmstadt
Konferenzveröffentlichung, Bibliographie
Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Konferenzveröffentlichung, Bibliographie
Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012)
Improving the Performance of the SYND Stream Cipher.
Al Akhawayn University, Ifran, Morocco
Konferenzveröffentlichung, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012)
Verteilte Dienstnutzung mit dem neuen Personalausweis.
Konferenzveröffentlichung, Bibliographie
Meziani, Mohammed ; Bansarkhani, Rachid El (2012)
An Efficient and Secure Coding-based Authenticated Encryption.
Pisa, Italy
Konferenzveröffentlichung, Bibliographie
Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012)
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
Artikel, Bibliographie
Hrsg.: Buchmann, Johannes (2012)
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme - A multidisciplinary analysis.
Buch, Bibliographie
Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie
Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report, Bibliographie
Schmidt, Axel (2012)
Enabling Secure Online Elections with the Voting Service Provider.
Technische Universität Darmstadt
Dissertation, Bibliographie
Bartsch, Steffen (2012)
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
Dissertation, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Konferenzveröffentlichung, Bibliographie
Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan (2012)
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
Konferenzveröffentlichung, Bibliographie
Cuong, N. ; Katzenbeisser, Stefan (2012)
Robust Resampling Detection in Digital Images.
Konferenzveröffentlichung, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Konferenzveröffentlichung, Bibliographie
Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes (2012)
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
Artikel, Bibliographie
Hrsg.: Suri, Neeraj ; Waidner, Michael (2012)
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge
der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft
für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt.
Konferenzveröffentlichung, Bibliographie
Kalabis, Lukas ; Selzer, Annika (2012)
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9)
doi: 10.1007/s11623-012-0224-1
Artikel, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Social Informatics 4th International Conference, SocInfo 2012, proceedings
doi: 10.1007/978-3-642-35386-4_15
Buchkapitel, Bibliographie
Halvani, Oren Avni (2012)
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Filtschew, Konstantin (2012)
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Bartsch, Steffen ; Sasse, Angela
Hrsg.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Konferenzveröffentlichung, Bibliographie
Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph (2012)
Security versus Trust Indicators in 2011 in Germany.
Freiburg
Konferenzveröffentlichung, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Hrsg.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Buchkapitel, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011)
Towards a Trust Management System for Cloud Computing.
10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha, China (16.11.2011-18.11.2011)
doi: 10.1109/TrustCom.2011.129
Konferenzveröffentlichung, Bibliographie
Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Konferenzveröffentlichung, Bibliographie
Bothe, Dieter (1997)
Reaction-diffusion systems with discontinuities. A viability approach.
In: Nonlinear Analysis: Theory, Methods & Applications, 30 (2)
doi: 10.1016/S0362-546X(97)00247-2
Artikel, Bibliographie
Klitzing, R. von ; Mohwald, H. (1996)
Transport through ultrathin polyelectrolyte films.
In: Thin Solid Films, 284
doi: 10.1016/S0040-6090(95)08340-5
Artikel, Bibliographie