Items in division
- TU Darmstadt (106366)
- Profile Areas (2345)
- Cybersecurity (CYSEC) (1479)
- Energy Center (16)
- Profile Areas (2345)
A
Alexopoulos, Nikolaos ; Brack, Manuel ; Wagner, Jan Philipp ; Grube, Tim ; Mühlhäuser, Max (2022)
How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.-12.08.2022)
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021)
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21). virtual conference (Mon 11 - Fri 15 October 2021)
doi: 10.1145/3475716.3475783
Conference or Workshop Item, Bibliographie
Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021)
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.-27.05.2021)
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Harasser, Patrick ; Janson, Christian (2021)
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs.
20th International Conference on Cryptology and Network Security (CANS 2021). Vienna, Austria (13.-15.12.2021)
Conference or Workshop Item, Bibliographie
Avramidis, Mario ; Kellner, Christiane ; Staudt, Josephine ; Zimmermann, Verena ; Gerber, Nina
eds.: Wienrich, C. ; Wintersberger, P. ; Weyers, B. (2021)
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.-08.09.2021)
doi: 10.18420/muc2021-mci-ws10-351
Conference or Workshop Item, Bibliographie
Avramidis, Mario ; Kellner, Christiane ; Staudt, Josefine ; Zimmermann, Verena ; Gerber, Nina
eds.: Wienrich, Carolin ; Wintersberger, Philipp ; Weyers, Benjamin (2021)
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance.
doi: 10.18420/muc2021-mci-ws10-351
Conference or Workshop Item, Bibliographie
Afkhami, S. ; Gambaryan-Roisman, T. ; Pismen, L. M. (2020)
Editorial: Challenges in nanoscale physics of wetting phenomena.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-000167-4
Article, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020)
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1)
doi: 10.1145/3406112
Article, Bibliographie
Al-Falahi, Adil ; Alobaid, Falah ; Epple, Bernd (2020)
A New Design of an Integrated Solar Absorption Cooling System Driven by an Evacuated Tube Collector: A Case Study for Baghdad, Iraq.
In: Applied Sciences, 10 (10)
doi: 10.3390/app10103622
Article, Bibliographie
Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Article, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020)
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20). virtual Conference (30.03.-03.04.)
doi: 10.1145/3341105.3374020
Conference or Workshop Item, Bibliographie
Almoslh, Adel ; Alobaid, Falah ; Heinze, Christian ; Epple, Bernd (2020)
Comparison of Equilibrium-Stage and Rate-Based Models of a Packed Column for Tar Absorption Using Vegetable Oil.
In: Applied Sciences, 10 (7)
doi: 10.3390/app10072362
Article, Bibliographie
Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19-22.10.2020)
Conference or Workshop Item, Bibliographie
Alber, Gernot ; Sauer, Alexander (2020)
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming.
In: Cryptography, 4 (1)
doi: 10.3390/cryptography4010002
Article, Bibliographie
Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
24th International Conference on Financial Cryptography and Data Security (FC'20). Kota Kinabalu, Malaysia (10.-14.02.)
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
The 25th Australasian Conference on Information Security and Privacy (ACISP'20). Perth, Australia (30.11.-02.12.)
Conference or Workshop Item, Bibliographie
Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020)
Peek-a-Boo: I see your smart home activities, even encrypted!
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (July 08.-10., 2020)
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.-13.11.)
Conference or Workshop Item, Bibliographie
Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020)
Control Behavior Integrity for Distributed Cyber-Physical Systems.
11th International Conference on Cyber-Physical Systems (ICCPS). Sydney, Australia (22.-24. April, 2020)
doi: 10.1109/ICCPS48487.2020.00011
Conference or Workshop Item, Bibliographie
Appel, Christian ; Kuttich, Björn ; Stühn, Lukas ; Stark, Robert W. ; Stühn, Bernd (2019)
Structural Properties and Magnetic Ordering in 2D Polymer Nanocomposites: Existence of Long Magnetic Dipolar Chains in Zero Field.
In: Langmuir, 35 (37)
doi: 10.1021/acs.langmuir.9b02094
Article, Bibliographie
Ashihmin, Alexander ; Piskunov, Maxim ; Roisman, Ilia ; Yanovsky, Vycheslav (2019)
Thermal stability control of the water-in-diesel microemulsion fuel produced by using a nonionic surfactant combined with aliphatic alcohols.
In: Journal of Dispersion Science and Technology
doi: 10.1080/01932691.2019.1634583
Article, Bibliographie
Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019)
Investigating Next Steps in Static API-Misuse Detection.
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). Montreal, QC, Canada (Sun 26 - Mon 27 May 2019)
Conference or Workshop Item, Bibliographie
Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019)
Nautilus: Fishing for Deep Bugs with Grammars.
Conference or Workshop Item, Bibliographie
Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019)
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (May 19 to 22, 2019)
Conference or Workshop Item, Bibliographie
Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019)
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN). Osnabrück (14-17 Oktober 2019)
Conference or Workshop Item, Bibliographie
Antritter, Thomas ; Hachmann, Peter ; Gambaryan-Roisman, Tatiana ; Buck, Bernhard ; Stephan, Peter (2019)
Spreading of Micrometer-Sized Droplets under the Influence of Insoluble and Soluble Surfactants: A Numerical Study.
In: Colloids and Interfaces, 3 (3)
doi: 10.3390/colloids3030056
Article, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018)
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day. Kirchheim bei München, Germany (07.- 08.06.2018)
doi: 10.18420/cdm-2018-28-23
Conference or Workshop Item, Bibliographie
Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018)
Estimate all the {LWE, NTRU} schemes!
11th Conference on Security and Cryptography for Networks. Amalfi, Italy
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018)
Towards Secure Distributed Trust Management on a Global Scale.
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy. Budapest, Hungary (20.-25.08)
doi: 10.1145/3229565.3229569
Conference or Workshop Item, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018)
An Overview of DRAM-Based Security Primitives.
In: Cryptography, 2 (7)
doi: 10.3390/cryptography2020007
Article, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018)
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018). Barcelona, Spain (September 3-7, 2018)
Conference or Workshop Item, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018)
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3)
doi: 10.3390/cryptography2030013
Article, Bibliographie
Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Alobaid, Falah ; Al-Maliki, Wisam Abed Kattea ; Lanz, Thomas ; Haaf, Martin ; Brachthäuser, Andreas ; Epple, Bernd ; Zorbach, Ingo (2018)
Dynamic simulation of a municipal solid waste incinerator.
In: Energy, 149
doi: 10.1016/j.energy.2018.01.170
Article, Bibliographie
Alhassan, Masaud Y. (2018)
Improving scalability of universal circuits for large-scale private function evaluation.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018)
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
doi: 10.48550/arXiv.1801.05764
Report, Bibliographie
Ahmad, Saad (2018)
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018)
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
Article, Bibliographie
Aygüler, Meltem F. ; Hufnagel, Alexander G. ; Rieder, Philipp ; Wussler, Michael ; Jaegermann, Wolfram ; Bein, Thomas ; Dyakonov, Vladimir ; Petrus, Michiel L. ; Baumann, Andreas ; Docampo, Pablo (2018)
Influence of Fermi Level Alignment with Tin Oxide on the Hysteresis of Perovskite Solar Cells.
In: ACS Applied Materials & Interfaces, 10 (14)
doi: 10.1021/acsami.8b00990
Article, Bibliographie
Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018)
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing
doi: 10.1109/MIC.2018.182130646
Article, Bibliographie
Asokan, N. ; Miettinen, Markus (2018)
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications
doi: 10.1016/j.comcom.2018.07.030
Article, Bibliographie
Ay, Serafettin (2017)
Detecting WiFi Covert Channels.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017)
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
27th Crypto-Day. Frankfurt (Oder), Germany (7 - 8 December 2017)
doi: 10.13140/RG.2.2.25411.91689
Conference or Workshop Item, Bibliographie
Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017)
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
Conference or Workshop Item, Bibliographie
Afridi, Hassaan Ali Khan (2017)
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017)
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Lucca, Italy (08.-13.10 2017)
doi: 10.1007/978-3-319-99843-5_10
Conference or Workshop Item, Bibliographie
Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017)
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017)
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
Sydney, Australia (1-4 August 2017)
doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.283
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017)
MCMix: Anonymous Messaging via Secure Multiparty Computation.
Vancouver, BC, Canada (16-18 August 2018)
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017)
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
26th USENIX Security Symposium. Vancouver, Canada (16.-18.08.2017)
Conference or Workshop Item, Bibliographie
Ariyanto, Teguh ; Kern, Andreas M. ; Etzold, Bastian J. M. ; Zhang, Gui-Rong (2017)
Carbide-derived carbon with hollow core structure and its performance as catalyst support for methanol electro-oxidation.
In: Electrochemistry Communications, 82
doi: 10.1016/j.elecom.2017.07.010
Article, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017)
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day. Nürnberg, Germany (01.-02.06.2017)
Conference or Workshop Item, Bibliographie
Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Article, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017)
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3)
doi: 10.1007/s00145-016-9236-6
Article, Bibliographie
Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017)
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615)
Article, Bibliographie
Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017)
Revisiting TESLA in the quantum random oracle model.
Utrecht, the Netherlands
Conference or Workshop Item, Bibliographie
Alam, Ehsanul ; Yadav, S. ; Schneider, J. ; Gambaryan-Roisman, Tatiana (2017)
Imbibition of water into substrates prepared by thermal treatment of polydimethylsiloxane layers.
In: Colloids and Surfaces a-Physicochemical and Engineering Aspects, 521
Article, Bibliographie
Alexopoulos, Nikolaos (2017)
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Marrakech, Morocco (3-6 April 2017)
doi: 10.1145/3019612.3019921
Conference or Workshop Item, Bibliographie
Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew (2017)
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077
Conference or Workshop Item, Bibliographie
Avdic, Amer ; Kuenne, Guido ; Di Mare, Francesca ; Janicka, J. (2017)
LES combustion modeling using the Eulerian stochastic field method coupled with tabulated chemistry.
In: Combustion and Flame, 175
Article, Bibliographie
Alobaid, Falah ; Mertens, Nicolas ; Starkloff, Ralf ; Lanz, Thomas ; Heinze, Christian ; Epple, Bernd (2017)
Progress in dynamic simulation of thermal power plants.
In: Progress in Energy and Combustion Science, 59
Article, Bibliographie
Angelberger, C. ; Nicollet, Franck ; Krüger, Christian ; Schorr, Jürgen ; Nicoud, Edouard ; Colin, Olivier ; Angelberger, Christian ; Bode, Johannes ; Böhm, Benjamin (2017)
A PIV-Guided Large-Eddy Simulation of In-Cylinder Flows.
In: Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles, 72 (5)
doi: 10.2516/ogst/2017022
Article, Bibliographie
Acosta, Matias ; Detsch, Rainer ; Grünewald, Alina ; Rojas, Virginia ; Schultheiß, Jan ; Wajda, Aleksandra ; Stark, Robert W. ; Narayan, Suman ; Sitarz, Maciej ; Koruza, Jurij ; Boccaccini, Aldo R. (2017)
Cytotoxicity, chemical stability, and surface properties of ferroelectric ceramics for biomaterials.
In: Journal of the American Ceramic Society, 101 (1)
doi: 10.1111/jace.15193
Article, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Conference or Workshop Item, Bibliographie
Ali, Azmzt ; Othmane, Lotfi Ben (2016)
Towards effective security assurance for incremental software development - the case of zen cart application,.
Conference or Workshop Item, Bibliographie
Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Security aspects and comparison of block ciphers LED and TEA.
Report, Bibliographie
Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Block ciphers for the IoT - SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
Report, Bibliographie
Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016)
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
Report, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Conference or Workshop Item, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Bodden, Eric (2016)
StubDroid: automatic inference of precise data-flow summaries for the android framework.
doi: 10.1145/2884781.2884816
Conference or Workshop Item, Bibliographie
Alber, Gernot ; Trautmann, Nils (2016)
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, 672 (1)
doi: 10.1088/1742-6596/672/1/012004
Article, Bibliographie
Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016)
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Fes, Morocco
Conference or Workshop Item, Bibliographie
Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016)
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Koper, Slovenia
Conference or Workshop Item, Bibliographie
Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
Report, Bibliographie
Al-Maliki, Wisam Abed Kattea ; Alobaid, Falah ; Kez, Vitali ; Epple, Bernd (2016)
Modelling and dynamic simulation of a parabolic trough power plant.
In: Journal of Process Control, 26
Article, Bibliographie
Avdic, A. ; Kuenne, G. ; Janicka, J. (2016)
Flow Physics of a Bluff-Body Swirl Stabilized Flame and their Prediction by Means of a Joint Eulerian Stochastic Field and Tabulated Chemistry Approach.
In: Flow Turbulence and Combustion, 97 (4)
Article, Bibliographie
Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016)
Computational Security of Quantum Encryption.
In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016
Book Section, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Conference or Workshop Item, Bibliographie
Albert, C. ; Kromer, Johannes ; Robertson, A. M. ; Bothe, D. (2015)
Dynamic behaviour of buoyant high viscosity droplets rising in a quiescent liquid.
In: Journal of Fluid Mechanics, 778
Article, Bibliographie
Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015)
Conference or Workshop Item, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie
Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015)
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755)
Article, Bibliographie
Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko (2015)
Hybrid Monitors for Concurrent Noninterference.
Verona, Italy
doi: 10.1109/CSF.2015.17
Conference or Workshop Item, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
DAC '15: The 52nd Annual Design Automation Conference 2015. San Francisco, California (07.06. - 11.06.2015)
Conference or Workshop Item, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Conference or Workshop Item, Bibliographie
Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Acosta, Matias ; Liu, Na ; Deluca, Marco ; Heidt, Sabrina ; Ringl, Ines ; Dietz, Christian ; Stark, Robert W. ; Jo, Wook (2015)
Tailoring ergodicity through selective A-site doping in the Bi1/2Na1/2TiO3–Bi1/2K1/2TiO3 system.
In: Journal of Applied Physics, 117 (13)
doi: 10.1063/1.4916719
Article, Bibliographie
Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_17
Conference or Workshop Item, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_26
Conference or Workshop Item, Bibliographie
Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015)
Evaluation of User Feedback in Smart Home for Situational Context Identification.
St. Louis, MO, USA
doi: 10.1109/PERCOMW.2015.7133987
Conference or Workshop Item, Bibliographie
Abele, Eberhard ; Stoffregen, Hanns Alexander ; Kniepkamp, Michael ; Lang, Sebastian ; Hampe, Manfred (2015)
Selective laser melting for manufacturing of thin-walled porous elements.
In: Journal of Materials Processing Technology, 215
Article, Bibliographie
Alobaid, Falah ; Starkloff, Ralf ; Pfeiffer, Stefan ; Karner, Karl ; Epple, Bernd ; Kim, Hyun-Gee (2015)
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part A: Part loads and off-design operation.
In: Fuel, 153
Article, Bibliographie
Alobaid, Falah ; Starkloff, Ralf ; Pfeiffer, Stefan ; Karner, Karl ; Epple, Bernd ; Kim, Hyun-Gee (2015)
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part B: Start-up procedure.
In: Fuel, 153
Article, Bibliographie
Aghajari, Nima ; Schaefer, Michael (2015)
Efficient shape optimization for fluid-structure interaction problems.
In: Journal of Fluids and Structures, 57
Article, Bibliographie
Abe, Ken ; Giga, Yoshikazu ; Hieber, Matthias (2015)
STOKES RESOLVENT ESTIMATES IN SPACES OF BOUNDED FUNCTIONS.
In: Annales Scientifiques De L Ecole Normale Superieure, 48 (3)
Article, Bibliographie
Alobaid, Falah ; Ohlemueller, Peter ; Stroehle, Jochen ; Epple, Bernd (2015)
Extended Euler-Euler model for the simulation of a 1 MWth chemical-looping pilot plant.
In: Energy, 93
Article, Bibliographie
Ardham, Vikram Reddy ; Deichmann, Gregor ; Vegt, Nico F. A. van der ; Leroy, Frederic (2015)
Solid-liquid work of adhesion of coarse-grained models of n-hexane on graphene layers derived from the conditional reversible work method.
In: The Journal of chemical physics, 143 (24)
Article, Bibliographie
Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014)
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Scottsdale, AZ, USA
Conference or Workshop Item, Bibliographie
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
eds.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Book Section, Bibliographie
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Article, Bibliographie
Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
doi: 10.1145/2568225.2568243
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014)
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Conference or Workshop Item, Bibliographie
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Book, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Conference or Workshop Item, Bibliographie
Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013)
Vertrauenswürdige Smartphones: Technologien und Lösungen.
Conference or Workshop Item, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Article, Bibliographie
Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Article, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Conference or Workshop Item, Bibliographie
B
Böck, Leon (2024)
On IP-Based Botnet Measurements.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024761
Ph.D. Thesis, Primary publication, Publisher's Version
Bhaumik, Ritam ; Chakraborty, Bishwajit ; Choi, Wonseok ; Dutta, Avijit ; Govinden, Jérôme ; Shen, Yaobin (2024)
The Committing Security of MACs with Applications to Generic Composition.
44th Annual International Cryptology Conference (CRYPTO 2024). Santa Barbara, USA (18.-22.08.2024)
Conference or Workshop Item, Bibliographie
Brüggemann, Andreas ; Hundt, Robin ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
FLUTE: Fast and Secure Lookup Table Evaluations.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023 - 25.05.2023)
doi: 10.1109/SP46215.2023.10179345
Conference or Workshop Item, Bibliographie
Banegas, Gustavo ; Krämer, Juliane ; Lange, Tanja ; Meyer, Michael ; Panny, Lorenz ; Reijnders, Krijn ; Sotáková, Jana ; Trimoska, Monika (2023)
Disorientation Faults in CSIDH.
42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Lyon, France (23.-27.04.2023)
doi: 10.1007/978-3-031-30589-4_11
Conference or Workshop Item, Bibliographie
Böck, Leon ; Levin, Dave ; Padmanabhan, Ramakrishna ; Doerr, Christian ; Mühlhäuser, Max (2023)
How to Count Bots in Longitudinal Datasets of IP Addresses.
Conference or Workshop Item, Bibliographie
Benedikt, Barbara Jiabao ; Fischlin, Marc ; Huppert, Moritz (2022)
Nostradamus Goes Quantum.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.-09.12.2022)
doi: 10.1007/978-3-031-22969-5_20
Conference or Workshop Item, Bibliographie
Brüggemann, Andreas ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2022)
Poster: Efficient Three-Party Shuffling Using Precomputation.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022 - 11.11.2022)
doi: 10.1145/3548606.3563511
Conference or Workshop Item, Bibliographie
Böck, Leon ; Fejrskov, Martin ; Demetzou, Katerina ; Karuppayah, Shankar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2022)
Processing of botnet tracking data under the GDPR.
In: Computer law & security review, 45
doi: 10.1016/j.clsr.2021.105652
Article, Bibliographie
Bell, Alena K. ; Kind, Jonas ; Hartmann, Maximilian ; Kresse, Benjamin ; Höfler, Mark V. ; Straub, Benedikt B. ; Auernhammer, Günter K. ; Vogel, Michael ; Thiele, Christina M. ; Stark, Robert W. (2022)
Concentration gradients in evaporating binary droplets probed by spatially resolved Raman and NMR spectroscopy.
In: Proceedings of the National Academy of Sciences, 119 (15)
doi: 10.1073/pnas.2111989119
Article, Bibliographie
Bothe, Dieter ; Niethammer, Matthias ; Pilz, Christian ; Brenn, Günter (2022)
On the molecular mechanism behind the bubble rise velocity jump discontinuity in viscoelastic liquids.
In: Journal of Non-Newtonian Fluid Mechanics, 302
doi: 10.1016/j.jnnfm.2022.104748
Article, Bibliographie
Böhler, Heike ; Hanegraaff, Marcel ; Schulze, Kai (2022)
Does climate advocacy matter? The importance of competing interest groups for national climate policies.
In: Climate Policy
doi: 10.1080/14693062.2022.2036089
Article, Bibliographie
Balthasar, Mandy ; Gerber, Nina ; Schmitt, Hartmut
eds.: Ludewig, Elske ; Jackstädt, Thomas (2022)
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen.
doi: 10.18420/muc2021-up-448
Conference or Workshop Item, Bibliographie
Bekaert, Paul ; Alotaibi, Norah ; Mathis, Florian ; Gerber, Nina ; Rafferty, Aidan Christopher ; Khamis, Mohamed ; Marky, Karola (2022)
Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives.
Nordic Human-Computer Interaction Conference (NordiCHI '22). Aarhus, Denmark (October 8–12, 2022)
doi: 10.1145/3546155.3546706
Conference or Workshop Item, Bibliographie
Braun, Lennart ; Cammarota, Rosario ; Schneider, Thomas (2021)
A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract).
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems. virtual Conference (06.-14.12.2021)
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Couteau, Geoffrey ; Karanko, Phila ; Rohrbach, Felix (2021)
On Derandomizing Yao’s Weak-to-Strong OWF Construction.
19th International Conference on Theory of Cryptography (TCC 2021). Raleigh, USA (08.-11.11.2021)
doi: 10.1007/978-3-030-90453-1_15
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline ; Fiedler, Rune ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2021)
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
doi: 10.1007/978-3-030-97131-1_1
Report, Bibliographie
Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.-11.06.2021)
Conference or Workshop Item, Bibliographie
Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021)
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21). Vancouver, Canada (11.-13.08.)
Conference or Workshop Item, Bibliographie
Böck, Leon ; Shankar, Karuppayah ; Mühlhäuser, Max ; Emmanouil, Vasilomanolakis (2020)
An Overview of the Botnet Simulation Framework.
In: The Journal on Cybercrime & Digital Investigations, 6 (1)
doi: 10.18464/cybin.v6i1.25
Article, Bibliographie
Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil
eds.: Moriai, Shiho ; Wang, Huaxiong (2020)
Security Reductions for White-Box Key-Storage in Mobile Payments.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). Daejeon, Korea (07.-11.12.2020)
doi: 10.1007/978-3-030-64837-4_8
Conference or Workshop Item, Bibliographie
Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020)
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Conference or Workshop Item, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020 - 13.11.2020)
doi: 10.1145/3411501.3419425
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (June 1-5, 2020)
Conference or Workshop Item, Bibliographie
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.-22.10.2020)
Conference or Workshop Item, Bibliographie
Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2020)
A fully coupled numerical model for deposit formation from evaporating urea-water drops.
In: International Journal of Heat and Mass Transfer, 159
doi: 10.1016/j.ijheatmasstransfer.2020.120069
Article, Bibliographie
Bothe, Dieter (2020)
Reflections on the article “Moving contact lines and dynamic contact angles: a ‘litmus test’ for mathematical models and some new challenges” by Yulii D. Shikhmurzaev.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-000149-6
Article, Bibliographie
Bothe, Dieter (2020)
On moving hypersurfaces and the discontinuous ODE-system associated with two-phase flows.
In: Nonlinearity, 33 (10)
doi: 10.1088/1361-6544/ab987d
Article, Bibliographie
Brulin, Sebastian ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Fingering instability of a viscous liquid bridge stretched by an accelerating substrate.
In: Journal of Fluid Mechanics, 899
doi: 10.1017/jfm.2020.422
Article, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.08.2020 - 28.08.2020)
doi: 10.1145/3407023.3407045
Conference or Workshop Item, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (17.08.2020 - 21.08.2020)
Conference or Workshop Item, Bibliographie
Brilmayer, Robert ; Förster, Claire ; Zhao, Lucy ; Andrieu-Brunsen, Annette (2020)
Recent trends in nanopore polymer functionalization.
In: Current Opinion in Biotechnology, 63
doi: 10.1016/j.copbio.2020.03.005
Article, Bibliographie
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09. – 13. March 2020)
Conference or Workshop Item, Bibliographie
Brulin, Sebastian ; Tropea, Cameron ; Roisman, Ilia V. (2020)
Pinch-off of a viscous liquid bridge stretched with high Reynolds numbers.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 587
doi: 10.1016/j.colsurfa.2019.124271
Article, Bibliographie
Brilmayer, Robert ; Kübelbeck, Sonja ; Khalil, Adnan ; Brodrecht, Martin ; Kunz, Ulrike ; Kleebe, Hans-Joachim ; Buntkowsky, Gerd ; Baier, Grit ; Andrieu‐Brunsen, Annette (2020)
Influence of Nanoconfinement on the pKa of Polyelectrolyte Functionalized Silica Mesopores.
In: Advanced Materials Interfaces, 7 (7)
doi: 10.1002/admi.201901914
Article, Bibliographie
Bauer, Andreas ; Bopp, Maximilian ; Jakirlic, Suad ; Tropea, Cameron ; Krafft, Axel Joachim ; Shokina, Nina ; Hennig, Jürgen (2020)
Analysis of the wall shear stress in a generic aneurysm under pulsating and transitional flow conditions.
In: Experiments in Fluids, 61 (2)
doi: 10.1007/s00348-020-2901-4
Article, Bibliographie
Burzynski, David A. ; Roisman, Ilia V. ; Bansmer, Stephan E. (2020)
On the splashing of high-speed drops impacting a dry surface.
In: Journal of Fluid Mechanics, 892
doi: 10.1017/jfm.2020.168
Article, Bibliographie
Baier, Tobias ; Hardt, Steffen (2020)
Gas separation in a Knudsen pump inspired by a Crookes radiometer.
In: Microfluidics and Nanofluidics, 24 (6)
doi: 10.1007/s10404-020-02342-6
Article, Bibliographie
Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography. virtual Conference (08.-10.07.)
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020)
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020). virtual Conference (19.-23.10.)
Conference or Workshop Item, Bibliographie
Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.-11.12.)
Conference or Workshop Item, Bibliographie
Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019)
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference. San Juan, Puerto Rico (December 9-13)
Conference or Workshop Item, Bibliographie
Boyaciyan, Dikran ; Klitzing, R. von (2019)
Stimuli-responsive polymer/metal composites: From fundamental research to self-regulating devices.
In: Current Opinion in Colloid & Interface Science, 44
doi: 10.1016/j.cocis.2019.10.005
Article, Bibliographie
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019)
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019)
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Report, Bibliographie
Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019)
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security
doi: 10.1186/s13635-019-0099-x
Article, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
eds.: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A. (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
24th European Symposium on Research in Computer Security. Luxembourg (23.-27.09.2019)
doi: 10.1007/978-3-030-29962-0_25
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019)
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40)
doi: 10.21105/joss.01606
Article, Bibliographie
Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019)
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium. Santa Clara, CA, USA (August 14–16, 2019)
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas
eds.: Ding, Jintai ; Steinwandt, Rainer (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
10th International Conference on Post-Quantum Cryptography. Chongqing, People's Republic China (08.-10.05.2019)
doi: 10.1007/978-3-030-25510-7_12
Conference or Workshop Item, Bibliographie
Bodenstein, Christina ; Sauer, Hans Martin ; Hirmer, Katrin ; Dörsam, Edgar (2019)
Printing process and characterization of fully pad printed electroluminescent panels on curved surfaces.
In: Journal of Coatings Technology and Research, 16 (6)
doi: 10.1007/s11998-019-00243-0
Article, Bibliographie
Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019)
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
ACM Asia Conference on Computer and Communications Security (AsiaCCS). Auckland (07. - 12.07.2019)
doi: 10.1145/3321705.3329827
Conference or Workshop Item, Bibliographie
Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019)
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Faro, Portugal (12.-14.06.2019)
doi: 10.1007/978-3-030-22750-0_48
Conference or Workshop Item, Bibliographie
Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (June 02 - 06, 2019)
Conference or Workshop Item, Bibliographie
Boukoros, Spyridon (2019)
Multidimensional Privacy Quantification for User Empowerment.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Brendel, Jacqueline ; Gerber, Nina (2019)
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5)
doi: 10.1007/s11623-019-1107-5
Article, Bibliographie
Baumli, Philipp ; Teisala, Hannu ; Bauer, Hoimar ; Garcia‐Gonzalez, Diana ; Damle, Viraj ; Geyer, Florian ; D'Acunzi, Maria ; Kaltbeitzel, Anke ; Butt, Hans-Jürgen ; Vollmer, Doris (2019)
Flow‐Induced Long‐Term Stable Slippery Surfaces.
In: Advanced Science
doi: 10.1002/advs.201900019
Article, Bibliographie
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung 2019: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.-19.02.2019)
Conference or Workshop Item, Bibliographie
Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
SANCTUARY: ARMing TrustZone with User-space Enclaves.
Conference or Workshop Item, Bibliographie
Becker, Lukas G. ; Langenthal, Thomas von ; Pielsticker, Stefan ; Böhm, Benjamin ; Kneer, Reinhold ; Dreizler, Andreas (2019)
Experimental investigation of particle-laden flows in an oxy-coal combustion chamber for non-reacting conditions.
In: Fuel, 235
doi: 10.1016/j.fuel.2018.08.076
Article, Bibliographie
Bender, Achim ; Stroh, Alexander ; Frohnapfel, Bettina ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2019)
Combined direct numerical simulation and long-wave simulation of a liquid film sheared by a turbulent gas flow in a channel.
In: Physics of Fluids, 31 (2)
doi: 10.1063/1.5064423
Article, Bibliographie
Brumm, Pauline ; Sauer, Hans Martin ; Dörsam, Edgar (2019)
Scaling Behavior of Pattern Formation in the Flexographic Ink Splitting Process.
In: Colloids and Interfaces, 3 (1)
doi: 10.3390/colloids3010037
Article, Bibliographie
Bürkle, Sebastian ; Becker, Lukas G. ; Agizza, Maria A. ; Dreizler, Andreas ; Wagner, Steven (2019)
Comparison of two measurement strategies to obtain the residence time distribution in combustion chambers using tunable diode laser absorption spectroscopy.
In: Applied Optics, 58 (10)
doi: 10.1364/ao.58.000c36
Article, Bibliographie
Bruce, Ellen E. ; Bui, Pho T. ; Rogers, Bradley A. ; Cremer, Paul S. ; Vegt, Nico F. A. van der (2019)
Nonadditive Ion Effects Drive Both Collapse and Swelling of Thermoresponsive Polymers in Water.
In: Journal of the American Chemical Society, 141 (16)
doi: 10.1021/jacs.9b00295
Article, Bibliographie
Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019)
Security Reductions for White-Box Key-Storage in Mobile Payments.
doi: 10.1007/978-3-030-64837-4_8
Report, Bibliographie
Butz, David ; Hartl, Sandra ; Popp, Sebastian ; Walther, Steffen ; Barlow, Robert S. ; Hasse, Christian ; Dreizler, Andreas ; Geyer, Dirk (2019)
Local flame structure analysis in turbulent CH4/air flames with multi-regime characteristics.
In: Combustion and Flame, 210
doi: 10.1016/j.combustflame.2019.08.032
Article, Bibliographie
Bansarkhani, Rachid El (2019)
LARA - A Design Concept for Lattice-based Encryption.
FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Frigate Bay, St. Kitts and Nevis (February 18.-22., 2019)
doi: 10.1007/978-3-030-32101-7_23
Conference or Workshop Item, Bibliographie
Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018)
Exploring the Performance Envelope of the LLL Algorithm.
21st IEEE International Conference on Computational Science and Engineering. Bucharest, Romania (29.-31.10.2018)
doi: 10.1109/CSE.2018.00012
Conference or Workshop Item, Bibliographie
Büscher, Niklas (2018)
Compilation for More Practical Secure Multi-Party Computation.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018)
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018. Toronto, Canada (15.-19.10. 2018)
Conference or Workshop Item, Bibliographie
Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243786
Conference or Workshop Item, Bibliographie
Baier, Tobias ; Tiwari, Sudarshan ; Shrestha, Samir ; Klar, Axel ; Hardt, Steffen (2018)
Thermophoresis of Janus particles at large Knudsen numbers.
In: Physical Review Fluids, 3 (094202)
doi: 10.1103/PhysRevFluids.3.094202
Article, Bibliographie
Backes, Sebastian ; Klitzing, R. von (2018)
Nanomechanics and Nanorheology of Microgels at Interfaces.
In: Polymers, 10 (9)
doi: 10.3390/polym10090978
Article, Bibliographie
Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Conference or Workshop Item, Bibliographie
Butt, Hans-Jürgen ; Berger, Rüdiger ; Steffen, Werner ; Vollmer, Doris ; Weber, Stefan A. L. (2018)
Adaptive Wetting – Adaptation in Wetting.
In: Langmuir, 34 (38)
doi: 10.1021/acs.langmuir.8b01783
Article, Bibliographie
Baack, Leon (2018)
Optimisation of parts of a set-up for quantum key distribution.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018)
Towards Practical RAM based Secure Computation.
ESORICS 2018. Barcelona, Spain (3.9.-7.9. 2018)
Conference or Workshop Item, Bibliographie
Boyaciyan, Dikran ; Braun, Larissa ; Löhmann, Oliver ; Silvi, Luca ; Schneck, Emanuel ; Klitzing, R. von (2018)
Gold nanoparticle distribution in polyelectrolyte brushes loaded at different pH conditions.
In: The Journal of Chemical Physics, 149 (16)
doi: 10.1063/1.5035554
Article, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018)
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
Article, Bibliographie
Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018)
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium.
Conference or Workshop Item, Bibliographie
Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018)
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM). Honolulu, Hawaii, USA (15-19 April 2018)
Conference or Workshop Item, Bibliographie
Brandy, Malte (2018)
Asymptotische Eigenschaften iterierter Quantenoperationen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bender, Achim ; Hänichen, Philipp ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018)
Modeling Crystallization and Heat Transfer in an Evaporating Urea-Water Drop.
In: IHTC 16 - International Heat Transfer Conference 16 Digital Libary, August 10-15, Beijing, China
doi: 10.1615/IHTC16
Article, Bibliographie
Batzdorf, Stefan ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2018)
Direct Numerical Simulation of the Microscale Fluid Flow and Heat Transfer in the Three-Phase Contact Line Region During Evaporation.
In: Journal of Heat Transfer, 140 (3)
doi: 10.1115/1.4038191
Article, Bibliographie
Bürkle, Sebastian ; Dreizler, Andreas ; Ebert, Volker ; Wagner, Steven (2018)
Experimental comparison of a 2D laminar diffusion flame under oxy-fuel and air atmosphere.
In: Fuel, 212
doi: 10.1016/j.fuel.2017.10.067
Article, Bibliographie
Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018)
Numerical investigation of the evolution and breakup of an evaporating liquid film on a structured wall.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.01.013
Article, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2018)
From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59 (3)
doi: 10.1007/s00348-018-2514-3
Article, Bibliographie
Boyaciyan, D. ; Krause, P. ; Klitzing, R. von (2018)
Making strong polyelectrolyte brushes pH-sensitive by incorporation of gold nanoparticles.
In: Soft Matter, 14 (20)
doi: 10.1039/c8sm00411k
Article, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2018)
Publisher Correction: From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59 (5)
doi: 10.1007/s00348-018-2535-y
Article, Bibliographie
Bruce, Ellen E. ; Vegt, Nico F. A. van der (2018)
Does an electronic continuum correction improve effective short-range ion-ion interactions in aqueous solution?
In: The Journal of Chemical Physics, 148 (22)
doi: 10.1063/1.5017101
Article, Bibliographie
Bürkle, Sebastian ; Becker, Lukas Georg ; Dreizler, Andreas ; Wagner, Steven (2018)
Experimental investigation of the flue gas thermochemical composition of an oxy-fuel swirl burner.
In: Fuel, 231
doi: 10.1016/j.fuel.2018.05.039
Article, Bibliographie
Bürkle, Sebastian ; Biondo, Luigi ; Ding, Carl-Philipp ; Honza, Rene ; Ebert, Volker ; Böhm, Benjamin ; Wagner, Steven (2018)
In-Cylinder Temperature Measurements in a Motored IC Engine using TDLAS.
In: Flow, Turbulence and Combustion, 101 (1)
doi: 10.1007/s10494-017-9886-y
Article, Bibliographie
Bürkle, Sebastian ; Walter, Nicole ; Wagner, Steven (2018)
Laser-based measurements of pressure broadening and pressure shift coefficients of combustion-relevant absorption lines in the near-infrared region.
In: Applied Physics B, 124 (6)
doi: 10.1007/s00340-018-6993-y
Article, Bibliographie
Benneckendorf, Frank S. ; Hillebrandt, Sabina ; Ullrich, Florian ; Rohnacher, Valentina ; Hietzschold, Sebastian ; Jänsch, Daniel ; Freudenberg, Jan ; Beck, Sebastian ; Mankel, Eric ; Jaegermann, Wolfram ; Pucci, Annemarie ; Bunz, Uwe H. F. ; Müllen, Klaus (2018)
Structure–Property Relationship of Phenylene-Based Self-Assembled Monolayers for Record Low Work Function of Indium Tin Oxide.
In: The Journal of Physical Chemistry Letters, 9 (13)
doi: 10.1021/acs.jpclett.8b01242
Article, Bibliographie
Bibouche, Bachir ; Peral, Daniel ; Stehl, Dmitrij ; Söderholm, Viktor ; Schomäcker, Reinhard ; Klitzing, R. von ; Vogt, Dieter (2018)
Multiphasic aqueous hydroformylation of 1-alkenes with micelle-like polymer particles as phase transfer agents.
In: RSC Advances, 8 (41)
doi: 10.1039/c8ra04022b
Article, Bibliographie
Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018)
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems. Piscataway, NJ, USA
Conference or Workshop Item, Bibliographie
Barz, Dominik P. J. ; Scholz, Mathias ; Hardt, Steffen (2018)
Electrokinetic manipulation of the von Kármán vortex street in the wake of a confined cylinder. I. DC electric field.
In: Physics of Fluids, 30 (8)
doi: 10.1063/1.5037595
Article, Bibliographie
Bakhshandeh Chamazkoti, Rohollah ; Oberlack, Martin (2018)
Geometry of two-point velocity correlation tensor of homogeneous isotropic turbulence with helicity in sol-manifold coordinates.
In: Journal of Mathematical Physics, 59 (10)
doi: 10.1063/1.5048802
Article, Bibliographie
Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018)
Internet As a Source of Randomness.
HotNets '18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (November 15-16, 2018)
doi: 10.1145/3286062.3286072
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Conference or Workshop Item, Bibliographie
Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
Conference or Workshop Item, Bibliographie
Böck, Leon (2017)
On P2P botnet monitoring in adverse conditions.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017)
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc
eds.: Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (2017)
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings
doi: 10.1007/978-3-319-66402-6
Book Section, Bibliographie
Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2017)
Thin liquid films with time-dependent chemical reactions sheared by an ambient gas flow.
In: Physical Review Fluids, 2 (8)
Article, Bibliographie
Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017)
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15
Article, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
eds.: Katz, Jonathan ; Shacham, Hovav (2017)
PRF-ODH: Relations, Instantiations, and Impossibility Results.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie
Butin, Denis (2017)
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151334
Article, Bibliographie
Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Conference or Workshop Item, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017)
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
doi: 10.1145/3098954.3098990
Conference or Workshop Item, Bibliographie
Büscher, Niklas ; Katzenbeisser, Stefan (2017)
Compilation for Secure Multi-party Computation.
Book, Bibliographie
Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017)
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Minneapolis, USA
doi: 10.1515/popets-2017-0030
Conference or Workshop Item, Bibliographie
Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Commitments via Extractable-Binding Commitments.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Bugge, Sebastian (2017)
Solving Learning With Errors Instances Using Quantum Reductions.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Billes, Marina ; Møller, Anders ; Pradel, Michael (2017)
Systematic Black-Box Analysis of Collaborative Web Applications.
Barcelona, Spain
doi: 10.1145/3062341.3062363
Conference or Workshop Item, Bibliographie
Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017)
A lightweight protocol for privacy preserving division.
Valencia Spain
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017)
Transitioning to a Quantum-Resistant Public Key Infrastructure.
Utrecht, the Netherlands
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017)
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
doi: 10.1088/2058-9565/aa69cd
Article, Bibliographie
Bindel, Nina (2017)
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Conference or Workshop Item, Bibliographie
Böhm, A. ; Biesalski, M. (2017)
Paper-based microfluidic devices: A complex low-cost material in high-tech applications.
In: MRS Bulletin, 42 (05)
doi: 10.1557/mrs.2017.92
Article, Bibliographie
Baier, Tobias ; Hardt, Steffen ; Shahabi, Vahid ; Roohi, Ehsan (2017)
Knudsen pump inspired by Crookes radiometer with a specular wall.
In: Physical Review Fluids, 2 (3)
doi: 10.1103/PhysRevFluids.2.033401
Article, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017)
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
ASIA CCS '17. Abu Dhabi, UAE (April 2-6, 2017)
doi: 10.1145/3052973.3053043
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017)
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
Rabat, Morocco
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El (2017)
LARA - A Design Concept for Lattice-based Encryption.
Report, Bibliographie
Bothe, D. ; Koehne, M. ; Maier, S. ; Saal, J. (2017)
Global strong solutions for a class of heterogeneous catalysis models.
In: Journal of Mathematical Analysis and Applications, 445 (1)
Article, Bibliographie
Bork, B. ; Preusche, A. ; Weckenmann, F. ; Lamanna, G. ; Dreizler, A. (2017)
Measurement of species concentration and estimation of temperature in the wake of evaporating n-heptane droplets at trans-critical conditions.
In: Proceedings of the Combustion Institute, 36 (2)
Article, Bibliographie
Bothe, Dieter ; Denk, Robert ; Hieber, Matthias ; Schnaubelt, Roland ; Simonett, Gieri ; Wilke, Mathias ; Zacher, Rico (2017)
Special Issue: Parabolic Evolution Equations, Maximal Regularity, and Applications - Dedicated to Jan Pruss Preface.
In: Journal of Evolution Equations, 17 (1)
Article, Bibliographie
Bothe, D. ; Fischer, A. ; Pierre, M. ; Rolland, G. (2017)
Global wellposedness for a class of reaction-advection-anisotropic-diffusion systems.
In: Journal of Evolution Equations, 17 (1)
Article, Bibliographie
Bothe, D. ; Kashiwabara, T. ; Koehne, M. (2017)
Strong well-posedness for a class of dynamic outflow boundary conditions for incompressible Newtonian flows.
In: Journal of Evolution Equations, 17 (1)
Article, Bibliographie
Becker, Lukas G. ; Kosaka, Hidemasa ; Böhm, Benjamin ; Doost, Samim ; Knappstein, Robert ; Habermehl, Martin ; Kneer, Reinhold ; Janicka, J. ; Dreizler, Andreas (2017)
Experimental investigation of flame stabilization inside the quarl of an oxyfuel swirl burner.
In: Fuel, 201
doi: 10.1016/j.fuel.2016.09.002
Article, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2017)
Heat transfer in the film boiling regime: Single drop impact and spray cooling.
In: International Journal of Heat and Mass Transfer, 110
doi: 10.1016/j.ijheatmasstransfer.2017.03.004
Article, Bibliographie
Batzdorf, Stefan ; Breitenbach, Jan ; Schlawitschek, Christiane ; Roisman, Ilia V. ; Tropea, Cameron ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2017)
Heat transfer during simultaneous impact of two drops onto a hot solid substrate.
In: International Journal of Heat and Mass Transfer, 113
Article, Bibliographie
Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2017)
Drop collision with a hot, dry solid substrate: Heat transfer during nucleate boiling.
In: Physical Review Fluids, 2 (7)
doi: 10.1103/PhysRevFluids.2.074301
Article, Bibliographie
Bürkle, Sebastian ; Becker, Lukas G. ; Agizza, Maria Angela ; Dreizler, Andreas ; Ebert, Volker ; Wagner, Steven (2017)
In-situ measurement of residence time distributions in a turbulent oxy-fuel gas-flame combustor.
In: Experiments in Fluids, 58 (7)
doi: 10.1007/s00348-017-2366-2
Article, Bibliographie
Bojničić-Kninski, Clemens von ; Popov, Roman ; Dörsam, Edgar ; Loeffler, Felix F. ; Breitling, Frank ; Nesterov-Mueller, Alexander (2017)
Combinatorial Particle Patterning.
In: Advanced Functional Materials, 27 (42)
doi: 10.1002/adfm.201703511
Article, Bibliographie
Braun, Larissa ; Uhlig, Martin ; Klitzing, R. von ; Campbell, Richard A. (2017)
Polymers and surfactants at fluid interfaces studied with specular neutron reflectometry.
In: Advances in Colloid and Interface Science, 247
doi: 10.1016/j.cis.2017.07.005
Article, Bibliographie
Backes, Sebastian ; Krause, Patrick ; Tabaka, Weronika ; Witt, Marcus U. ; Mukherji, Debashish ; Kremer, Kurt ; Klitzing, R. von (2017)
Poly(N-isopropylacrylamide) Microgels under Alcoholic Intoxication: When a LCST Polymer Shows Swelling with Increasing Temperature.
In: ACS Macro Letters, 6 (10)
doi: 10.1021/acsmacrolett.7b00557
Article, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017)
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item, Bibliographie
Boukoros, Spyros ; Katzenbeisser, Stefan (2017)
Measuring privacy in high dimensional microdata collections.
Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria, Italy (August 29 - September 01, 2017)
doi: 10.1145/3098954.3098977
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline ; Demirel, Denise (2016)
Efficient Proactive Secret Sharing.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Sturm, Jan (2016)
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
Milan, Italy
Conference or Workshop Item, Bibliographie
Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016)
Scalable Secure Computation from ANSI-C.
Conference or Workshop Item, Bibliographie
Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016)
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
Vienna, Austria
doi: 10.1145/2994620.2994621
Conference or Workshop Item, Bibliographie
Bieber, Julian (2016)
Generalizing Semi-Private Function Evaluation.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bekheet, Maged F. ; Svoboda, Ingrid ; Liu, Na ; Bayarjargal, Lkhamsuren ; Irran, Elisabeth ; Dietz, Christian ; Stark, Robert W. ; Riedel, Ralf ; Gurlo, Aleksander (2016)
Ferroelectric InMnO3: Growth of single crystals, structure and high-temperature phase transitions.
In: Journal of Solid State Chemistry, 241
Article, Bibliographie
Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016)
Compiling Low Depth Circuits for Practical Secure Computation.
Heraklion, Crete, Greece
Conference or Workshop Item, Bibliographie
Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016)
Formal Policy-based Provenance Audit.
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan
Conference or Workshop Item, Bibliographie
Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016)
A comparison of block ciphers SIMON, SPECK, and KATAN.
Report, Bibliographie
Bansarkhani, Rachid El ; El Kaafarani, Ali (2016)
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823)
Article, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016)
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
ASIA CCS '17. Abu Dhabi, UEA (April 2-6, 2017)
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016)
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie
Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016)
Towards Automated Measurements of Internets Naming Infrastructure.
Beer Sheva, Israel
Conference or Workshop Item, Bibliographie
Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Conference or Workshop Item, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report, Bibliographie
Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016)
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Xi'an, China
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016)
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Xi'an, China
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016)
Privately and Publicly Verifiable Computing Techniques.
Book, Bibliographie
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article, Bibliographie
Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016)
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Fes, Morocco
Conference or Workshop Item, Bibliographie
Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016)
On the Hardness of Proving CCA-Security of Signed ElGamal.
Taipei, Taiwan
doi: 10.1007/978-3-662-49384-7_3
Conference or Workshop Item, Bibliographie
Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Blume, Niels Goeran ; Ebert, Volker ; Dreizler, Andreas ; Wagner, Steven (2016)
Broadband fitting approach for the application of supercontinuum broadband laser absorption spectroscopy to combustion environments.
In: Measurement Science and Technology, 27 (1)
doi: 10.1088/0957-0233/27/1/015501
Article, Bibliographie
Bruschewski, Martin ; Scherhag, Christian ; Grundmann, Sven ; Schiffer, Heinz-Peter (2016)
Influence of Channel Geometry and Flow Variables on Cyclone Cooling of Turbine Blades.
In: ASME Journal of Turbomachinery, 138 (6)
Article, Bibliographie
Babu, Deepu J. ; Kuehl, Frank G. ; Yadav, Sandeep ; Markert, Daniel ; Bruns, Michael ; Hampe, Manfred J. ; Schneider, Joerg J. (2016)
Adsorption of pure SO2 on nanoscaled graphene oxide.
In: Rsc Advances, 6 (43)
Article, Bibliographie
Bachmann, Svenja ; Schulze, Marcus ; Morasch, Jan ; Hesse, Sabine ; Hussein, Laith ; Krell, Lisa ; Schnagl, Johann ; Stark, Robert W. ; Narayan, Suman (2016)
Aging of oxygen and hydrogen plasma discharge treated a-C:H and ta-C coatings.
In: Applied Surface Science, 371
Article, Bibliographie
Bruschewski, Martin ; Freudenhammer, Daniel ; Buchenberg, Waltraud B. ; Schiffer, Heinz-Peter ; Grundmann, Sven (2016)
Estimation of the measurement uncertainty in magnetic resonance velocimetry based on statistical models.
In: Experiments in Fluids, 57 (5)
Article, Bibliographie
Buchenberg, Waltraud B. ; Wassermann, Florian ; Grundmann, Sven ; Jung, Bernd ; Simpson, Robin (2016)
Acquisition of 3D Temperature Distributions in Fluid Flow Using Proton Resonance Frequency Thermometry.
In: Magnetic Resonance in Medicine, 76 (1)
Article, Bibliographie
Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Conference or Workshop Item, Bibliographie
Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias (2015)
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
Los Angeles, CA, USA
doi: 10.1145/2818000.2818028
Conference or Workshop Item, Bibliographie
Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015)
Detection and Forensics of Domains Hijacking.
San Diego, CA, USA
Conference or Workshop Item, Bibliographie
Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Hide And Seek: Detecting Sensors in P2P Botnets.
Florence, Italy
doi: 10.1109/CNS.2015.7346908
Conference or Workshop Item, Bibliographie
Buescher, Niklas ; Katzenbeisser, Stefan (2015)
Faster Secure Computation through Automatic Parallelization.
Washington, D.C., USA
Conference or Workshop Item, Bibliographie
Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Conference or Workshop Item, Bibliographie
Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
eds.: Dodis, Yevgeniy ; Nielsen, Arno Buus (2015)
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
Warsaw, Poland
doi: 10.1007/978-3-662-46497-7_17
Conference or Workshop Item, Bibliographie
Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf (2015)
A Concept for a C2X-based Crossroad Assistant.
St. Louis, MO, USA
doi: 10.1109/PERCOMW.2015.7134063
Conference or Workshop Item, Bibliographie
Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article, Bibliographie
Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015)
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015
Article, Bibliographie
Bohlin, Alexis ; Mann, Markus ; Patterson, Brian D. ; Dreizler, Andreas ; Kliewer, Christopher J. (2015)
Development of two-beam femtosecond/picosecond one-dimensional rotational coherent anti-Stokes Raman spectroscopy: Time-resolved probing of flame wall interactions.
In: Proceedings of the Combustion Institute, 35
Article, Bibliographie
Bolkart, Martin ; Hieber, Matthias (2015)
Pointwise upper bounds for the solution of the Stokes equation on L-sigma(infinity)(Omega) and applications.
In: Journal of Functional Analysis, 268 (7)
Article, Bibliographie
Bogris, A. ; Juretzka, C. ; Simos, H. ; Syvridis, D. ; Roditi, E. ; Elsasser, W. ; Carras, M. (2015)
Experimental investigation of intensity noise in injection locked mid-infrared quantum cascade lasers.
In: Proceedings of the SPIE, 9382
Article, Bibliographie
Bothe, D. ; Dreyer, W. (2015)
Continuum thermodynamics of chemically reacting fluid mixtures.
In: Acta Mechanica, 226 (6)
Article, Bibliographie
Barckmann, K. ; Tropea, Cameron ; Grundmann, S. (2015)
Attenuation of Tollmien-Schlichting Waves Using Plasma Actuator Vortex Generators.
In: Aiaa Journal, 53 (5)
Article, Bibliographie
Bernardin, John ; Chiaramonte, Francis ; Dhir, Vijay ; Galloway, Jesse ; Goodson, Ken ; Incropera, Frank ; Kabov, Oleg ; Kaviany, Massoud ; Kazimi, Mujid ; Khusid, Boris ; Kim, Jungho ; Kim, Sung-Min ; Lee, Jaeseon ; Minkowycz, W. J. ; Qu, Weilin ; Rose, John ; Sammakia, Bahgat ; Stephan, Peter ; Vafai, Kambiz ; Wen, Chang-Da (2015)
Professor Issam Mudawar on his 60th birthday.
In: International Journal of Heat and Mass Transfer, 89
Article, Bibliographie
Bothe, Dieter ; Rolland, Guillaume (2015)
Global Existence for a Class of Reaction-Diffusion Systems with Mass Action Kinetics and Concentration-Dependent Diffusivities.
In: Acta Applicandae Mathematicae, 139 (1)
doi: 10.1007/s10440-014-9968-y
Article, Bibliographie
Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Conference or Workshop Item, Bibliographie
Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Conference or Workshop Item, Bibliographie
Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015)
An Automatic Inference of Minimal Security Types.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article, Bibliographie
Brzuska, Christina ; Mittelbach, Arno
eds.: Sarkar, Palash ; Iwata, Tetsu (2014)
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings.
doi: 10.1007/978-3-662-45608-8_8
Book Section, Bibliographie
Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2014)
Hot-Hardening: Getting More Out of Your Security Settings.
New Orleans, Louisiana, USA
doi: 10.1145/2664243.2664246
Conference or Workshop Item, Bibliographie
Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
eds.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
eds.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
eds.: Garay, Arno A. ; Gennaro, Rosario (2014)
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
Santa Barbara, CA, USA
doi: 10.1007/978-3-662-44371-2_11
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article, Bibliographie
Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (June 11 - 13, 2014)
doi: 10.1145/2600918.2600922
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
eds.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Mittelbach, Arno (2014)
Using Indistinguishability Obfuscation via UCEs.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security.
doi: 10.1007/978-3-662-45608-8
Book Section, Bibliographie
Budurushi, Jurlind ; Volkamer, Melanie
eds.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report, Bibliographie
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014)
Key2Share for Authentication Services.
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Conference or Workshop Item, Bibliographie
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Conference or Workshop Item, Bibliographie
Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014)
Interaction Techniques for Co-located Collaborative TV.
Conference or Workshop Item, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014)
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327
Article, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Conference or Workshop Item, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014)
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Conference or Workshop Item, Bibliographie
Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014)
Scalable Offline Monitoring.
Proceedings of the 14th International Conference on Runtime Verification (RV). Heidelberg, Germany
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book, Bibliographie
Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013)
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37
doi: 10.1007/s11623-013-0300-1
Article, Bibliographie
Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia (2013)
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
Miami, FL, USA
doi: 10.1145/2500423.2504583
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
eds.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2013)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Koblenz
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Conference or Workshop Item, Bibliographie
Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
ed.: Horbach, Matthias (2013)
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Koblenz
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
ed.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17. - 19. Juni 2013)
Conference or Workshop Item, Bibliographie
Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Conference or Workshop Item, Bibliographie
Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013)
Identification element-based authentication and identification with decentralised service use.
Norm, patent, standard, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
ed.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie
Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt (2013)
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
San Diego, CA, USA
doi: 10.1109/PerComW.2013.6529448
Conference or Workshop Item, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
ed.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article, Bibliographie
Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
eds.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2012)
Towards the Systematic Development of Contextualized Security Interventions.
Birmingham, UK
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Buchmann, Johannes
eds.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report, Bibliographie
Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
eds.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Book Section, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report, Bibliographie
Bartsch, Steffen (2012)
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
Ph.D. Thesis, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sasse, Angela
eds.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Conference or Workshop Item, Bibliographie
Bothe, Dieter (1997)
Reaction-diffusion systems with discontinuities. A viability approach.
In: Nonlinear Analysis: Theory, Methods & Applications, 30 (2)
doi: 10.1016/S0362-546X(97)00247-2
Article, Bibliographie
C
Chilese, Marco ; Mitev, Richard ; Orenbach, Meni ; Thorburn, Robert ; Atamli, Ahmad ; Sadeghi, Ahmad-Reza (2024)
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024 - 23.05.2024)
Conference or Workshop Item, Bibliographie
Castillo, Jorge ; Rieger, Phillip ; Fereidooni, Hossein ; Chen, Qian ; Sadeghi, Ahmad-Reza (2023)
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
39th Annual Computer Security Applications Conference (ACSAC'23). Austin, USA (04.12.2023 - 08.12.2023)
doi: 10.1145/3627106.3627194
Conference or Workshop Item, Bibliographie
Chen, Chen ; Kande, Rahul ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Rajendran, JV (2022)
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
59th ACM/IEEE Design Automation Conference. San Francisco, USA (10.-14.07.2022)
doi: 10.1145/3489517.3530638
Conference or Workshop Item, Bibliographie
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
42nd IEEE Symposium on Security and Privacy. virtual Conference (24.-27.05.2021)
doi: 10.1109/SP40001.2021.00093
Conference or Workshop Item, Bibliographie
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.-27.05.2021)
Conference or Workshop Item, Bibliographie
Chen, Yanjiao ; Bai, Yijie ; Wang, Kaibo ; Mitev, Richard ; Xu, Wenyuan ; Sadeghi, Ahmad-Reza (2021)
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
ACM Conference on Computer and Communications Security (CCS). virtual Conference (15.-19.11.2021)
Conference or Workshop Item, Bibliographie
Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
doi: 10.48550/arXiv.2008.04449
Report, Bibliographie
Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020)
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium. virtual Conference (August 12.–14.2020)
Conference or Workshop Item, Bibliographie
Connor, Paula ; Schuch, Jona ; Kaiser, Bernhard ; Jaegermann, Wolfram (2020)
The Determination of Electrochemical Active Surface Area and Specific Capacity Revisited for the System MnOx as an Oxygen Evolution Catalyst.
In: Zeitschrift für Physikalische Chemie, 234 (5)
doi: 10.1515/zpch-2019-1514
Article, Bibliographie
Classen, Jiska ; Wegemer, Daniel (2018)
Fitbit Firmware Hacking.
Other, Bibliographie
Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018)
Invited: Reconciling Remote Attestation and Safety-Critical
Operation on Simple IoT Devices.
Design Automation Conference. San Francisco, USA (2018, June 24-29)
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018)
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Conference or Workshop Item, Bibliographie
Chen, Longquan ; Bonaccurso, Elmar ; Gambaryan-Roisman, Tatiana ; Starov, Victor ; Koursari, Nektaria ; Zhao, Yapu (2018)
Static and dynamic wetting of soft substrates.
In: Current Opinion in Colloid & Interface Science, 36
doi: 10.1016/j.cocis.2017.12.001
Article, Bibliographie
Cherkashinin, Gennady ; Eilhardt, Robert ; Lebedev, Mikhail V. ; Nappini, Silvia ; Magnano, Elena ; Jaegermann, Wolfram (2018)
Olivine-LiNiPO 4 Thin Films: Chemical Compatibility with Liquid Electrolyte and Interface Stability at High Potential.
In: Journal of The Electrochemical Society, 165 (4)
doi: 10.1149/2.0211804jes
Article, Bibliographie
Cordes, U. ; Lambie, B. ; Hufnagel, K. ; Spiegelberg, H. ; Kampers, G. ; Tropea, C. (2018)
The Adaptive Camber Concept - A passive approach for gust load alleviation on wind turbines.
In: Wind Energy, 21 (9)
doi: 10.1002/we.2190
Article, Bibliographie
Chilukoti, Hari Krishna ; Müller-Plathe, Florian ; Yang, Hua (2018)
Application of Reverse Nonequilibrium Molecular Dynamics to the Calculation of the Mutual Diffusion Coefficient of Alkane Mixtures.
In: The Journal of Physical Chemistry B, 122 (39)
doi: 10.1021/acs.jpcb.8b06886
Article, Bibliographie
Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17). Incheon Republic of Korea (12.12.2017-15.12.2017)
doi: 10.1145/3143361.3143362
Conference or Workshop Item, Bibliographie
Chauhan, Prankur (2017)
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Technische Universität Darmstadt
Master Thesis, Bibliographie
Cremer, Manuel (2017)
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017)
Are We There Yet? On RPKIs Deployment and Security.
San Diego, CA, USA
Conference or Workshop Item, Bibliographie
Cloos, F.-J. ; Stapp, D. ; Pelz, P. F. (2017)
Swirl boundary layer and flow separation at the inlet of a rotating pipe.
In: Journal of Fluid Mechanics, 811
doi: 10.1017/jfm.2016.734
Article, Bibliographie
Cloos, F.-J. ; Zimmermann, Anna- L. ; Pelz, P. F. (2017)
Two turbulent flow regimes at the inlet of a rotating pipe.
In: European Journal of Mechanics B-Fluids, 61,2 (1/2)
doi: 10.1016/j.euromechflu.2016.09.003
Article, Bibliographie
Cordes, Ulrike ; Kampers, G. ; Meissner, T. ; Tropea, C. ; Peinke, J. ; Hoelling, M. (2017)
Note on the limitations of the Theodorsen and Sears functions.
In: Journal of Fluid Mechanics, 811
Article, Bibliographie
Cavalcanti Miranda, Flavia ; Di Mare, F. ; Sadiki, Amsini ; Janicka, J. (2017)
Performance Analysis of Different Solvers for Computing the Radiative Transfer Equation in Complex Geometries Using Finite Volume Method and Block Structured Grids.
In: Computational Thermal Sciences: An International Journal, 9 (3)
doi: 10.1615/ComputThermalScien.2017019001
Article, Bibliographie
Christau, Stephanie ; Moeller, Tim ; Genzer, Jan ; Koehler, Ralf ; Klitzing, R. von (2017)
Salt-Induced Aggregation of Negatively Charged Gold Nanoparticles Confined in a Polymer Brush Matrix.
In: Macromolecules, 50 (18)
doi: 10.1021/acs.macromol.7b00866
Article, Bibliographie
Cai, Xuan ; Wörner, Martin ; Marschall, Holger ; Deutschmann, Olaf (2017)
CFD Simulation of Liquid Back Suction and Gas Bubble Formation in a Circular Tube with Sudden or Gradual Expansion.
In: Emission Control Science and Technology, 3 (4)
doi: 10.1007/s40825-017-0073-3
Article, Bibliographie
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
Article, Bibliographie
Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016)
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
Article, Bibliographie
Chagelishvili, George ; Hau, Jan-Niklas ; Khujadze, George ; Oberlack, Martin (2016)
Mechanical picture of the linear transient growth of vortical perturbations in incompressible smooth shear flows.
In: Physical Review Fluids, 1 (4)
Article, Bibliographie
Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016)
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16). Berlin (16.07.2016-16.07.2016)
doi: 10.1145/2959424.2959427
Conference or Workshop Item, Bibliographie
Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Conference or Workshop Item, Bibliographie
Classen, Jiska (2016)
Software Defined Radio – Open Source Wireless Hacking.
Other, Bibliographie
Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016)
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
Heraklion, Crete, Greece
Conference or Workshop Item, Bibliographie
Chen, X. ; Focke, C. ; Marschall, H. ; Bothe, D.
ed.: Fritsching, Udo (2016)
Investigation of Elementary Processes of Non-Newtonian Droplets Inside Spray Processes by Means of Direct Numerical Simulation.
In: Process-Spray
Book Section, Bibliographie
Chen, Jian ; Dörsam, Edgar ; Spiehl, Dieter ; Hakimi Tehrani, Arash (2016)
Elastic model of paper stacks by considering the paper structure.
In: Nordic Pulp & Paper Research Journal (NPPRJ), 31 (4)
Article, Bibliographie
Christau, S. ; Moller, T. ; Brose, F. ; Genzer, J. ; Soltwedel, O. ; Klitzing, R. von (2016)
Effect of gold nanoparticle hydrophobicity on thermally induced color change of PNIPAM brush/gold nanoparticle hybrids.
In: Polymer, 98
Article, Bibliographie
Cai, Xuan ; Wörner, Martin ; Marschall, Holger ; Deutschmann, Olaf (2016)
Numerical study on the wettability dependent interaction of a rising bubble with a periodic open cellular structure.
In: Catalysis Today, 273
doi: 10.1016/j.cattod.2016.03.053
Article, Bibliographie
Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Conference or Workshop Item, Bibliographie
Classen, Jiska (2015)
Building and Breaking Wireless Security.
Other, Bibliographie
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article, Bibliographie
Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Conference or Workshop Item, Bibliographie
Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015)
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
Paris, France
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015)
Practical Covert Channels for WiFi Systems.
Florence, Italy
Conference or Workshop Item, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Conference or Workshop Item, Bibliographie
Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Conference or Workshop Item, Bibliographie
Chen, Xingyuan ; Schäfer, Michael ; Bothe, Dieter (2015)
Numerical modeling and investigation of viscoelastic fluid-structure interaction applying an implicit partitioned coupling algorithm.
In: Journal of Fluids and Structures, 54
Article, Bibliographie
Criscione, A. ; Roisman, Ilia V. ; Jakirlić, Suad ; Tropea, Cameron (2015)
Towards modelling of initial and final stages of supercooled water solidification.
In: International Journal of Thermal Sciences, 92
Article, Bibliographie
Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Conference or Workshop Item, Bibliographie
Culhane, William ; Jayaram, K. R. ; Eugster, Patrick (2014)
Fast, Expressive Top-k Matching.
Bordeaux, France
doi: 10.1145/2663165.2663326
Conference or Workshop Item, Bibliographie
Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (November 3-7, 2014)
doi: 10.1145/2660267.2662387
Conference or Workshop Item, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
eds.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Conference or Workshop Item, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014)
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Book Section, Bibliographie
Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014)
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP)
Article, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Conference or Workshop Item, Bibliographie
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article, Bibliographie
Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013)
k-anonymous reputation.
Hangzhou, China
doi: 10.1145/2484313.2484361
Conference or Workshop Item, Bibliographie
Cuong, N. ; Katzenbeisser, Stefan (2012)
Robust Resampling Detection in Digital Images.
Conference or Workshop Item, Bibliographie
D
Degabriele, Jean Paul ; Gilcher, Jan ; Govinden, Jérôme ; Paterson, Kenneth G. (2024)
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.-23.05.2024)
doi: https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00132
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Karadžić, Vukašin
eds.: Guo, Jian ; Steinfeld, Ron (2023)
Populating the Zoo of Rugged Pseudorandom Permutations.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.-08.12.2023)
doi: 10.1007/978-981-99-8742-9_9
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme (2023)
The Indifferentiability of the Duplex and Its Practical Applications.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.-08.12.2023)
doi: 10.1007/978-981-99-8742-9_8
Conference or Workshop Item, Bibliographie
Düzlü, Samed ; Krämer, Juliane ; Pöppelmann, Thomas ; Struck, Patrick (2023)
A Lightweight Identification Protocol Based on Lattices.
26th IACR International Conference on Practice and Theory of Public-Key Cryptography. Atlanta, USA (07.-10.05.2023)
doi: 10.1007/978-3-031-31368-4_4
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Karadžić, Vukašin (2022)
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.
42nd Annual International Cryptology Conference. Santa Barbara, USA (15.-18.08.2022)
doi: 10.1007/978-3-031-15985-5_10
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022)
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.-28.04.2022)
Conference or Workshop Item, Bibliographie
Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021)
The Exact Security of BIP32 Wallets.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.-19.11.2021)
doi: 10.1145/3460120.3484807
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Govinden, Jérôme ; Günther, Felix ; Paterson, Kenneth G. (2021)
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.-19.11.2021)
doi: 10.1145/3460120.3484814
Conference or Workshop Item, Bibliographie
Dehe, Sebastian ; Rehm, Imke-Sophie ; Hardt, Steffen (2021)
Hydrodynamic dispersion in Hele-Shaw flows with inhomogeneous wall boundary conditions.
In: Journal of Fluid Mechanics, 925
doi: 10.1017/jfm.2021.648
Article, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2021)
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
In: Journal of Cryptology, 34 (4)
doi: 10.1007/s00145-021-09384-1
Article, Bibliographie
Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.-08-07.2021)
Conference or Workshop Item, Bibliographie
Deußen, Benjamin ; Oberlack, Martin ; Wang, Yongqi (2021)
Probability theory of active suspensions.
In: Physics of Fluids, 33 (6)
doi: 10.1063/5.0047227
Article, Bibliographie
Deußen, Benjamin ; Jayaram, A. ; Kummer, Florian ; Wang, Yongqi ; Speck, T. ; Oberlack, Martin (2021)
High-order simulation scheme for active particles driven by stress boundary conditions.
In: Journal of Physics: Condensed Matter, 33 (24)
doi: 10.1088/1361-648X/abf8cf
Article, Bibliographie
Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020)
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy
doi: 10.1109/MSEC.2020.2994978
Article, Bibliographie
Deußen, Benjamin ; Dierkes, Dominik ; Oberlack, Martin (2020)
Statistical theory of helical turbulence.
In: Physics of Fluids, 32 (6)
doi: 10.1063/5.0010874
Article, Bibliographie
Dehe, Sebastian ; Rofman, Baruch ; Bercovici, Moran ; Hardt, Steffen (2020)
Electro-osmotic flow enhancement over superhydrophobic surfaces.
In: Physical Review Fluids, 5
doi: 10.1103/PhysRevFluids.5.053701
Article, Bibliographie
Dressler, L. ; Sacomano Filho, F. L. ; Sadiki, A. ; Janicka, J. (2020)
Influence of Thickening Factor Treatment on Predictions of Spray Flame Properties Using the ATF Model and Tabulated Chemistry.
In: Flow, Turbulence and Combustion, 2020
doi: 10.1007/s10494-020-00149-7
Article, Bibliographie
Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (5.-7. April, 2020)
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020)
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
29th USENIX Security Syposium. Boston, MA, USA (12.-14.08.2020)
Conference or Workshop Item, Bibliographie
Dierkes, Dominik ; Cheviakov, Alexei ; Oberlack, Martin (2020)
Publisher’s Note: “New similarity reductions and exact solutions for helically symmetric viscous flows” [Phys. Fluids 32, 053604 (2020)].
In: Physics of Fluids, 32 (6)
doi: 10.1063/5.0015297
Article, Bibliographie
Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020. virtual Conference (20.-24.07.)
Conference or Workshop Item, Bibliographie
Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020)
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020). virtual Conference (24.-27.08.)
Conference or Workshop Item, Bibliographie
Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security. virtual Conference (14.-18.09)
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.-12.12.2019)
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019)
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
2019 International Conference On Computer Aided Design (ICCAD). The Westin Westminster Westminster, CO (4.-7. November 2019)
Conference or Workshop Item, Bibliographie
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (November, 11th -15th)
Conference or Workshop Item, Bibliographie
Dressler, L. ; Ries, F. ; Kuenne, G. ; Janicka, J. ; Sadiki, A. (2019)
Analysis of Shear Effects on Mixing and Reaction Layers in Premixed Turbulent Stratified Flames using LES coupled to Tabulated Chemistry.
In: Combustion Science and Technology, 2019
doi: 10.1080/00102202.2019.1678915
Article, Bibliographie
Ding, Carl-Philipp ; Vuilleumier, David ; Kim, Namho ; Reuss, David L. ; Sjöberg, Magnus ; Böhm, Benjamin (2019)
Effect of engine conditions and injection timing on piston-top fuel films for stratified direct-injection spark-ignition operation using E30.
In: International Journal of Engine Research, 21 (2)
doi: 10.1177/1468087419869785
Article, Bibliographie
Dillen, Sebastian ; Oberlack, Martin ; Wang, Yongqi (2019)
Analytical investigation of rotationally symmetrical oscillating flows of viscoelastic fluids.
In: Journal of Non-Newtonian Fluid Mechanics, 272
doi: 10.1016/j.jnnfm.2019.104168
Article, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Conference or Workshop Item, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
Report, Bibliographie
Dimesso, Lucangelo ; Wittich, Carolin ; Mayer, Thomas ; Jaegermann, Wolfram (2019)
Phase-change behavior of hot-pressed methylammonium lead bromide hybrid perovskites.
In: Journal of Materials Science, 54 (3)
doi: 10.1007/s10853-018-3009-6
Article, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (MAY 21-23, 2018)
Conference or Workshop Item, Bibliographie
Deichmann, Gregor ; Dallavalle, Marco ; Rosenberger, David ; Vegt, Nico F. A. van der (2019)
Phase Equilibria Modeling with Systematically Coarse-Grained Models—A Comparative Study on State Point Transferability.
In: The Journal of Physical Chemistry B, 123 (2)
doi: 10.1021/acs.jpcb.8b07320
Article, Bibliographie
Dammel, Frank ; Oltmanns, Johannes ; Stephan, Peter (2019)
Nutzung der Abwärme des Hochleistungsrechners am Campus Lichtwiese.
In: Euro Heat & Power
Article, Bibliographie
Dalgicdir, Cahit ; Vegt, Nico F. A. van der (2019)
Improved Temperature Behavior of PNIPAM in Water with a Modified OPLS Model.
In: The Journal of Physical Chemistry B, 123 (17)
doi: 10.1021/acs.jpcb.9b01644
Article, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (8.12.-12.12. 2019)
Conference or Workshop Item, Bibliographie
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
The 11th International Symposium on Foundations & Practice of Security (FPS). Montreal, Canada (13, 14 and 15 November 2018)
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Fischlin, Marc (2018)
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
24th International Conference on the Theory and Application of Cryptology and Information Security. Brisbane, Australia (02.-06.12.2018)
doi: 10.1007/978-3-030-03332-3_19
Conference or Workshop Item, Bibliographie
de Maleprade, Hélène ; Soto, Dan ; Quéré, David ; Hinch, E. John ; Baier, Tobias ; Schür, Maximilian T. ; Hardt, Steffen (2018)
Air-propelled, herringbone-textured platelets.
In: Physical Review Fluids, 3 (104101)
doi: 10.1103/PhysRevFluids.3.104101
Article, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15-19 October 2018)
Conference or Workshop Item, Bibliographie
Dix, Isabella (2018)
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15-19 October 2018)
doi: 10.1145/3243734.3243856
Conference or Workshop Item, Bibliographie
Deising, D. ; Bothe, D. ; Marschall, H. (2018)
Direct Numerical Simulation of Mass Transfer in Bubbly Flows.
In: Computers & Fluids, 172
doi: 10.1016/j.compfluid.2018.03.041
Article, Bibliographie
Dodhy, Anam (2018)
Misuses of Parameters for Cryptographic APIs.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018)
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
Taipei, Taiwan
doi: 10.1109/NOMS.2018.8406315
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018)
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18). San Diego, CA, USA (5 November 2018 – 8 November 2018)
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Article, Bibliographie
Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Conference or Workshop Item, Bibliographie
Deligeorgopoulos, Efstathios (2018)
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Dimesso, Lucangelo ; Das, Chittaranjan ; Mayer, Thomas ; Jaegermann, Wolfram (2018)
Investigation of earth-alkaline (EA = Mg, Ca, Sr) containing methylammonium tin iodide perovskite systems.
In: Journal of Materials Science, 53 (1)
doi: 10.1007/s10853-017-1545-0
Article, Bibliographie
Ding, Carl-Philipp ; Sjöberg, Magnus ; Vuilleumier, David ; Reuss, David L. ; He, Xu ; Böhm, Benjamin (2018)
Fuel film thickness measurements using refractive index matching in a stratified-charge SI engine operated on E30 and alkylate fuels.
In: Experiments in Fluids, 59 (3)
doi: 10.1007/s00348-018-2512-5
Article, Bibliographie
Dimesso, L. ; Mayer, T. ; Jaegermann, W. (2018)
Investigation of Methylammonium Tin Strontium Bromide Perovskite Systems.
In: ECS Journal of Solid State Science and Technology, 7 (3)
doi: 10.1149/2.0181803jss
Article, Bibliographie
Daikeler, Alexander ; Ströhle, Jochen ; Epple, Bernd (2018)
Experimental Flow Structure Analysis in a 1 MWth Circulating Fluidized Bed Pilot Plant.
In: Chemical Engineering Science
doi: 10.1016/j.ces.2018.10.037
Article, Bibliographie
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018)
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197
Article, Bibliographie
Deichmann, Gregor ; Vegt, Nico F. A. van der (2018)
Bottom-up approach to represent dynamic properties in coarse-grained molecular simulations.
In: The Journal of Chemical Physics, 149 (24)
doi: 10.1063/1.5064369
Article, Bibliographie
Demmler, Daniel (2018)
Towards Practical Privacy-Preserving Protocols.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018)
Off-path Attacks Against PKI.
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018). Toronto, Canada (October 15-19, 2018)
doi: 10.1145/3243734.3278516
Conference or Workshop Item, Bibliographie
Deller, Yannick (2017)
Zweidimensionale Surface-Kodes und ihre Anwendungen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17). Hong Kong (30.11.2017-02.12.2017)
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17). Kanazawa, Japan (10.07.2017-12.07.2017)
doi: 10.1007/978-3-319-61204-1_30
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017)
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17).
Conference or Workshop Item, Bibliographie
Dayal, Ram ; Gambaryan-Roisman, Tatiana (2017)
Heat transfer in granular medium for application to selective laser melting: A numerical study.
In: International Journal of Thermal Sciences, 113
Article, Bibliographie
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017)
An Experimental Study of a Bucketing Approach.
Uppsala, Sweden
Conference or Workshop Item, Bibliographie
Dietzel, Mathias ; Hardt, Steffen (2017)
Flow and streaming potential of an electrolyte in a channel with an axial temperature gradient.
In: Journal of Fluid Mechanics, 813
Article, Bibliographie
Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Conference or Workshop Item, Bibliographie
Dietsch, Sascha Thorsten (2017)
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Dierkes, Dominik ; Oberlack, Martin (2017)
Euler and Navier-Stocks equations in a new time-dependent helically symmetric system: derivation of the fundamental system and new conservation laws.
In: Journal of Fluid Mechanics, 818
Article, Bibliographie
Diemel, O. ; Pareja, J. ; Dreizler, A. ; Wagner, S. (2017)
An interband cascade laser-based in situ absorption sensor for nitric oxide in combustion exhaust gases.
In: Applied Physics B, 123 (5)
doi: 10.1007/s00340-017-6741-8
Article, Bibliographie
Ding, Carl-Philipp ; Honza, Rene ; Böhm, Benjamin ; Dreizler, Andreas (2017)
“Simultaneous measurement of flame impingement and piston surface temperatures in an optically accessible spark ignition engine”.
In: Applied Physics B, 123 (4)
doi: 10.1007/s00340-017-6694-y
Article, Bibliographie
Dimesso, L. ; Fasel, C. ; Lakus-Wollny, K. ; Mayer, T. ; Jaegermann, W. (2017)
Thermal stability of lead-free CH 3 NH 3 Sn x I 3 systems (0.9 ≤ x ≤ 1.1) for photovoltaics.
In: Materials Science in Semiconductor Processing, 68
doi: 10.1016/j.mssp.2017.06.012
Article, Bibliographie
Dalgicdir, Cahit ; Rodríguez-Ropero, Francisco ; Vegt, Nico F. A. van der (2017)
Computational Calorimetry of PNIPAM Cononsolvency in Water/Methanol Mixtures.
In: The Journal of Physical Chemistry B, 121 (32)
doi: 10.1021/acs.jpcb.7b05960
Article, Bibliographie
Dallavalle, Marco ; Vegt, Nico F. A. van der (2017)
Evaluation of mapping schemes for systematic coarse graining of higher alkanes.
In: Phys. Chem. Chem. Phys., 19 (34)
doi: 10.1039/c7cp03926c
Article, Bibliographie
Dimesso, Lucangelo ; Stöhr, Maximilian ; Das, Chittaranjan ; Mayer, Thomas ; Jaegermann, Wolfram (2017)
Investigation on the properties of hybrid CH3NH3SnxI3 (0.9 ≤ x ≤ 1.4) perovskite systems.
In: Journal of Materials Research, 32 (22)
doi: 10.1557/jmr.2017.418
Article, Bibliographie
Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017)
AVR Processors as a Platform for Language-Based Security.
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
Conference or Workshop Item, Bibliographie
Drachenfels, Magdalena von ; Riebe, Thea (2017)
Normative Ordnungen des Digitalen - Konferenzbericht.
Other, Bibliographie
Doost, A. S. ; Ries, E. ; Becker, L. G. ; Buerkle, S. ; Wagner, S. ; Ebert, V. ; Dreizler, A. ; Di Mare, F. ; Sadiki, A. ; Janicka, J. (2016)
Residence time calculations for complex swirling flow in a combustion chamber using large-eddy simulations.
In: Chemical Engineering Science, 156
doi: 10.1016/j.ces.2016.09.001
Article, Bibliographie
Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016)
DNSSEC Misconfigurations in Popular Domains.
Milano, Italy
Conference or Workshop Item, Bibliographie
Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Conference or Workshop Item, Bibliographie
Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016)
Secure Logging Schemes and Certificate Transparency.
Heraklion, Crete, Greece
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016)
Efficient Third Party Auditing for a Distributed Storage System.
Salzburg, Austria
Conference or Workshop Item, Bibliographie
Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
Report, Bibliographie
Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas (2016)
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Salzburg, Austria
doi: 10.1109/ARES.2016.88
Conference or Workshop Item, Bibliographie
Dietzel, Mathias ; Hardt, Steffen (2016)
Thermoelectricity in confined liquid electrolytes.
In: Physical Review Letters, 116 (22)
Article, Bibliographie
Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016)
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6)
Article, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016)
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81)
Article, Bibliographie
Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Conference or Workshop Item, Bibliographie
Doerr, Aaron ; Hardt, Steffen ; Masoud, Hassan ; Stone, Howard A. (2016)
Drag and diffusion coefficients of a spherical particle attached to a fluid-fluid interface.
In: Journal of Fluid Mechanics, 790
Article, Bibliographie
Daubert, Jörg (2016)
Anonymous Publish-Subscribe Overlays.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2016)
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: International Journal of Thermodynamics, 19 (1)
doi: 10.5541/ijot.5000156078
Article, Bibliographie
Dayal, Ram ; Gambaryan-Roisman, Tatiana (2016)
A novel numerical method for radiation exchange in granular medium.
In: Heat and Mass Transfer, 52 (11)
Article, Bibliographie
De Nicola, Antonio ; Kawakatsu, Toshihiro ; Mueller-Plathe, Florian ; Milano, Giuseppe (2016)
Fast relaxation of coarse-grained models of polymer interphases by hybrid particle-field molecular dynamics: Polystyrene-silica nanocomposites as an example.
In: European Physical Journal-Special Topics, 225 (8-9)
Article, Bibliographie
Dietrich, Axel ; Fraunholz, Christoph ; Dammel, Frank ; Stephan, Peter (2016)
Exergoeconomic Analysis of Concepts for Pumped Heat Electricity Storage Systems.
Joint Conference “Thermal Energy Storage – Perspectives and Applications in an Industrial Environment”. Frankfurt (2016)
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Book, Bibliographie
De, Simanta ; Bhattacharyya, Somnath ; Hardt, Steffen (2015)
Electroosmotic flow in a slit nanochannel with superhydrophobic walls.
In: Microfluidics and Nanofluidics, 19 (6)
Article, Bibliographie
Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
ed.: Gill, Andy (2015)
Performance problems you can fix: a dynamic analysis of memoization opportunities.
Pittsburgh, PA, USA
doi: 10.1145/2814270.2814290
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Conference or Workshop Item, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015)
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Denver, Colorado, USA
Conference or Workshop Item, Bibliographie
Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015)
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20
doi: 10.1016/j.pmcj.2014.09.001
Article, Bibliographie
Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015)
Stream ciphers in the IoT: Grain and Trivium.
Report, Bibliographie
Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015)
A View on Privacy & Trust in IoT.
First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC). London, UK
doi: 10.1109/ICCW.2015.7247581
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report, Bibliographie
Dörr, A. ; Hardt, Steffen (2015)
Driven particles at fluid interfaces acting as capillary dipoles.
In: Journal of Fluid Mechanics, 770
Article, Bibliographie
Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22nd Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, USA (08.02.2015 - 11.02.2015)
doi: 10.14722/ndss.2015.23113
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Conference or Workshop Item, Bibliographie
Dreizler, A. ; Böhm, B. (2015)
Advanced laser diagnostics for an improved understanding of premixed flame-wall interactions.
In: Proceedings of the Combustion Institute, 35 (1)
doi: 10.1016/j.proci.2014.08.014
Article, Bibliographie
Debrabant, Kristian ; Lang, Jens (2015)
On asymptotic global error estimation and control of finite difference solutions for semilinear parabolic equations.
In: Computer Methods in Applied Mechanics and Engineering, 288
Article, Bibliographie
Domschke, Pia ; Kolb, Oliver ; Lang, Jens (2015)
Adjoint-based error control for the simulation and optimization of gas and water supply networks.
In: Applied Mathematics and Computation, 259
doi: 10.1016/j.amc.2015.03.029
Article, Bibliographie
Dietz, Christian ; Schulze, Marcus ; Voss, Agnieszka ; Riesch, Christian ; Stark, Robert W. (2015)
Bimodal frequency-modulated atomic force microscopy with small cantilevers.
In: Nanoscale, 7 (5)
doi: 10.1039/C4NR05907G
Article, Bibliographie
Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2015)
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: Proceedings of ECOS 2015 - The 28th International Conference on Efficiency, COST, Optimization, Simulation and Environmental Impact of Energy Systems, June 30 - July 3, 2015, Pau, France
Article, Bibliographie
Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (November 07 - 07, 2014)
doi: 10.1145/2664168.2664181
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014)
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
24th International Conference on Field Programmable Logic and Applications (FPL). München, Deutschland (2-4 September, 2014)
Conference or Workshop Item, Bibliographie
Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, USA (20.08.2014 – 22.08.2014)
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Article, Bibliographie
Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie
Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf (2014)
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815157
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
eds.: Chen, Liqun ; Mitchell, Chris (2014)
Unpicking PLAID.
1st International Conference on Research in Security Standardisation. London, United Kingdom (16.-17.12.2014)
doi: 10.1007/978-3-319-14054-4_1
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19th Crypto-Day. Stuttgart, Germany (14.11.2013 - 15.11.2013)
Conference or Workshop Item, Bibliographie
Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko (2013)
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
Berlin, Germany
doi: 10.1145/2508859.2516750
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
eds.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article, Bibliographie
Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Conference or Workshop Item, Bibliographie
Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012)
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
30th ACM Conference on Human Factors in Computing Systems (CHI '12). Austin, USA (05.-10.05.2012)
doi: 10.1145/2212776.2223823
Conference or Workshop Item, Bibliographie
Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Conference or Workshop Item, Bibliographie
E
Eliseev, Andrew ; Steinke, Florian (2024)
Conceptual framework for determining the treewidth of distribution grids.
In: Electric Power Systems Research, 234
doi: 10.1016/j.epsr.2024.110756
Article, Bibliographie
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2)
doi: 10.1515/icom-2021-0021
Article, Bibliographie
Egert, Rolf ; Grube, Tim ; Volk, Florian ; Mühlhäuser, Max (2021)
Holonic System Model for Resilient Energy Grid Operation.
In: Energies, 14 (14)
doi: 10.3390/en14144120
Article, Bibliographie
Egert, Rolf ; Daubert, Jörg ; Marsh, Stephen ; Mühlhäuser, Max (2021)
Exploring energy grid resilience: The impact of data, prosumer awareness, and action.
In: Patterns, 2 (6)
doi: 10.1016/j.patter.2021.100258
Article, Bibliographie
Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (09.-13.05.2021)
Conference or Workshop Item, Bibliographie
Egert, Rolf (2021)
Resilience in Critical Infrastructures.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00019961
Ph.D. Thesis, Primary publication, Publisher's Version
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience.
In: i-com, 20 (2)
doi: 10.1515/icom-2021-0021
Article, Bibliographie
Encinas, Noemí ; Yang, Ching-Yu ; Geyer, Florian ; Kaltbeitzel, Anke ; Baumli, Philipp ; Reinholz, Jonas ; Mailänder, Volker ; Butt, Hans-Jürgen ; Vollmer, Doris (2020)
Submicrometer-Sized Roughness Suppresses Bacteria Adhesion.
In: ACS Applied Materials & Interfaces, 12 (19)
doi: 10.1021/acsami.9b22621
Article, Bibliographie
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.-11.12.)
Conference or Workshop Item, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.-09.10.)
doi: 10.1145/3320269.3384749
Conference or Workshop Item, Bibliographie
Egert, Rolf ; Tundis, Andrea ; Mühlhäuser, Max (2019)
On the Simulation of Smart Grid Environments.
2019 Summer Simulation Conference (SummerSim'19). Berlin, Germany (22.-24.07.2019)
Conference or Workshop Item, Bibliographie
Emmert, Johannes ; Grauer, Samuel J. ; Wagner, Steven ; Daun, Kyle J. (2019)
Efficient Bayesian inference of absorbance spectra from transmitted intensity spectra.
In: Optics Express, 27 (19)
doi: 10.1364/oe.27.026893
Article, Bibliographie
Earley, Timothy (2018)
Extending the Language Coverage of Side-Channel Finder AVR.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Ece, Olcay (2018)
Security of E-Mail-Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018)
Lattice Based Modularization of Static Analyses.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236509
Conference or Workshop Item, Bibliographie
Etzold, Bastian J. M. ; Begin, Dominique (2018)
Editoral special issue CarboCat-VII.
In: Catalysis Today, 301
doi: 10.1016/j.cattod.2017.11.001
Article, Bibliographie
Endoh, Kenkoh S. ; Kawakatsu, Toshihiro ; Müller-Plathe, Florian (2018)
Coarse-Grained Molecular Simulation Model for Gecko Feet Keratin.
In: The Journal of Physical Chemistry B, 122 (8)
doi: 10.1021/acs.jpcb.7b10481
Article, Bibliographie
Eslami, Hossein ; Bahri, Kheiri ; Müller-Plathe, Florian (2018)
Solid–Liquid and Solid–Solid Phase Diagrams of Self-Assembled Triblock Janus Nanoparticles from Solution.
In: The Journal of Physical Chemistry C, 122 (16)
doi: 10.1021/acs.jpcc.8b02043
Article, Bibliographie
Emmert, Johannes ; Blume, Niels Göran ; Dreizler, Andreas ; Wagner, Steven (2018)
Data analysis and uncertainty estimation in supercontinuum laser absorption spectroscopy.
In: Scientific Reports, 8 (1)
doi: 10.1038/s41598-018-28705-2
Article, Bibliographie
Eigenbrod, Michael ; Bihler, Florian ; Hardt, Steffen (2018)
Electrokinetics of a particle attached to a fluid interface: Electrophoretic mobility and interfacial deformation.
In: Physical Review Fluids, 3 (10)
doi: 10.1103/PhysRevFluids.3.103701
Article, Bibliographie
Eslami, Hossein ; Sedaghat, Parvin ; Müller-Plathe, Florian (2018)
Local bond order parameters for accurate determination of crystal structures in two and three dimensions.
In: Physical Chemistry Chemical Physics, 20 (42)
doi: 10.1039/c8cp05248d
Article, Bibliographie
Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017)
Redactable Graph Hashing, Revisited.
Conference or Workshop Item, Bibliographie
Eslami, Hossein ; Khanjari, Neda ; Mueller-Plathe, Florian (2017)
A Local Order Parameter-Based Method for Simulation of Free Energy Barriers in Crystal Nucleation.
In: Journal of chemical theory and computation, 13 (3)
Article, Bibliographie
Eitel, Felix ; Pareja, Jhon ; Johchi, Ayane ; Böhm, Benjamin ; Geyer, Dirk ; Dreizler, Andreas (2017)
Temporal evolution of auto-ignition of ethylene and methane jets propagating into a turbulent hot air co-flow vitiated with NOx.
In: Combustion and Flame, 177
Article, Bibliographie
Egger, H. ; Seitz, T. ; Tropea, C. (2017)
Enhancement of flow measurements using fluid-dynamic constraints.
In: Journal of Computational Physics, 344
doi: 10.1016/j.jcp.2017.04.080
Article, Bibliographie
Ermuth, Markus ; Pradel, Michael (2016)
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
Saarbrücken, Germany
doi: 10.1145/2931037.2931053
Conference or Workshop Item, Bibliographie
Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Eifert, Alexander ; Petit, Julien ; Baier, Tobias ; Bonaccurso, Elmar ; Hardt, Steffen (2015)
Inscribing wettability gradients onto polymer substrates with different stiffness using corona discharge in point-to-plane geometry.
In: Applied Surface Science, 330
Article, Bibliographie
Eitel, Felix ; Pareja, Jhon ; Geyer, Dirk ; Johchi, Ayane ; Michel, Florian ; Elsaesser, Wolfgang ; Dreizler, Andreas (2015)
A novel plasma heater for auto-ignition studies of turbulent non-premixed flows.
In: Experiments in Fluids, 56 (10)
Article, Bibliographie
Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. (2014)
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4)
doi: 10.1109/MSP.2014.38
Article, Bibliographie
Egert, Rolf (2013)
Lattice-based Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Engels, Heinrich-Alexander (2012)
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
Technische Universität Darmstadt
Master Thesis, Bibliographie
F
Fereidooni, Hossein ; Pegoraro, Alessandro ; Rieger, Phillip ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2024)
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Network and Distributed Systems Security (NDSS) Symposium 2024. San Diego, USA (26.02.2024 - 01.03.2024)
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix ; Janson, Christian (2024)
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
In: Journal of Cryptology, 37 (2)
doi: 10.1007/s00145-023-09489-9
Article, Bibliographie
Fischlin, Marc ; Rohrbach, Felix
eds.: Rothblum, Guy N. ; Wee, Hoeteck (2023)
Searching for ELFs in the Cryptographic Forest.
21st Theory of Cryptography Conference (TCC 2023). Taipei, Taiwan (29.11.-02.12.2023)
doi: 10.1007/978-3-031-48621-0_8
Conference or Workshop Item, Bibliographie
Fischlin, Marc
eds.: Meng, Weizhi ; Jensen, Christian Damsgaard ; Cremers, Cas ; Kirda, Engin (2023)
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3.
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023). Copenhagen, Denmark (26.-30.11.2023)
doi: 10.1145/3576915.3623099
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix
eds.: Meng, Weizhi ; Jensen, Christian Damsgaard ; Cremers, Cas ; Kirda, Engin (2023)
Verifiable Verification in Cryptographic Protocols.
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023). Copenhagen, Denmark (26.-30.11.2023)
doi: 10.1145/3576915.3623151
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Heyden, Jonas von der ; Margraf, Marian ; Morgner, Frank ; Wallner, Andreas ; Bock, Holger (2023)
Post-quantum Security for the Extended Access Control Protocol.
8th International Conference Security Standardisation Research (SSR 2023). Lyon, France (22.-23.04.2023)
doi: 10.1007/978-3-031-30731-7_2
Conference or Workshop Item, Bibliographie
Fereidooni, Hossein ; König, Jan ; Rieger, Phillip ; Chilese, Marco ; Goekbakan, Bora ; Finke, Moritz ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza (2023)
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Network and Distributed Systems Security (NDSS) Symposium 2023. San Diego, USA (27.02.-03.03.2023)
doi: 10.14722/ndss.2023.23194
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Rohrbach, Felix ; Schmalz, Tobias (2022)
A Random Oracle for All of Us.
13th International Conference on Cryptology in Africa (AFRICACRYPT 2022). Fes, Morocco (18.-20.07.2022)
doi: 10.1007/978-3-031-17433-9_20
Conference or Workshop Item, Bibliographie
Fitzke, Erik ; Krebs, Robin ; Haase, Thorsten ; Mengler, Max ; Alber, Gernot ; Walther, Thomas (2022)
Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization.
In: New Journal of Physics, 24 (2)
doi: 10.1088/1367-2630/ac5004
Article, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022)
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022. virtual Conference (08.-11.03.2022)
doi: 10.1007/978-3-030-97131-1_4
Conference or Workshop Item, Bibliographie
Fereidooni, Hossein ; Dmitrienko, Alexandra ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Madlener, Felix (2022)
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Network and Distributed Systems Security (NDSS) Symposium 2022. San Diego, USA (24.-28.04.2022)
doi: 10.14722/ndss.2022.23153
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Sanina, Olga
eds.: Tibouchi, Mehdi ; Wang, Huaxiong (2021)
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
27th International Conference on the Theory and Application of Cryptology and Information Security. virtual Conference (06.-10.12.2021)
doi: 10.1007/978-3-030-92075-3_24
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Müller, Sven-Andre ; Münch, Jean-Pierre ; Porth, Lars
eds.: Bertino, Elisa ; Shulman, Haya ; Waidner, Michael (2021)
Multipath TLS 1.3.
26th European Symposium on Research in Computer Security. Darmstadt, Germany (04.-08.10.2021)
doi: 10.1007/978-3-030-88428-4_5
Conference or Workshop Item, Bibliographie
Fejrskov, Martin ; Pedersen, Jens Myrup ; Böck, Leon ; Vasilomanolakis, Emmanouil (2021)
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
IEEE Conference on Communications and Network Security. Tempe, AZ, USA (October 4-6, 2021)
doi: 10.1109/CNS53000.2021.9705029
Conference or Workshop Item, Bibliographie
Fomichev, Mikhail ; Hesse, Julia ; Almon, Lars ; Lippert, Timm ; Han, Jun ; Hollick, Matthias (2021)
FastZIP: faster and more secure zero-interaction pairing.
19th Annual International Conference on Mobile Systems, Applications, and Services. virtual Conference (24.06.-02.07.2021)
doi: 10.1145/3458864.3467883
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Rohrbach, Felix (2021)
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (10.-13.05.2021)
doi: 10.1007/978-3-030-75248-4_8
Conference or Workshop Item, Bibliographie
Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021)
Conference or Workshop Item, Bibliographie
Fickel, Beatrice ; Postulka, Niels ; Hartmann, Maximilian ; Gründing, Dirk M. ; Nau, Maximilian ; Meckel, Tobias ; Biesalski, Markus (2021)
Changes of meniscus shapes and capillary rise heights under hypergravity.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 610
doi: 10.1016/j.colsurfa.2020.125688
Article, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.-21.10.2021)
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020)
Information-Theoretic Security of Cryptographic Channels.
22nd International Conference on Information and Communications Security (ICICS 2020). virtual Conference (24.-26.08.2021)
doi: 10.1007/978-3-030-61078-4_17
Conference or Workshop Item, Bibliographie
Fricke, Mathis ; Bothe, Dieter (2020)
Boundary conditions for dynamic wetting - A mathematical analysis.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-900249-7
Article, Bibliographie
Fischlin, Marc ; Harasser, Patrick ; Janson, Christian
eds.: Canteaut, Anne ; Ishai, Yuval (2020)
Signatures from Sequential-OR Proofs.
39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Zagreb, Croatia (10.-14.05.2020)
doi: 10.1007/978-3-030-45727-3_8
Conference or Workshop Item, Bibliographie
Fricke, Mathis ; Marić, Tomislav ; Bothe, Dieter (2020)
Contact line advection using the geometrical Volume-of-Fluid method.
In: Journal of Computational Physics, 407
doi: 10.1016/j.jcp.2019.109221
Article, Bibliographie
Friedrich, Jonas ; Schäfer, Michael (2020)
Towards an Acoustic Simulation of a Water Drop Impacting in a Water Pool.
In: Flow, Turbulence and Combustion, 2020
doi: 10.1007/s10494-020-00130-4
Article, Bibliographie
Friman-Gayer, Udo (2020)
Probing Nuclear Structure Relevant for Neutrinoless Double-Beta Decay with Nuclear Resonance Fluorescence.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00011385
Ph.D. Thesis, Primary publication
Fraga, G. C. ; Miranda, F. C. ; França, F. H. R. ; Janicka, J. ; Coelho, P. J. (2020)
Assessment of a model for emission subgrid-scale turbulence-radiation interaction applied to a scaled Sandia flame DD.
In: Journal of Quantitative Spectroscopy and Radiative Transfer, 248
doi: 10.1016/j.jqsrt.2020.106986
Article, Bibliographie
Feldmann, Johannes ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Dynamics of a steady liquid flow in a rim bounding a falling wall film: Influence of aerodynamic effects.
In: Physical Review Fluids, 5 (6)
doi: 10.1103/PhysRevFluids.5.064001
Article, Bibliographie
Fricke, Mathis ; Marić, Tomislav ; Bothe, Dieter (2019)
Contact line advection using the geometrical Volume-of-Fluid method.
Report, Bibliographie
Fricke, Mathis ; Maric, T. ; Bothe, D. (2019)
Contact line advection using the Level Set method.
In: Proceedings in Applied Mathematics and Mechanics, 19 (1)
doi: 10.1002/pamm.201900476
Article, Bibliographie
Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (November, 11th, 2019)
Conference or Workshop Item, Bibliographie
Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019)
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2)
doi: 10.1145/3372300.3372304
Article, Bibliographie
Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019)
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4)
doi: 10.3390/cryptography3040025
Article, Bibliographie
Fischler, Yannic ; Lehr, Jan-Patrick ; Kiehn, Matthäus Magnus ; Bischof, Christian (2019)
Automatic identification of standard template algorithms in raw loops.
6th ACM SIGPLAN International Workshop on AI-Inspired and Empirical Methods for Software Engineering on Parallel Computing Systems. Athens, Greece (22.10.2019)
doi: 10.1145/3358500.3361568
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Haagh, Helene
eds.: Schwabe, Peter ; Theriault, Nicolas (2019)
How to Sign with White-Boxed AES.
6th International Conference on Cryptology and Information Security in Latin America. Santiago de Chile, Chile (02.-04.10.2019)
doi: 10.1007/978-3-030-30530-7_13
Conference or Workshop Item, Bibliographie
Fricke, Mathis ; Maric, Tomislav ; Bothe, Dieter (2019)
Contact Line Advection using the Level Set Method : Data and C++ Implementations.
doi: 10.25534/tudatalib-58
Data, Bibliographie
Felsen, Susanne (2019)
Secure Two-Party Computation: ABY versus Intel SGX.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fricke, Mathis ; Köhne, Matthias ; Bothe, Dieter (2019)
A kinematic evolution equation for the dynamic contact angle and some consequences.
In: Physica D: Nonlinear Phenomena
doi: 10.1016/j.physd.2019.01.008
Article, Bibliographie
Fischlin, Marc ; Günther, Felix (2019)
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint
Article, Bibliographie
Fasihi Yazdi, Mohsen (2018)
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fischlin, Marc ; Mazaheri, Sogol (2018)
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
2018 IEEE 31st Computer Security Foundations Symposium (CSF). Oxford, United Kingdom (09.-12.07.2018)
doi: 10.1109/CSF.2018.00013
Conference or Workshop Item, Bibliographie
Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018)
IMIX: In-Process Memory Isolation EXtension.
27th USENIX Security Symposium - Technical Sessions Track 2. Baltimore, MD, USA (15.-17.08.2018)
Conference or Workshop Item, Bibliographie
Franke, Fabian (2018)
Learning the Beams.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fischlin, Marc ; Harasser, Patrick (2018)
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
16th International Conference on Applied Cryptography and Network Security. Leuven, Belgium (02.-04.07.2018)
doi: 10.1007/978-3-319-93387-0_11
Conference or Workshop Item, Bibliographie
Fräbel, Sabine ; Wagner, Bastian ; Krischke, Markus ; Schmidts, Volker ; Thiele, Christina M. ; Staniek, Agata ; Warzecha, Heribert (2018)
Engineering of new-to-nature halogenated indigo precursors in plants.
In: Metabolic Engineering, 46
doi: 10.1016/j.ymben.2018.02.003
Article, Bibliographie
Falcone, M. ; Bothe, D. ; Marschall, H. (2018)
3D direct numerical simulations of reactive mass transfer from deformable single bubbles: An analysis of mass transfer coefficients and reaction selectivities.
In: Chemical Engineering Science, 177
doi: 10.1016/j.ces.2017.11.024
Article, Bibliographie
Fink, V. ; Cai, X. ; Stroh, A. ; Bernard, R. ; Kriegseis, J. ; Frohnapfel, B. ; Marschall, H. ; Wörner, M. (2018)
Drop bouncing by micro-grooves.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.014
Article, Bibliographie
Forooghi, Pourya ; Weidenlener, Alex ; Magagnato, Franco ; Böhm, Benjamin ; Kubach, Heiko ; Koch, Thomas ; Frohnapfel, Bettina (2018)
DNS of momentum and heat transfer over rough surfaces based on realistic combustion chamber deposit geometries.
In: International Journal of Heat and Fluid Flow, 69
doi: 10.1016/j.ijheatfluidflow.2017.12.002
Article, Bibliographie
Fegan, Sarah K. ; Kirsch, Peer ; Müller-Plathe, Florian (2018)
The alignment of dichroic dyes in a nematic liquid crystal: a molecular dynamics investigation.
In: Liquid Crystals, 45 (9)
doi: 10.1080/02678292.2018.1441456
Article, Bibliographie
Fricke, Mathis ; Köhne, Matthias ; Bothe, Dieter (2018)
On the Kinematics of Contact Line Motion.
In: PAMM, 18 (1)
doi: 10.1002/pamm.201800451
Article, Bibliographie
Fladung, Lukas (2017)
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
JITGuard: Hardening Just-in-time Compilers with SGX.
Dallas, TX, USA
doi: 10.1145/3133956.3134037
Conference or Workshop Item, Bibliographie
Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017)
Constrained PET Composition for Measuring Enforced Privacy.
doi: 10.1145/3098954.3098968
Conference or Workshop Item, Bibliographie
Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017)
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Atlanta, Georgia, USA
Conference or Workshop Item, Bibliographie
Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017)
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1)
doi: 10.1109/COMST.2017.2748278
Article, Bibliographie
Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Conference or Workshop Item, Bibliographie
Funke, Sebastian
ed.: Daubert, Jörg (2017)
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Conference or Workshop Item, Bibliographie
Fenner, Andreas ; Stephan, Peter (2017)
Two dye combinations suitable for two‐color/two‐dye laser‐induced fluorescence thermography for ethanol.
In: Experiments in Fluids, 58 (6)
Article, Bibliographie
Fischlin, Marc ; Günther, Felix (2017)
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Paris, France
Conference or Workshop Item, Bibliographie
Fischer, Sebastian ; Sahu, R. P. ; Sinha-Ray, S. ; Yarin, A. L. ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2017)
Effect of nano-textured heater surfaces on evaporation at a single meniscus.
In: International Journal of Heat and Mass Transfer, 108
Article, Bibliographie
Franz, Benjamin ; Stephan, Peter (2017)
Numerical simulation of nucleate boiling in microgravity in presence of a shear flow.
Napoli (Italy) (May 28-June 1, 2017)
doi: 10.1615/ICHMT.2017.CHT-7.810
Conference or Workshop Item, Bibliographie
Farwig, Reinhard ; Kozono, Hideo ; Wegmann, David (2017)
Existence of strong solutions and decay of turbulent solutions of Navier–Stokes flow with nonzero Dirichlet boundary data.
In: Journal of Mathematical Analysis and Applications, 453 (1)
doi: 10.1016/j.jmaa.2017.03.086
Article, Bibliographie
Frigge, Lorenz ; Ströhle, Jochen ; Epple, Bernd (2017)
Release of sulfur and chlorine gas species during coal combustion and pyrolysis in an entrained flow reactor.
In: Fuel, 201
doi: 10.1016/j.fuel.2016.11.037
Article, Bibliographie
Falcone, Manuel ; Marschall, Holger (2017)
Explicit Radial-Basis-Function-Based Finite-Difference Method for Interfacial Mass-Transfer Problems.
In: Chemical Engineering & Technology, 40 (8)
doi: 10.1002/ceat.201600536
Article, Bibliographie
Forooghi, Pourya ; Stroh, Alexander ; Magagnato, Franco ; Jakirlić, Suad ; Frohnapfel, Bettina (2017)
Toward a Universal Roughness Correlation.
In: Journal of Fluids Engineering, 139 (12)
doi: 10.1115/1.4037280
Article, Bibliographie
Freudigmann, H.-A. ; Dörr, Aaron ; Iben, Uwe ; Pelz, P. F. (2017)
Modeling of Cavitation-Induced Air Release Phenomena in Micro-Orifice Flows.
In: Journal of Fluids Engineering, 139 (11)
doi: 10.1115/1.4037048
Article, Bibliographie
Fischer, Michael ; Lindemann, Florian ; Ulbrich, Michael ; Ulbrich, Stefan (2017)
Fréchet Differentiability of Unsteady Incompressible Navier--Stokes Flow with Respect to Domain Variations of Low Regularity by Using a General Analytical Framework.
In: SIAM Journal on Control and Optimization, 55 (5)
doi: 10.1137/16m1089563
Article, Bibliographie
Fojtik, Roman (2016)
Salt Synchronization Service.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro (2016)
Capture and Replay: Reproducible Network Experiments in Mininet.
Florianopolis, Brazil
doi: 10.1145/2934872.2959076
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016)
Obfuscation Combiners.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie
Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016)
NetCo: Reliable Routing with Unreliable Routers.
Toulouse, France
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016)
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
San Jose, California, USA
Conference or Workshop Item, Bibliographie
Farwig, Reinhard ; Rosteck, Veronika (2016)
Note on Friedrichs' inequality in N-star-shaped domains.
In: Journal of Mathematical Analysis and Applications, 435 (2)
Article, Bibliographie
Freystein, Martin ; Kolberg, Felix ; Spiegel, Lucas ; Sinha-Ray, Sumit ; Sahu, Rakesh P. ; Yarin, Alexander L. ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2016)
Trains of Taylor bubbles over hot nano-textured mini-channel surface.
In: International Journal of Heat and Mass Transfer, 93
Article, Bibliographie
Farwig, Reinhard ; Riechwald, Paul Felix (2016)
REGULARITY CRITERIA FOR WEAK SOLUTIONS OF THE NAVIER-STOKES SYSTEM IN GENERAL UNBOUNDED DOMAINS.
In: Discrete and Continuous Dynamical Systems-Series S, 9 (1)
Article, Bibliographie
Farwig, Reinhard ; Rosteck, Veronika (2016)
RESOLVENT ESTIMATES OF THE STOKES SYSTEM WITH NAVIER BOUNDARY CONDITIONS IN GENERAL UNBOUNDED DOMAINS.
In: Advances in Differential Equations, 21 (5-6)
Article, Bibliographie
Falconi, C. J. ; Lehrenfeld, C. ; Marschall, H. ; Meyer, C. ; Abiev, R. ; Bothe, D. ; Reusken, A. ; Schlueter, M. ; Woerner, M. (2016)
Numerical and experimental analysis of local flow phenomena in laminar Taylor flow in a square mini-channel.
In: Physics of Fluids, 28 (1)
Article, Bibliographie
Falk, Paul Michael ; Meggers, F. ; Stephan, Peter ; Dammel, Frank (2016)
Comparison of District Heating Systems and Distributed Geothermal Network for Optimal Exergetic Performance.
Sustainable Built Environment (SBE) Regional Conference.
Conference or Workshop Item, Bibliographie
Farwig, Reinhard ; Giga, Yoshikazu ; Hsu, Pen-Yuan (2016)
Initial Values for the Navier-Stokes Equations in Spaces with Weights in Time.
In: Funkcialaj Ekvacioj-Serio Internacia, 59 (2)
Article, Bibliographie
Fleisch, Gilbert (2016)
Towards policy checks on passwords via fully homomorphic encryption.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015)
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Physical Review A, 92 (6)
doi: 10.1103/PhysRevA.92.062322
Article, Bibliographie
Fath, Anja ; Bothe, Dieter (2015)
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, 77
Article, Bibliographie
Fath, Anja ; Bothe, Dieter (2015)
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, 77
Article, Bibliographie
Fischlin, Marc ; Mazaheri, Sogol (2015)
Notions of Deniable Message Authentication.
Denver, Colorado, USA
doi: 10.1145/2808138.2808143
Conference or Workshop Item, Bibliographie
Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015)
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS). Florence, Italy (28.-30. Sept. 2015)
doi: 10.1109/CNS.2015.7346895
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015)
Data Is a Stream: Security of Stream-Based Channels.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie
Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015)
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, 48 (2)
doi: 10.1088/0953-4075/48/2/025501
Article, Bibliographie
Fath, Anja ; Horn, Tobias ; Gambaryan-Roisman, Tatiana ; Stephan, Peter ; Bothe, Dieter (2015)
Numerical and experimental analysis of short-scale Marangoni convection on heated structured surfaces.
In: International Journal of Heat and Mass Transfer, 86
Article, Bibliographie
Fischer, Sebastian ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2015)
On the development of a thin evaporating liquid film at a receding liquid/vapour-interface.
In: International Journal of Heat and Mass Transfer, 88
Article, Bibliographie
Farwig, Reinhard ; Nakatsuka, Tomoyuki ; Taniuchi, Yasushi (2015)
Existence of solutions on the whole time axis to the Navier-Stokes equations with precompact range in L (3).
In: Archiv Der Mathematik, 104 (6)
Article, Bibliographie
Fabbiane, Nicolo ; Simon, Bernhard ; Fischer, Felix ; Grundmann, Sven ; Bagheri, Shervin ; Henningson, Dan S. (2015)
On the role of adaptivity for robust laminar flow control.
In: Journal of Fluid Mechanics, 767
Article, Bibliographie
Farwig, Reinhard ; Riechwald, Paul Felix (2015)
Very weak solutions to the Navier-Stokes system in general unbounded domains.
In: Journal of Evolution Equations, 15 (2)
Article, Bibliographie
Fuest, Frederik ; Barlow, Robert S. ; Magnotti, Gaetano ; Dreizler, Andreas ; Ekoto, Isaac W. ; Sutton, Jeffrey A. (2015)
Quantitative acetylene measurements in laminar and turbulent flames using 1D Raman/Rayleigh scattering.
In: Combustion and Flame, 162 (5)
Article, Bibliographie
Farwig, Reinhard ; Nakatsuka, Tomoyuki ; Taniuchi, Yasushi (2015)
Uniqueness of Solutions on the Whole Time Axis to the Navier-Stokes Equations in Unbounded Domains.
In: Communications in Partial Differential Equations, 40 (10)
Article, Bibliographie
Farwig, Reinhard ; Riechwald, Paul Felix (2015)
Very weak solutions and the Fujita-Kato approach to the Navier-Stokes system in general unbounded domains.
In: Nodea-Nonlinear Differential Equations and Applications, 22 (5)
Article, Bibliographie
Fleckenstein, Stefan ; Bothe, Dieter (2015)
A Volume-of-Fluid-based numerical method for multi-component mass transfer with local volume changes.
In: Journal of Computational Physics, 301
Article, Bibliographie
Fiorina, B. ; Mercier, R. ; Kuenne, G. ; Ketelheun, Anja ; Avdic, Amer ; Janicka, J. ; Geyer, D. ; Dreizler, A. ; Alenius, E. ; Duwig, C. ; Trisjono, P. ; Kleinheinz, K. ; Kang, S. ; Pitsch, H. ; Proch, F. ; Marincola, F. Cavallo ; Kempf, A. (2015)
Challenging modeling strategies for LES of non-adiabatic turbulent stratified combustion.
In: Combustion and Flame, 162 (11)
Article, Bibliographie
Farwig, Reinhard ; Sohr, Hermann ; Varnhorn, Werner (2015)
LOCAL STRONG SOLUTIONS OF THE NONHOMOGENEOUS NAVIER-STOKES SYSTEM WITH CONTROL OF THE INTERVAL OF EXISTENCE.
In: Topological Methods in Nonlinear Analysis, 46 (2)
Article, Bibliographie
Fehr, Victoria ; Fischlin, Marc (2015)
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015
Article, Bibliographie
Fischlin, Marc ; Günther, Felix (2014)
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Scottsdale, Arizona, USA
Conference or Workshop Item, Bibliographie
Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
eds.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Conference or Workshop Item, Bibliographie
Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Coercion-Resistant Internet Voting in Practice.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie
Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014)
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014)
Robust Multi-Property Combiners for Hash Functions.
doi: 10.1007/s00145-013-9148-7
Conference or Workshop Item, Bibliographie
Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013)
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
Article, Bibliographie
Felzer, Torsten ; Rinderknecht, Stephan (2013)
Mouse mode of OnScreenDualScribe: Three types of keyboard-driven mouse replacement.
In: CHI '13 Extended Abstracts on Human Factors in Computing Systems
doi: 10.1145/2468356.2468641
Book Section, Bibliographie
Funke, Sebastian (2013)
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Article, Bibliographie
Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Conference or Workshop Item, Bibliographie
Faber, Natalie (2012)
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fuhrmann, Tino (2012)
Ansatz zur Erkennung von HTTPS Stripping Attacken.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fehr, Victoria (2012)
Sophisticated Public-Key Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Filtschew, Konstantin (2012)
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
Technische Universität Darmstadt
Master Thesis, Bibliographie
G
Gehlhar, Till ; Marx, Felix ; Schneider, Thomas ; Suresh, Ajith ; Wehrle, Tobias ; Yalame, Hossein (2023)
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning.
6th Deep Learning Security and Privacy Workshop (DLSP 2023). San Francisco, USA (25.05.2023)
Conference or Workshop Item, Bibliographie
Ganghof, Steffen ; Schulze, Kai (2023)
Vetospieler und Institutionen.
In: Handbuch Policy-Forschung, Edition: 2. Auflage
doi: 10.1007/978-3-658-05678-0_4-1
Book Section, Bibliographie
Gerber, Nina ; Stöver, Alina ; Peschke, Justin ; Zimmermann, Verena (2023)
Don’t accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices.
In: ACM Transactions on Computer-Human Interaction
doi: 10.1145/3617363
Article, Bibliographie
Günther, Daniel ; Holz, Marco ; Judkewitz, Benjamin ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith (2022)
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022 - 11.11.2022)
doi: 10.1145/3548606.3563497
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Marky, Karola
ed.: USENIX Association (2022)
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior.
18th Symposium on Usable Privacy and Security. Boston, USA (07.-09.08.2022)
Conference or Workshop Item, Bibliographie
Günther, Daniel ; Schneider, Thomas ; Wiegand, Felix (2021)
Revisiting Hybrid Private Information Retrieval.
27th ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021 - 19.11.2021)
doi: 10.1145/3460120.3485346
Conference or Workshop Item, Bibliographie
Gonzalez, Ruben ; Hülsing, Andreas ; Kannwischer, Matthias ; Krämer, Juliane ; Lange, Tanja ; Stöttinger, Marc ; Waitz, Elisabeth ; Wiggers, Thom ; Yang, Bo-Yin (2021)
Verifying Post-Quantum Signatures in 8kB of RAM.
12th International Conference on Post-Quantum Cryptography. virtual Conference (20.-22.07.2021)
doi: 10.1007/978-3-030-81293-5_12
Conference or Workshop Item, Bibliographie
Guo, Xiaogang ; Peng, Chong ; Wu, Wei ; Wang, Yongqi (2021)
Unified constitutive model for granular–fluid mixture in quasi-static and dense flow regimes.
In: Acta Geotechnica, 16 (3)
doi: 10.1007/s11440-020-01044-1
Article, Bibliographie
Grube, Tim ; Egert, Rolf ; Daubert, Jörg ; Mühlhäuser, Max (2021)
The Cost of Path Information: Routing in Anonymous Communication.
Consumer Communications & Networking Conference (CCNC 2021). virtual Conference (09.-12.01.2021)
Conference or Workshop Item, Bibliographie
Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021)
Quantum Indistinguishability for Public Key Encryption.
PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography. virtual Conference (July 20-22, 2021)
Conference or Workshop Item, Bibliographie
Gerber, Paul ; Heidinger, Marvin ; Stiegelmayer, Julia ; Gerber, Nina (2021)
LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing.
doi: 10.1145/3473856.3474094
Conference or Workshop Item, Bibliographie
Gabel, Sabrina ; Reichert, Lilian ; Reuter, Christian (2020)
Discussing Conflict in Social Media - The Use of Twitter in the Jammu and Kashmir Conflict.
In: Media, War & Conflict, 13
doi: 10.1177/1750635220970997
Article, Bibliographie
Gründing, Dirk ; Smuda, Martin ; Antritter, Thomas ; Fricke, Mathis ; Rettenmaier, Daniel ; Kummer, Florian ; Stephan, Peter ; Marschall, Holger ; Bothe, Dieter (2020)
A comparative study of transient capillary rise using direct numerical simulations.
In: Applied Mathematical Modelling, 86
doi: 10.1016/j.apm.2020.04.020
Article, Bibliographie
Gholijani, Alireza ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2020)
Experimental investigation of hydrodynamics and heat transport during vertical coalescence of multiple successive drops impacting a hot wall under saturated vapor atmosphere.
In: Experimental Thermal and Fluid Science, 118
doi: 10.1016/j.expthermflusci.2020.110145
Article, Bibliographie
Glanz, Leonid ; Müller, Patrick ; Baumgärtner, Lars ; Reif, Michael ; Anthonysamy, Pauline ; Mezini, Mira (2020)
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.-09.10)
doi: 10.1145/3320269.3384745
Conference or Workshop Item, Bibliographie
Ghillani, Noemi ; Heinz, Michael ; Gambaryan-Roisman, Tatiana (2020)
Capillary rise and evaporation of a liquid in a corner between a plane and a cylinder: A model of imbibition into a nanofiber mat coating.
In: The European Physical Journal Special Topics, 229 (10)
doi: 10.1140/epjst/e2020-000011-y
Article, Bibliographie
Giga, Yoshikazu ; Gries, Mathis ; Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2020)
The hydrostatic Stokes semigroup and well-posedness of the primitive equations on spaces of bounded functions.
In: Journal of Functional Analysis, 279 (3)
doi: 10.1016/j.jfa.2020.108561
Article, Bibliographie
Greifenstein, M. ; Heinze, J. ; Willert, C. ; Voigt, L. ; Zedda, M. ; Richter, C. ; Dreizler, A. (2020)
Time-resolved temperature profile measurements in the exhaust of a single sector gas turbine combustor at realistic operating conditions.
In: Experiments in Fluids, 61 (8)
doi: 10.1007/s00348-020-03011-8
Article, Bibliographie
Gholijani, Alireza ; Schlawitschek, Christiane ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2020)
Heat transfer during drop impingement onto a hot wall: The influence of wall superheat, impact velocity, and drop diameter.
In: International Journal of Heat and Mass Transfer, 153
doi: 10.1016/j.ijheatmasstransfer.2020.119661
Article, Bibliographie
Ganguly, Pritam ; Polák, Jakub ; Vegt, Nico F. A. van der ; Heyda, Jan ; Shea, Joan-Emma (2020)
Protein Stability in TMAO and Mixed Urea–TMAO Solutions.
In: The Journal of Physical Chemistry B, 124 (29)
doi: 10.1021/acs.jpcb.0c04357
Article, Bibliographie
Gerlach, Felix ; Hussong, Jeanette ; Roisman, Ilia V. ; Tropea, Cameron (2020)
Capillary rivulet rise in real-world corners.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 592
doi: 10.1016/j.colsurfa.2020.124530
Article, Bibliographie
Geyer, Florian ; D'Acunzi, Maria ; Sharifi-Aghili, Azadeh ; Saal, Alexander ; Gao, Nan ; Kaltbeitzel, Anke ; Sloot, Tim-Frederik ; Berger, Rüdiger ; Butt, Hans-Jürgen ; Vollmer, Doris (2020)
When and how self-cleaning of superhydrophobic surfaces works.
In: Science Advances, 6 (3)
doi: 10.1126/sciadv.aaw9727
Article, Bibliographie
Gerlach, Felix ; Hartmann, Maximilian ; Tropea, Cameron (2019)
The interaction of inner and outer surface corners during spontaneous wetting.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 583
doi: 10.1016/j.colsurfa.2019.123977
Article, Bibliographie
Giga, Yoshikazu ; Gries, Mathis ; Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2019)
Analyticity of solutions to the primitive equations.
In: Mathematische Nachrichten, 2020
doi: 10.1002/mana.201700401
Article, Bibliographie
Gründing, Dirk ; Fricke, Mathis ; Bothe, Dieter (2019)
Capillary Rise ‐ Jurin's Height vs Spherical Cap.
In: PAMM, 19 (1)
doi: 10.1002/pamm.201900336
Article, Bibliographie
Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
26th ACM Conference on Computer and Communications Security. London, United Kingdom (11.11.2019 - 15.11.2019)
doi: 10.1145/3319535.3363251
Conference or Workshop Item, Bibliographie
Geschwindner, Christopher ; Kranz, Patrick ; Welch, Cooper ; Schmidt, Marius ; Böhm, Benjamin ; Kaiser, Sebastian A. ; Morena, Joaquin de la (2019)
Analysis of the interaction of Spray G and in-cylinder flow in two optical engines for late gasoline direct injection.
In: International Journal of Engine Research, 21 (1)
doi: 10.1177/1468087419881535
Article, Bibliographie
Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019)
PAtt: Physics-based Attestation of Control Systems.
22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Beijing (23. - 25.09.2019)
Conference or Workshop Item, Bibliographie
Gräßle, Carmen ; Hinze, Michael ; Lang, Jens ; Ullmann, Sebastian (2019)
POD model order reduction with space-adapted snapshots for incompressible flows.
In: Advances in Computational Mathematics, 45
doi: 10.1007/s10444-019-09716-7
Article, Bibliographie
Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
eds.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer. Hamburg, Germany (8. bis 11. September 2019)
doi: 10.1145/3340764.3340782
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019)
Why Johnny Fails to Protect his Privacy.
4th European Workshop on Usable Security (EuroUSEC 2019). Stockholm, Schweden (20.06.2019)
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019)
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing
doi: 10.1109/TSUSC.2019.2913948
Article, Bibliographie
Grefe, Ann-Kathrin ; Kuttich, Björn ; Stühn, Lukas ; Stark, Robert ; Stühn, Bernd (2019)
Oriented crystallization of PEG induced by confinement in cylindrical nanopores: Structural and thermal properties.
In: Soft Matter, (15)
doi: 10.1039/C9SM00053D
Article, Bibliographie
Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019)
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
IEEE Global Communications Conference (GLOBECOM). Abu Dhabi, United Arab Emirates (9-13 Dec. 2018)
doi: 10.1109/GLOCOM.2018.8647607
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019)
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019. Rabat, Morocco (April 22 - 24, 2019)
Conference or Workshop Item, Bibliographie
Geyer, Florian ; Seiler, Patrick M. ; Vollmer, Doris ; Berger, Rüdiger (2019)
Wie sich Tropfen bewegen.
In: Physik in unserer Zeit, 50 (2)
doi: 10.1002/piuz.201901531
Article, Bibliographie
Geyer, Florian ; Asaumi, Yuta ; Vollmer, Doris ; Butt, Hans-Jürgen ; Nakamura, Yoshinobu ; Fujii, Syuji (2019)
Polyhedral Liquid Marbles.
In: Advanced Functional Materials, 29 (25)
doi: 10.1002/adfm.201808826
Article, Bibliographie
Gambaryan-Roisman, Tatiana (2019)
Simultaneous imbibition and evaporation of liquids on grooved substrates.
In: Interfacial Phenomena and Heat Transfer, 7 (3)
doi: 10.1615/InterfacPhenomHeatTransfer.2019031166
Article, Bibliographie
Gerber, Nina ; Reinheimer, Benjamin ; Volkamer, Melanie (2019)
Investigating People’s Privacy Risk Perception.
In: Proceedings on Privacy Enhancing Technologies, 2019 (3)
doi: 10.2478/popets-2019-0047
Article, Bibliographie
Geihs, Matthias ; Buchmann, Johannes (2018)
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
21st Annual International Conference on Information Security and Cryptology. Seoul, Korean (28.-30.11.2018)
doi: 10.1007/978-3-030-12146-4_17
Conference or Workshop Item, Bibliographie
Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
Article, Bibliographie
Guski, Florian (2018)
Simulation of the Quantum Hybrid Attack in Q#.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Günther, Daniel (2018)
Private Function Evaluation with Universal Circuits.
Bosch Renningen, Germany (6.-7.9.2018)
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018)
Finally Johnny Can Encrypt. But Does This Make Him Feel More
Secure?
International Conference on Availability, Reliability and Security (ARES). Hamburg, Germany (27.08. - 30.08.2018)
doi: 10.1145/3230833.3230859
Conference or Workshop Item, Bibliographie
Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018)
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems. Vienna, Austria (2.-5.7.2018)
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018)
PROPYLA: Privacy Preserving Long-Term Secure Storage.
The Sixth International Workshop on Security in Cloud Computing (SCC).
Conference or Workshop Item, Bibliographie
Guhl, Conrad ; Kehne, Philipp ; Ma, Qianli ; Tietz, Frank ; Alff, Lambert ; Komissinskiy, Philipp ; Jaegermann, Wolfram ; Hausbrand, René (2018)
In-operando photoelectron spectroscopy for batteries: Set-up using pristine thin film cathode and first results on NaxCoO2.
In: Review of Scientific Instruments, 89 (7)
doi: 10.1063/1.5022616
Article, Bibliographie
Gajewski, Marvin (2018)
Asymptotische Eigenschaften offener quantenoptischer Systeme.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Guhl, Conrad ; Kehne, Philipp ; Ma, Qianli ; Tietz, Frank ; Komissinskiy, Philipp ; Jaegermann, Wolfram ; Hausbrand, René (2018)
Interfaces in solid-state sodium-ion batteries: NaCoO 2 thin films on solid electrolyte substrates.
In: Electrochimica Acta, 268
doi: 10.1016/j.electacta.2018.02.109
Article, Bibliographie
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
eds.: Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (2018)
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018
Book Section, Bibliographie
Godina, Lidia I. ; Tokarev, Anton V. ; Simakova, Irina L. ; Mäki-Arvela, Päivi ; Kortesmäki, Ewelina ; Gläsel, Jan ; Kronberg, Leif ; Etzold, Bastian ; Murzin, Dmitry Yu. (2018)
Aqueous-phase reforming of alcohols with three carbon atoms on carbon-supported Pt.
In: Catalysis Today, 301
doi: 10.1016/j.cattod.2017.03.042
Article, Bibliographie
Gao, Nan ; Geyer, Florian ; Pilat, Dominik W. ; Wooh, Sanghyuk ; Vollmer, Doris ; Butt, Hans-Jürgen ; Berger, Rüdiger (2018)
How drops start sliding over solid surfaces.
In: Nature Physics, 14 (2)
doi: 10.1038/nphys4305
Article, Bibliographie
Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018)
K-Miner: Uncovering Memory Corruption in Linux.
Conference or Workshop Item, Bibliographie
Groß, T. F. ; Bauer, J. ; Ludwig, G. ; Fernandez Rivas, D. ; Pelz, P. F. (2018)
Bubble nucleation from micro-crevices in a shear flow.
In: Experiments in Fluids, 59 (1)
doi: 10.1007/s00348-017-2459-y
Article, Bibliographie
Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018)
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion
Book Section, Bibliographie
Gao, Yangyang ; Müller-Plathe, Florian (2018)
Molecular Dynamics Study on the Thermal Conductivity of the End-grafted Carbon Nanotubes Filled Polyamide-6.6 Nanocomposites.
In: The Journal of Physical Chemistry C, 122 (2)
doi: 10.1021/acs.jpcc.7b11310
Article, Bibliographie
Ghoussoub, Yara E. ; Zerball, Maximilian ; Fares, Hadi M. ; Ankner, John F. ; Klitzing, R. von ; Schlenoff, Joseph B. (2018)
Ion distribution in dry polyelectrolyte multilayers: a neutron reflectometry study.
In: Soft Matter, 14 (9)
doi: 10.1039/c7sm02461d
Article, Bibliographie
Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018)
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
Conference or Workshop Item, Bibliographie
Ganter, Sebastian ; Straßacker, Christina ; Kuenne, Guido ; Meier, Thorsten ; Heinrich, Arne ; Maas, Ulrich ; Janicka, J. (2018)
Laminar near-wall combustion: Analysis of tabulated chemistry simulations by means of detailed kinetics.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.015
Article, Bibliographie
Gugat, Martin ; Ulbrich, Stefan (2018)
Lipschitz solutions of initial boundary value problems for balance laws.
In: Mathematical Models and Methods in Applied Sciences, 28 (05)
doi: 10.1142/s0218202518500240
Article, Bibliographie
Grebenev, Vladimir N. ; Oberlack, Martin (2018)
Homogeneous Isotropic Turbulence: Geometric and Isometry Properties of the 2-point Velocity Correlation Tensor.
In: Journal of Nonlinear Mathematical Physics, 25 (4)
doi: 10.1080/14029251.2018.1503447
Article, Bibliographie
Geihs, Matthias (2018)
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018)
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11)
Article, Bibliographie
Gründing, Dirk ; Bothe, Dieter ; Marschall, Holger (2018)
Wetting phenomena with ALE interface tracking.
In: PAMM, 18 (1)
doi: 10.1002/pamm.201800430
Article, Bibliographie
Gerlach, Felix ; Garoff, Stephen ; Tropea, Cameron (2018)
Quantitative optical measurement of contact lines on milliscale metal
structures dipped into a liquid pool.
19th International Symposium on Application of Laser and Imaging Techniques to Fluid Mechanics. Lisbon (16-19 July 2018)
Conference or Workshop Item, Bibliographie
Geyer, Florian ; D'Acunzi, Maria ; Yang, Ching-Yu ; Müller, Michael ; Baumli, Philipp ; Kaltbeitzel, Anke ; Mailänder, Volker ; Encinas, Noemí ; Vollmer, Doris ; Butt, Hans-Jürgen (2018)
How to Coat the Inside of Narrow and Long Tubes with a Super-Liquid-Repellent Layer-A Promising Candidate for Antibacterial Catheters.
In: Advanced Materials, 31 (2)
doi: 10.1002/adma.201801324
Article, Bibliographie
Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018)
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
HotNets'18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (15. - 16.11.2018)
doi: 10.1145/3286062.3286071
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Henhapl, Birgit ; Gerber, Nina
eds.: Dachselt, Raimund ; Weber, Gerhard (2018)
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
doi: 10.18420/muc2018-ws08-0542
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Gerber, Paul ; Volkamer, Melanie (2018)
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior.
In: Computers & Security, 77 (1)
doi: 10.1016/j.cose.2018.04.002
Article, Bibliographie
Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017. Hong Kong, China (03.12.2017-07.12.2017)
doi: 10.1007/978-3-319-70697-9_16
Conference or Workshop Item, Bibliographie
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017)
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017. London, United Kingdom (04.-07.12.2017)
Conference or Workshop Item, Bibliographie
Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017)
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
Conference or Workshop Item, Bibliographie
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017)
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering.
doi: 10.1145/3106237.3106305
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Zimmermann, Verena
eds.: Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (2017)
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Regensburg, Germany
doi: 10.18420/muc2017-ws05-0405
Conference or Workshop Item, Bibliographie
Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Cover Traffic: A Trade of Anonymity and Efficiency.
13th International Workshop on Security and Trust Management. Oslo, Norway
doi: 10.1007/978-3-319-68063-7_15
Conference or Workshop Item, Bibliographie
Günther, Felix ; Mazaheri, Sogol (2017)
A Formal Treatment of Multi-key Channels.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017)
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Vancouver, Canada
doi: 10.1007/978-3-319-58460-7
Conference or Workshop Item, Bibliographie
Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017)
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Conference or Workshop Item, Bibliographie
Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017)
ORAMs in a Quantum World.
Utrecht, The Netherlands
Conference or Workshop Item, Bibliographie
Gielok, Martin ; Lopes, Marcus ; Bonaccurso, Elmar ; Gambaryan-Roisman, Tatiana (2017)
Droplet on an elastic substrate: Finite Element Method coupled with lubrication approximation.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 521
doi: 10.1016/j.colsurfa.2016.08.001
Article, Bibliographie
Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. (2017)
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
Denver, CO, USA
doi: 10.1145/3025453.3025808
Conference or Workshop Item, Bibliographie
Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017)
0-RTT Key Exchange with Full Forward Secrecy.
Conference or Workshop Item, Bibliographie
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colonies for Efficient and Anonymous Group Communication Systems.
doi: 10.1109/NetSys.2017.7903958
Conference or Workshop Item, Bibliographie
Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Günther, Felix ; Poettering, Bertram (2017)
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3)
Article, Bibliographie
Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Conference or Workshop Item, Bibliographie
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
Las Vegas (USA)
doi: 10.1109/CCNC.2017.7983129
Conference or Workshop Item, Bibliographie
Gugat, Martin ; Ulbrich, Stefan (2017)
The isothermal Euler equations for ideal gas with source term: Product solutions, flow reversal and no blow up.
In: Journal of Mathematical Analysis and Applications, 454 (1)
doi: 10.1016/j.jmaa.2017.04.064
Article, Bibliographie
Galdi, Giovanni P. ; Hieber, Matthias ; Kashiwabara, Takahito (2017)
Strong time-periodic solutions to the 3D primitive equations subject to arbitrary large forces.
In: Nonlinearity, 30 (10)
doi: 10.1088/1361-6544/aa8166
Article, Bibliographie
Groß, T. F. ; Pöttgen, P. F. ; Pelz, P. F. (2017)
Analytical Approach for the Optimal Operation of Pumps in Booster Systems.
In: Journal of Water Resources Planning and Management, 143 (8)
doi: 10.1061/(asce)wr.1943-5452.0000776
Article, Bibliographie
Grebenev, V. N. ; Wacławczyk, M. ; Oberlack, M. (2017)
Conformal invariance of the Lungren–Monin–Novikov equations for vorticity fields in 2D turbulence.
In: Journal of Physics A: Mathematical and Theoretical, 50 (43)
doi: 10.1088/1751-8121/aa8c69
Article, Bibliographie
Groß, M. ; Tupinamba Lima, M. ; Uhlig, M. ; Ebraheme, A. ; Roeber, O. ; Olschewski, B. ; Klitzing, R. von ; Schomäcker, R. ; Schwarze, M. (2017)
Biopolymers for dye removal via foam separation.
In: Separation and Purification Technology, 188
doi: 10.1016/j.seppur.2017.07.025
Article, Bibliographie
Ganter, Sebastian ; Heinrich, Arne ; Meier, Thorsten ; Kuenne, Guido ; Jainski, Christopher ; Rißmann, Martin C. ; Dreizler, Andreas ; Janicka, J. (2017)
Numerical analysis of laminar methane–air side-wall-quenching.
In: Combustion and Flame, 186
doi: 10.1016/j.combustflame.2017.08.017
Article, Bibliographie
Gao, Yangyang ; Müller-Plathe, Florian (2017)
Effect of grafted chains on the heat transfer between carbon nanotubes in a polyamide-6.6 matrix: A molecular dynamics study.
In: Polymer, 129
doi: 10.1016/j.polymer.2017.09.066
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
doi: 10.1007/978-3-658-16835-3_8
Conference or Workshop Item, Bibliographie
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017)
Towards Accelerated Usage Control based on Access Correlations.
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
Conference or Workshop Item, Bibliographie
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017)
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item, Bibliographie
Gronarz, Tim ; Schulze, Jan ; Laemmerhold, Mischka ; Graeser, Philipp ; Gorewoda, Jeanette ; Kez, Vitali ; Habermehl, Martin ; Schiemann, Martin ; Ströhle, Jochen ; Epple, Bernd ; Scherer, Viktor ; Kneer, Reinhold (2017)
Quantification of the influence of parameters determining radiative heat transfer in an oxy-fuel operated boiler.
In: Fuel Processing Technology, 157
doi: 10.1016/j.fuproc.2016.11.012
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon – Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017
doi: 10.1007/978-3-658-16835-3_8
Book Section, Bibliographie
Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016)
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1)
doi: 10.1016/j.jisa.2016.10.003
Article, Bibliographie
Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016)
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
doi: 10.1109/PST.2016.7906980
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016)
A security analysis of techniques for long-term integrity protection.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Stopczynski, Martin (2016)
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
Conference or Workshop Item, Bibliographie
Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016)
Semantic Security and Indistinguishability in the Quantum World.
doi: 10.1007/978-3-662-53015-3_3
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016)
Memorable And Secure: How Do You Choose Your PIN?
Frankfurt
Conference or Workshop Item, Bibliographie
Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Conference or Workshop Item, Bibliographie
Gründing, Dirk ; Fleckenstein, Stefan ; Bothe, Dieter (2016)
A subgrid-scale model for reactive concentration boundary layers for 3D mass transfer simulations with deformable fluid interfaces.
In: International Journal of Heat and Mass Transfer, 101
doi: 10.1016/j.ijheatmasstransfer.2016.04.119
Article, Bibliographie
Ghiglieri, Marco ; Waidner, Michael (2016)
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3)
Article, Bibliographie
Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016)
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
Saarbrucken
doi: 10.1109/EuroSP.2016.35
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016)
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
Report, Bibliographie
Gumprich, Werner ; Synek, B. ; Sadiki, A. (2016)
ASSESSMENT OF THE DIRECT QUADRATURE-BASED SECTIONAL METHOD OF MOMENTS FOR THE SIMULATION OF EVAPORATING POLYDISPERSE SPRAYS.
In: Atomization and Sprays, 26 (2)
Article, Bibliographie
Gao, Yangyang ; Mueller-Plathe, Florian (2016)
Increasing the Thermal Conductivity of Graphene-Polyamide-6,6 Nanocomposites by Surface-Grafted Polymer Chains: Calculation with Molecular Dynamics and Effective-Medium Approximation.
In: Journal of Physical Chemistry B, 120 (7)
Article, Bibliographie
Geissert, Matthias ; Hieber, Matthias ; Thieu Huy, Nguyen (2016)
A General Approach to Time Periodic Incompressible Viscous Fluid Flow Problems.
In: Archive for Rational Mechanics and Analysis, 220 (3)
Article, Bibliographie
Golzke, Hendrik ; Leick, Philippe ; Dreizler, Andreas (2016)
Differential infrared thermography of gasoline direct injection sprays.
In: Quantitative Infrared Thermography Journal, 13 (1)
Article, Bibliographie
Ganguly, Pritam ; Vegt, Nico F. A. van der ; Shea, Joan-Emma (2016)
Hydrophobic Association in Mixed Urea-TMAO Solutions.
In: Journal of Physical Chemistry Letters, 7 (15)
Article, Bibliographie
Guan, Lulu ; Yu, Haitao ; Shen, Jianqi ; Tropea, Cameron (2016)
Simulation of optical caustics associated with the tertiary rainbow of oblate droplets.
In: Applied Optics, 55 (23)
Article, Bibliographie
Göpfert, Florian (2016)
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Guo, Xiaogang ; Peng, Chong ; Wu, Wei ; Wang, Yongqi (2016)
A hypoplastic constitutive model for debris materials.
In: Acta Geotechnica, 11 (6)
doi: 10.1007/s11440-016-0494-0
Article, Bibliographie
Gerber, Nina
eds.: Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (2016)
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Conference or Workshop Item, Bibliographie
Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015)
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Conference or Workshop Item, Bibliographie
Gong, Liang ; Pradel, Michael ; Sen, Koushik (2015)
JITProf: pinpointing JIT-unfriendly JavaScript code.
Bergamo, Italy
doi: 10.1145/2786805.2786831
Conference or Workshop Item, Bibliographie
Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik (2015)
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
Baltimore, MD, USA
doi: 10.1145/2771783.2771809
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015)
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
Dreseden
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Conference or Workshop Item, Bibliographie
Günther, Felix ; Poettering, Bertram (2015)
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
Queensland University of Technology (QUT), Brisbane, Australia
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Müller, Jan (2015)
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Oswald, Florian (2015)
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
Conference or Workshop Item, Bibliographie
Gerber, Paul ; Volkamer, Melanie (2015)
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2)
doi: 10.1007/s11623-015-0375-y
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015)
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1)
doi: 10.1145/2738210.2738214
Article, Bibliographie
Ghiglieri, Marco (2015)
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
Las Vegas, NV
Conference or Workshop Item, Bibliographie
Ganguly, Pritam ; Hajari, Timir ; Shea, Joan-Emma ; Vegt, Nico F. A. van der (2015)
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment.
In: Journal of Physical Chemistry Letters, 6 (4)
Article, Bibliographie
Gatti, Davide ; Guettler, Andreas ; Frohnapfel, Bettina ; Tropea, Cameron (2015)
Experimental assessment of spanwise-oscillating dielectric electroactive surfaces for turbulent drag reduction in an air channel flow.
In: Experiments in Fluids, 56 (5)
Article, Bibliographie
Gambaryan-Roisman, Tatiana (2015)
Modulation of Marangoni convection in liquid films.
In: Advances in colloid and interface science, 222
Article, Bibliographie
Ganguly, Pritam ; Hajari, Timir ; Shea, Joan-Emma ; Vegt, Nico F. A. van der (2015)
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment (vol 6, pg 581, 2015).
In: Journal of Physical Chemistry Letters, 6 (23)
Article, Bibliographie
Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Conference or Workshop Item, Bibliographie
Günther, Felix ; Manulis, Mark ; Peter, Andreas
eds.: Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (2014)
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Heraklion, Crete, Greece
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco
eds.: Schiele, Otto ; Schön, Willi (2014)
HbbTV – aktueller Stand 2014.
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Cabarcas, Daniel
eds.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco (2014)
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
Report, Bibliographie
Ghiglieri, Marco (2014)
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy. San Jose, California (18.5.2014)
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014)
Personal DLP for Facebook.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815279
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Tews, Erik (2014)
A Privacy Protection System for HbbTV in Smart TVs.
Las Vegas, NV
doi: 10.1109/CCNC.2014.6866595
Conference or Workshop Item, Bibliographie
Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014)
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
eds.: Schiele, Otto ; Schön, Willi (2013)
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21-23 October, 2013)
Conference or Workshop Item, Bibliographie
Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013)
HbbTV - I Know What You Are Watching.
Conference or Workshop Item, Bibliographie
Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report, Bibliographie
Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013)
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
Conference or Workshop Item, Bibliographie
Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012)
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Amsterdam, The Netherlands
doi: 10.1109/SocialCom-PASSAT.2012.60
Conference or Workshop Item, Bibliographie
Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
eds.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012)
Technical Aspects of Online Privacy.
Report, Bibliographie
Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre (2012)
PeerSense: Who is near you?
Lugano, Switzerland
doi: 10.1109/PerComW.2012.6197553
Conference or Workshop Item, Bibliographie
Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
H
Hamacher, Kay ; Kussel, Tobias ; Schneider, Thomas ; Tkachenko, Oleksandr (2022)
PEA: Practical private epistasis analysis using MPC.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.-30.09.2022)
doi: 10.1007/978-3-031-17143-7_16
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias (2022)
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. San Antonio, USA (16.-19.05.2022)
doi: 10.1145/3507657.3528546
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.-13.08.2021)
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.–01.07.2021)
doi: 10.1145/3448300.3468251
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.–01.07.2021)
doi: 10.1145/3448300.3468252
Conference or Workshop Item, Bibliographie
Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Conference or Workshop Item, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2021)
Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations.
In: Behaviour & Information Technology
doi: 10.1080/0144929X.2021.1876167
Article, Bibliographie
Hassan, Sohaib S. ; Reuter, Christian ; Bzhalava, Levan (2021)
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs.
In: International Journal of Innovation Management, 25 (1)
doi: 10.1142/S136391962150002X
Article, Bibliographie
Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). virtual Conference (21.02.2021 -24.02.2021)
doi: 10.14722/ndss.2021.23159
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3)
doi: 10.2478/popets-2021-0045
Article, Bibliographie
Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021). virtual Conference (12.-16.07.2021)
Conference or Workshop Item, Bibliographie
Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira (2020)
Modular Collaborative Program Analysis in OPAL.
28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020). Virtual Conference (06.-16.11.2020)
doi: 10.1145/3368089.3409765
Conference or Workshop Item, Bibliographie
Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020)
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20). virtual Conference (14.-18.09.2020)
Conference or Workshop Item, Bibliographie
Hieber, Matthias ; Kozono, Hideo ; Seyfert, Anton ; Shimizu, Senjo ; Yanagisawa, Taku (2020)
The Helmholtz–Weyl decomposition of Lr vector fields for two dimensional exterior domains.
In: The Journal of Geometric Analysis, 2020
doi: 10.1007/s12220-020-00473-4
Article, Bibliographie
Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020)
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. VIRTUAL (July 08.-10., 2020)
doi: 10.1145/3395351.3399343
Conference or Workshop Item, Bibliographie
Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020)
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.-10.07.2020)
doi: 10.1145/3395351.3399423
Conference or Workshop Item, Bibliographie
Hieber, Matthias ; Stinner, Christian (2020)
Strong time periodic solutions to Keller-Segel systems: An approach by the quasilinear Arendt-Bu theorem.
In: Journal of Differential Equations, 269 (2)
doi: 10.1016/j.jde.2020.01.020
Article, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.-10.07.2020)
doi: 10.1145/3395351.3401796
Conference or Workshop Item, Bibliographie
Habibi, Nahal ; Christau, Stephanie ; Ochyl, Lukasz J. ; Fan, Zixing ; Hassani Najafabadi, Alireza ; Kuehnhammer, Matthias ; Zhang, Mengwen ; Helgeson, Matthew ; Klitzing, R. von ; Moon, James J. ; Lahann, Joerg (2020)
Engineered Ovalbumin Nanoparticles for Cancer Immunotherapy.
In: Advanced Therapeutics
doi: 10.1002/adtp.202000100
Article, Bibliographie
Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020)
A Programming Model for Semi-implicit Parallelization of Static Analyses.
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis. virtual Conference (18.-22.07.)
doi: 10.1145/3395363.3397367
Conference or Workshop Item, Bibliographie
Haussmann, Marc ; Ries, Florian ; Jeppener-Haltenhoff, Jonathan B. ; Li, Yongxiang ; Schmidt, Marius ; Welch, Cooper ; Illmann, Lars ; Böhm, Benjamin ; Nirschl, Hermann ; Krause, Mathias J. ; Sadiki, Amsini (2020)
Evaluation of a Near-Wall-Modeled Large Eddy Lattice Boltzmann Method for the Analysis of Complex Flows Relevant to IC Engines.
In: Computation, 8 (2)
doi: 10.3390/computation8020043
Article, Bibliographie
Herzog, Nicole ; Hübner, Hanna ; Rüttiger, Christian ; Gallei, Markus ; Andrieu-Brunsen, Annette (2020)
Functional Metalloblock Copolymers for the Preparation and In Situ Functionalization of Porous Silica Films.
In: Langmuir, 36 (15)
doi: 10.1021/acs.langmuir.0c00245
Article, Bibliographie
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
15. Internationale Tagung Wirtschaftsinformatik - Community Tracks. Potsdam, Germany (08.-11.03.2020)
doi: 10.30844/wi_2020_o2-haunschild
Conference or Workshop Item, Bibliographie
Hori, Yohei ; Bothe, Dieter ; Hayashi, Kosuke ; Hosokawa, Shigeo ; Tomiyama, Akio (2020)
Mass transfer from single carbon-dioxide bubbles in surfactant-electrolyte mixed aqueous solutions in vertical pipes.
In: International Journal of Multiphase Flow, 124
doi: 10.1016/j.ijmultiphaseflow.2020.103207
Article, Bibliographie
Hieber, Matthias ; Kajiwara, Naoto ; Kress, Klaus ; Tolksdorf, Patrick (2020)
The periodic version of the Da Prato–Grisvard theorem and applications to the bidomain equations with FitzHugh–Nagumo transport.
In: Annali di Matematica Pura ed Applicata, 199 (6)
doi: 10.1007/s10231-020-00975-6
Article, Bibliographie
Hardt, Steffen ; Hartmann, Johannes ; Zhao, Sicheng ; Bandopadhyay, Aditya (2020)
Electric-Field-Induced Pattern Formation in Layers of DNA Molecules at the Interface between Two Immiscible Liquids.
In: Physical Review Letters, 124 (6)
doi: 10.1103/PhysRevLett.124.064501
Article, Bibliographie
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020)
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020). San Diego, USA (23.-26. Febr.)
Conference or Workshop Item, Bibliographie
Henrich, Franziska ; Linke, Dorota ; Sauer, Hans Martin ; Dörsam, Edgar ; Hardt, Steffen ; Butt, Hans-Jürgen ; Auernhammer, Günter K. (2019)
Forced dynamic dewetting of structured surfaces: Influence of surfactants.
In: Physical Review Fluids, 4
doi: 10.1103/PhysRevFluids.4.124202
Article, Bibliographie
Hatakenaka, Ryuta ; Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron ; Tagawa, Yoshiyuki (2019)
Magic carpet breakup of a drop impacting onto a heated surface in a depressurized environment.
In: International Journal of Heat and Mass Transfer, 145
doi: 10.1016/j.ijheatmasstransfer.2019.118729
Article, Bibliographie
Haubner, Johannes ; Ulbrich, Michael ; Ulbrich, Stefan (2019)
Analysis of shape optimization problems for unsteady fluid-structure interaction.
In: Inverse Problems, 2019
doi: 10.1088/1361-6420/ab5a11
Article, Bibliographie
Hill, Simon ; Acher, Thomas ; Hoffmann, Rainer ; Ferstl, Johann ; Deising, Daniel ; Marschall, Holger ; Rehfeldt, Sebastian ; Klein, Harald (2019)
Quantifizierung der Trenneffizienz einer strukturierten Packung mittels numerischer Simulation.
In: Chemie Ingenieur Technik
doi: 10.1002/cite.201900041
Article, Bibliographie
Hartmann, Maximilian ; Fricke, Mathis ; Weimar, Lukas ; Gründing, Dirk ; Marić, Tomislav ; Bothe, Dieter ; Hardt, Steffen (2019)
Breakup dynamics of capillary bridges on hydrophobic stripes.
doi: 10.48550/arXiv.1910.01887
Report, Bibliographie
Heß, Julian ; Tai, Yih-Chin ; Wang, Yongqi (2019)
Debris flows with pore pressure and intergranular friction on rugged topography.
In: Computers & Fluids, 190
doi: 10.1016/j.compfluid.2019.06.015
Article, Bibliographie
Hark, Rhaban Simon (2019)
Monitoring Federated Softwarized Networks: Approaches for Efficient and Collaborative Data Collection in Large-Scale Software-Defined Networks.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Heidt, Margareta ; Gerlach, Jin ; Buxmann, Peter (2019)
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
Hawaii International Conference on System Sciences (HICSS). Wailea, USA (08.-11.01.2019)
Conference or Workshop Item, Bibliographie
Heidt, Margareta ; Olt, Christian M. ; Buxmann, Peter (2019)
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
Internationale Tagung Wirtschaftsinformatik. Siegen, Deutschland (24.02.2019-27.02.2019)
Conference or Workshop Item, Bibliographie
Heß, Julian ; Wang, Yongqi (2019)
On the role of pore-fluid pressure evolution and hypoplasticity in debris flows.
In: European Journal of Mechanics - B/Fluids, 74
doi: 10.1016/j.euromechflu.2018.09.005
Article, Bibliographie
Hänichen, Philipp ; Bender, Achim ; Voß, Bernhard ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2019)
Drop evaporation of hydrocarbon fluids with deposit formation.
In: International Journal of Heat and Mass Transfer, 128
doi: 10.1016/j.ijheatmasstransfer.2018.08.102
Article, Bibliographie
Hieber, Matthias ; Mahalov, Alex ; Takada, Ryo (2019)
Time periodic and almost time periodic solutions to rotating stratified fluids subject to large forces.
In: Journal of Differential Equations, 266 (2-3)
doi: 10.1016/j.jde.2018.07.067
Article, Bibliographie
Han, Wang ; Wang, Haiou ; Kuenne, Guido ; Hawkes, Evatt R. ; Chen, Jacqueline H. ; Janicka, Johannes ; Hasse, Christian (2019)
Large eddy simulation/dynamic thickened flame modeling of a high Karlovitz number turbulent premixed jet flame.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.228
Article, Bibliographie
Han, Wang ; Scholtissek, Arne ; Hasse, Christian (2019)
The role of tangential diffusion in evaluating the performance of flamelet models.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.171
Article, Bibliographie
Hartl, S. ; van Winkle, R. ; Geyer, D. ; Dreizler, A. ; Magnotti, G. ; Hasse, C. ; Barlow, R. S. (2019)
Assessing the relative importance of flame regimes in Raman/Rayleigh line measurements of turbulent lifted flames.
In: Proceedings of the Combustion Institute, 37 (2)
doi: 10.1016/j.proci.2018.06.067
Article, Bibliographie
Hartmann, Maximilian ; Hardt, Steffen (2019)
Stability of Evaporating Droplets on Chemically Patterned Surfaces.
In: Langmuir, 35 (14)
doi: 10.1021/acs.langmuir.9b00172
Article, Bibliographie
Haaf, Martin ; Ohlemüller, Peter ; Ströhle, Jochen ; Epple, Bernd (2019)
Techno-economic assessment of alternative fuels in second-generation carbon capture and storage processes.
In: Mitigation and Adaptation Strategies for Global Change
doi: 10.1007/s11027-019-09850-z
Article, Bibliographie
Hartwig, Katrin ; Reuter, Christian
ed.: Reuter, Christian (2019)
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.-27.9.2019)
Conference or Workshop Item, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2019)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (23.-27.02.2019)
Conference or Workshop Item, Bibliographie
Hill, H. ; Ding, C.-P. ; Baum, E. ; Böhm, B. ; Dreizler, A. ; Peterson, B. (2019)
An application of tomographic PIV to investigate the spray-induced turbulence in a direct-injection engine.
In: International Journal of Multiphase Flow, 121
doi: 10.1016/j.ijmultiphaseflow.2019.103116
Article, Bibliographie
Herzog, Nicole ; Brilmayer, Robert ; Stanzel, Mathias ; Kalyta, Anastasia ; Spiehl, Dieter ; Dörsam, Edgar ; Hess, Christian ; Andrieu-Brunsen, Annette (2019)
Gravure printing for mesoporous film preparation.
In: RSC Advances, 9 (41)
doi: 10.1039/C9RA04266K
Article, Bibliographie
Heidt, Margareta ; Gerlach, Jin (2018)
The Influence of SME Constraints in an Organizational IT Security Context.
International Conference on Information Systems (ICIS). San Francisco, USA (13.-16.12.2018)
Conference or Workshop Item, Bibliographie
Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018)
A unified lattice model and framework for purity analyses.
ASE 2018. Corum, Montpellier, France (3.-7.9.2018)
doi: 10.1145/3238147.3238226
Conference or Workshop Item, Bibliographie
Hutter, Kolumban ; Wang, Yongqi (2018)
Fluid and Thermodynamics. Volume 3: Structured and Multiphase
Fluids.
doi: 10.1007/978-3-319-77745-0
Book, Bibliographie
Humbert, Marcel Nikolas (2018)
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018)
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks. Denver,CO,USA (26.-29.06.2018)
Conference or Workshop Item, Bibliographie
Helm, Dominik (2018)
A Framework for Modular Purity Analyses.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Haaf, Martin ; Hilz, Jochen ; Helbig, Martin ; Weingärtner, Christoph ; Stallmann, Olaf ; Ströhle, Jochen ; Epple, Bernd (2018)
Assessment of the operability of a 20 MWth calcium looping demonstration plant by advanced process modelling.
In: International Journal of Greenhouse Gas Control, 75
doi: 10.1016/j.ijggc.2018.05.014
Article, Bibliographie
Hanreich, Matthias (2018)
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Hald, Martin (2018)
Cryptographic Analysis of the Bitmessage Protocol.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Heidt, Margareta (2018)
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
Article, Bibliographie
Heinrich, A. ; Ries, F. ; Kuenne, G. ; Ganter, S. ; Hasse, C. ; Sadiki, A. ; Janicka, J. (2018)
Large Eddy Simulation with tabulated chemistry of an experimental sidewall quenching burner.
In: International Journal of Heat and Fluid Flow, 71
doi: 10.1016/j.ijheatfluidflow.2018.03.011
Article, Bibliographie
Hofmann, Daniel (2018)
Charakterisierung von verschränkten Photonenpaaren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Heß, Julian ; Wang, Yongqi (2018)
Modeling Debris Flow: On The Influence Of Pore Pressure Evolution And Hypoplasticity.
In: International Journal of Computational Methods and Experimental Measurements, 6 (2)
doi: 10.2495/CMEM-V6-N2-385-397
Article, Bibliographie
Hill, S. ; Deising, D. ; Acher, T. ; Klein, H. ; Bothe, D. ; Marschall, H. (2018)
Boundedness-preserving implicit correction of mesh-induced errors for VOF based heat and mass transfer.
In: Journal of Computational Physics, 352
doi: 10.1016/j.jcp.2017.09.027
Article, Bibliographie
Han, Haoya ; Li, Li ; Yang, Qingsong ; Tian, Yuchuan ; Wang, Yunwei ; Ye, Zhishuang ; Klitzing, R. von ; Guo, Xuhong (2018)
Characterization of hollow silica–polyelectrolyte composite nanoparticles by small-angle X-ray scattering.
In: Journal of Materials Science, 53 (5)
doi: 10.1007/s10853-017-1747-5
Article, Bibliographie
Hänichen, Philipp ; Eyk, Maximilian van ; Stephan, Peter (2018)
Experimental investigations of fuel film evaporation with deposit formation.
In: International Journal of Heat and Fluid Flow, 70
doi: 10.1016/j.ijheatfluidflow.2018.02.001
Article, Bibliographie
Hartl, Sandra ; Geyer, Dirk ; Dreizler, Andreas ; Magnotti, Gaetano ; Barlow, Robert S. ; Hasse, Christian (2018)
Regime identification from Raman/Rayleigh line measurements in partially premixed flames.
In: Combustion and Flame, 189
doi: 10.1016/j.combustflame.2017.10.024
Article, Bibliographie
Hellwig, Johannes ; Strebe, Julia ; Klitzing, R. von (2018)
Effect of environmental parameters on the nano mechanical properties of hyaluronic acid/poly(l-lysine) multilayers.
In: Physical Chemistry Chemical Physics, 20 (28)
doi: 10.1039/c8cp02621a
Article, Bibliographie
Hieber, Matthias ; Prüss, Jan (2018)
On the bidomain problem with FitzHugh–Nagumo transport.
In: Archiv der Mathematik, 111 (3)
doi: 10.1007/s00013-018-1188-7
Article, Bibliographie
Hajduk, Andreas ; Lebedev, Mikhail V. ; Kaiser, Bernhard ; Jaegermann, Wolfram (2018)
Interaction of liquid water with the p-GaInP2(100) surface covered with submonolayer oxide.
In: Physical Chemistry Chemical Physics, 20 (32)
doi: 10.1039/c8cp03337d
Article, Bibliographie
Heinrich, Arne ; Kuenne, Guido ; Ganter, Sebastian ; Hasse, Christian ; Janicka, J. (2018)
Investigation of the Turbulent Near Wall Flame Behavior for a Sidewall Quenching Burner by Means of a Large Eddy Simulation and Tabulated Chemistry.
In: Fluids, 3 (3)
doi: 10.3390/fluids3030065
Article, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017)
Password Assistance.
Karlstad, Sweden
Conference or Workshop Item, Bibliographie
Holl, M. ; Rausch, L. ; Pelz, P. F. (2017)
New methods for new systems – How to find the techno-economically optimal hydrogen conversion system.
In: International Journal of Hydrogen Energy, 42 (36)
doi: 10.1016/j.ijhydene.2017.07.061
Article, Bibliographie
Haaf, Martin ; Stroh, Alexander ; Hilz, Jochen ; Helbig, Martin ; Ströhle, Jochen ; Epple, Bernd (2017)
Process Modelling of the Calcium Looping Process and Validation Against 1 MWth Pilot Testing.
In: Energy Procedia, 114
doi: 10.1016/j.egypro.2017.03.1159
Article, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017)
Update-tolerant and Revocable Password Backup.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Conference or Workshop Item, Bibliographie
Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira (2017)
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
San Jose, CA, USA
Conference or Workshop Item, Bibliographie
Holzer, Patrick (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Heß, Julian ; Wang, Yongqi ; Hutter, Kolumban (2017)
Thermodynamically consistent modeling of granular-fluid mixtures incorporating pore pressure evolution and hypoplastic behavior.
In: Continuum Mechanics and Thermodynamics, 29 (1)
doi: 10.1007/s00161-016-0535-9
Article, Bibliographie
Horn, Benjamin M. ; Luethen, H. ; Pfetsch, M. E. ; Ulbrich, S. (2017)
Geometry and topology optimization of sheet metal profiles by using a branch-and-bound framework.
In: Materialwissenschaft Und Werkstofftechnik, 48 (1)
Article, Bibliographie
Han, Haoxue ; Merabia, Samy ; Muller-Plathe, Florian (2017)
Thermal Transport at Solid-Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The journal of physical chemistry letters, 8
Article, Bibliographie
Hieber, Matthias ; Saito, Hirokazu (2017)
Strong solutions for two-phase free boundary problems for a class of non-Newtonian fluids.
In: Journal of Evolution Equations, 17 (1)
Article, Bibliographie
Han, Haoxue ; Mérabia, Samy ; Müller-Plathe, Florian (2017)
Thermal Transport at Solid–Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The Journal of Physical Chemistry Letters, 8 (9)
doi: 10.1021/acs.jpclett.7b00227
Article, Bibliographie
Han, Haoxue ; Schlawitschek, Christiane ; Katyal, Naman ; Stephan, Peter ; Gambaryan-Roisman, Tatiana ; Leroy, Frédéric ; Müller-Plathe, Florian (2017)
Solid–Liquid Interface Thermal Resistance Affects the Evaporation Rate of Droplets from a Surface: A Study of Perfluorohexane on Chromium Using Molecular Dynamics and Continuum Theory.
In: Langmuir, 33 (21)
doi: 10.1021/acs.langmuir.7b01410
Article, Bibliographie
Han, Haoxue ; Merabia, Samy ; Müller-Plathe, Florian (2017)
Thermal transport at a solid–nanofluid interface: from increase of thermal resistance towards a shift of rapid boiling.
In: Nanoscale, 9 (24)
doi: 10.1039/c7nr01215b
Article, Bibliographie
Hansmann, Stefanie ; Schmidts, Volker ; Thiele, Christina M. (2017)
Synthesis of Poly-γ-S -2-methylbutyl-l -glutamate and Poly-γ-S -2-methylbutyl-d -glutamate and Their Use as Enantiodiscriminating Alignment Media in NMR Spectroscopy.
In: Chemistry - A European Journal, 23 (38)
doi: 10.1002/chem.201700699
Article, Bibliographie
Heid, Maurice ; Knoche, Stefan ; Gora, Niklas ; Ohlig, Dominik ; Drochner, Alfons ; Etzold, Bastian J. M. ; Vogel, Herbert (2017)
Dynamics of Bulk Oxygen in the Selective Oxidation of Acrolein.
In: ChemCatChem, 9 (12)
doi: 10.1002/cctc.201700124
Article, Bibliographie
Herdel, Philipp ; Krause, David ; Peters, Jens ; Kolmorgen, Brigga ; Ströhle, Jochen ; Epple, Bernd (2017)
Experimental investigations in a demonstration plant for fluidized bed gasification of multiple feedstock’s in 0.5 MWth scale.
In: Fuel, 205
doi: 10.1016/j.fuel.2017.05.058
Article, Bibliographie
He, Chao ; Leudesdorff, Wibke ; Di Mare, Francesca ; Sadiki, Amsini ; Janicka, J. (2017)
Analysis of In-cylinder Flow Field Anisotropy in IC Engine using Large Eddy Simulation.
In: Flow, Turbulence and Combustion, 99 (2)
doi: 10.1007/s10494-017-9812-3
Article, Bibliographie
Honza, Rene ; Ding, Carl-Philipp ; Dreizler, Andreas ; Böhm, Benjamin (2017)
Flame imaging using planar laser induced fluorescence of sulfur dioxide.
In: Applied Physics B, 123 (9)
doi: 10.1007/s00340-017-6823-7
Article, Bibliographie
Hieber, Matthias ; Prüss, Jan (2017)
Dynamics of the Ericksen–Leslie equations with general Leslie stress I: the incompressible isotropic case.
In: Mathematische Annalen, 369 (3-4)
doi: 10.1007/s00208-016-1453-7
Article, Bibliographie
Hilz, Jochen ; Helbig, Martin ; Haaf, Martin ; Daikeler, Alexander ; Ströhle, Jochen ; Epple, Bernd (2017)
Long-term pilot testing of the carbonate looping process in 1 MWth scale.
In: Fuel, 210
doi: 10.1016/j.fuel.2017.08.105
Article, Bibliographie
He, Chao ; Kuenne, Guido ; Yildar, Esra ; Oijen, Jeroen van ; Di Mare, Francesca ; Sadiki, Amsini ; Ding, Carl-Philipp ; Baum, Elias ; Peterson, Brian ; Böhm, Benjamin ; Janicka, J. (2017)
Evaluation of the flame propagation within an SI engine using flame imaging and LES.
In: Combustion Theory and Modelling, 21 (6)
doi: 10.1080/13647830.2017.1343498
Article, Bibliographie
Hietzschold, Sebastian ; Hillebrandt, Sabina ; Ullrich, Florian ; Bombsch, Jakob ; Rohnacher, Valentina ; Ma, Shuangying ; Liu, Wenlan ; Köhn, Andreas ; Jaegermann, Wolfram ; Pucci, Annemarie ; Kowalsky, Wolfgang ; Mankel, Eric ; Beck, Sebastian ; Lovrincic, Robert (2017)
Functionalized Nickel Oxide Hole Contact Layers: Work Function versus Conductivity.
In: ACS Applied Materials & Interfaces, 9 (45)
doi: 10.1021/acsami.7b12784
Article, Bibliographie
Hosseinzadeh, Arash ; Sadiki, Amsini ; Di Mare, Francesca ; Janicka, J. (2017)
Effects of subgrid scale and combustion modelling on flame structure of a turbulent premixed flame within LES and tabulated chemistry framework.
In: Combustion Theory and Modelling, 21 (5)
doi: 10.1080/13647830.2017.1305514
Article, Bibliographie
Huang, Shilin ; Gawlitza, Kornelia ; Klitzing, R. von ; Steffen, Werner ; Auernhammer, Günter K. (2017)
Structure and Rheology of Microgel Monolayers at the Water/Oil Interface.
In: Macromolecules, 50 (9)
doi: 10.1021/acs.macromol.6b02779
Article, Bibliographie
Han, Haoya ; Li, Li ; Tian, Yuchuan ; Wang, Yunwei ; Ye, Zhishuang ; Yang, Qingsong ; Wang, Yiming ; Klitzing, R. von ; Guo, Xuhong (2017)
Spherical polyelectrolyte nanogels as templates to prepare hollow silica nanocarriers: observation by small angle X-ray scattering and TEM.
In: RSC Adv., 7 (76)
doi: 10.1039/C7RA10011F
Article, Bibliographie
Han, Haoya ; Li, Li ; Wang, Weihua ; Tian, Yuchuan ; Wang, Yunwei ; Wang, Junyou ; Klitzing, R. von ; Guo, Xuhong (2017)
Core–Shell–Corona Silica Hybrid Nanoparticles Templated by Spherical Polyelectrolyte Brushes: A Study by Small Angle X-ray Scattering.
In: Langmuir, 33 (38)
doi: 10.1021/acs.langmuir.7b02239
Article, Bibliographie
Hajian, Soheil ; Hintermüller, Michael ; Ulbrich, Stefan (2017)
Total variation diminishing schemes in optimal control of scalar conservation laws.
In: IMA Journal of Numerical Analysis, 39 (1)
doi: 10.1093/imanum/drx073
Article, Bibliographie
Huss, Sorin ; Stein, Oliver (2017)
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules.
In: Journal of Low Power Electronics and Applications, 7 (1)
doi: 10.3390/jlpea7010004
Article, Bibliographie
Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016)
Stratum Filtering: Cloud-Based Detection of Attack Sources.
Vienna, Austria
Conference or Workshop Item, Bibliographie
Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016)