TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z | Á | Č
Number of items at this level (without sub-levels): 2194.

A

Almoslh, Adel ; Alobaid, Falah ; Heinze, Christian ; Epple, Bernd (2021):
Comparison of Equilibrium-Stage and Rate-Based Models of a Packed Column for Tar Absorption Using Vegetable Oil. (Publisher's Version)
In: Applied Sciences, 10 (7), pp. 1-23. MDPI, ISSN 2076-3417,
DOI: 10.26083/tuprints-00017516,
[Article]

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Maffei, Matteo ; Moreno-Sanchez, Pedro (2021):
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Afkhami, S. ; Gambaryan-Roisman, T. ; Pismen, L. M. (2020):
Challenges in nanoscale physics of wetting phenomena.
In: The European Physical Journal Special Topics, 229 (10), pp. 1735-1738. Springer, ISSN 1951-6355,
DOI: 10.1140/epjst/e2020-000167-4,
[Article]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020):
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1), Association for Computing Machinery, ISSN 2471-2566,
DOI: 10.1145/3406112,
[Article]

Al-Falahi, Adil ; Alobaid, Falah ; Epple, Bernd (2020):
A New Design of an Integrated Solar Absorption Cooling System Driven by an Evacuated Tube Collector: A Case Study for Baghdad, Iraq.
In: Applied Sciences, 10 (10), p. 3622. ISSN 2076-3417,
DOI: 10.3390/app10103622,
[Article]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020):
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
pp. 332-341, ACM, 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), virtual Conference, 30.03.-03.04., ISBN 978-1-4503-6866-7,
DOI: 10.1145/3341105.3374020,
[Conference or Workshop Item]

Almoslh, Adel ; Alobaid, Falah ; Heinze, Christian ; Epple, Bernd (2020):
Comparison of Equilibrium-Stage and Rate-Based Models of a Packed Column for Tar Absorption Using Vegetable Oil.
In: Applied Sciences, 10 (7), p. 2362. MDPI, ISSN 2076-3417,
DOI: 10.3390/app10072362,
[Article]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
pp. 484-502, Springer, 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., ISBN 978-3-030-51279-8,
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
pp. 41-61, Springer, The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., ISBN 978-3-030-55303-6,
[Conference or Workshop Item]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Conference or Workshop Item]

Appel, Christian ; Kuttich, Björn ; Stühn, Lukas ; Stark, Robert W. ; Stühn, Bernd (2019):
Structural Properties and Magnetic Ordering in 2D Polymer Nanocomposites: Existence of Long Magnetic Dipolar Chains in Zero Field.
In: Langmuir, 35 (37), pp. 12180-12191. American Chemical Society (ACS), ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.9b02094,
[Article]

Ashihmin, Alexander ; Piskunov, Maxim ; Roisman, Ilia ; Yanovsky, Vycheslav (2019):
Thermal stability control of the water-in-diesel microemulsion fuel produced by using a nonionic surfactant combined with aliphatic alcohols.
In: Journal of Dispersion Science and Technology, pp. 1-8. Taylor & Francis online, ISSN 0193-2691,
DOI: 10.1080/01932691.2019.1634583,
[Article]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories,
k.A., IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Conference or Workshop Item]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Antritter, Thomas ; Hachmann, Peter ; Gambaryan-Roisman, Tatiana ; Buck, Bernhard ; Stephan, Peter (2019):
Spreading of Micrometer-Sized Droplets under the Influence of Insoluble and Soluble Surfactants: A Numerical Study.
In: Colloids and Interfaces, 3 (3), p. 56. Molecular Diversity Preservation International (MDPI), ISSN 2504-5377,
DOI: 10.3390/colloids3030056,
[Article]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-23,
[Conference or Workshop Item]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018,
11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Conference or Workshop Item]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
pp. 49-54, ACM, IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, 2 (7), MDPI, DOI: 10.3390/cryptography2020007,
[Article]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3), MDPI, ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Article]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Alobaid, Falah ; Al-Maliki, Wisam Abed Kattea ; Lanz, Thomas ; Haaf, Martin ; Brachthäuser, Andreas ; Epple, Bernd ; Zorbach, Ingo (2018):
Dynamic simulation of a municipal solid waste incinerator.
In: Energy, 149, pp. 230-249. ISSN 03605442,
DOI: 10.1016/j.energy.2018.01.170,
[Article]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Master Thesis]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: arxiv, In: CoRR, abs/1801.05764, [Article]

Aygüler, Meltem F. ; Hufnagel, Alexander G. ; Rieder, Philipp ; Wussler, Michael ; Jaegermann, Wolfram ; Bein, Thomas ; Dyakonov, Vladimir ; Petrus, Michiel L. ; Baumann, Andreas ; Docampo, Pablo (2018):
Influence of Fermi Level Alignment with Tin Oxide on the Hysteresis of Perovskite Solar Cells.
In: ACS Applied Materials & Interfaces, 10 (14), pp. 11414-11419. ISSN 1944-8244,
DOI: 10.1021/acsami.8b00990,
[Article]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. ; Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Article]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1. ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Article]

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Conference or Workshop Item]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology,
Springer, [Conference or Workshop Item]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Master Thesis]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
pp. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Conference or Workshop Item]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Conference or Workshop Item]

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, pp. 546-553,
IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Conference or Workshop Item]

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, pp. 1217-1234,
USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Conference or Workshop Item]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session,
Berkeley, CA, USENIX Association, USENIX Security Symposium, Vancouver, Canada, August 16-18, 2017, [Conference or Workshop Item]

Ariyanto, Teguh ; Kern, Andreas M. ; Etzold, Bastian J. M. ; Zhang, Gui-Rong (2017):
Carbide-derived carbon with hollow core structure and its performance as catalyst support for methanol electro-oxidation.
In: Electrochemistry Communications, 82, pp. 12-15. Elsevier, ISSN 13882481,
DOI: 10.1016/j.elecom.2017.07.010,
[Article]

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day, Nürnberg, Germany, 01.-02.06.2017, [Conference or Workshop Item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), pp. 805-858. Springer, DOI: 10.1007/s00145-016-9236-6,
[Article]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), pp. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Article]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615), pp. 1-37. International Association for Cryptologic Research (IACR), [Article]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Alam, Ehsanul ; Yadav, S. ; Schneider, J. ; Gambaryan-Roisman, Tatiana (2017):
Imbibition of water into substrates prepared by thermal treatment of polydimethylsiloxane layers.
In: Colloids and Surfaces a-Physicochemical and Engineering Aspects, 521, pp. 69-77. ISSN 0927-7757,
[Article]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing,
New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference or Workshop Item]

Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew (2017):
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
In: 13th IEEE International Conference on Advanced and Trusted Computing, pp. 414-422,
ISBN 9781509027705,
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077,
[Conference or Workshop Item]

Avdic, Amer ; Kuenne, Guido ; di Mare, Francesca ; Janicka, J. (2017):
LES combustion modeling using the Eulerian stochastic field method coupled with tabulated chemistry.
In: Combustion and Flame, 175, pp. 201-219. ISSN 0010-2180,
[Article]

Alobaid, Falah ; Mertens, Nicolas ; Starkloff, Ralf ; Lanz, Thomas ; Heinze, Christian ; Epple, Bernd (2017):
Progress in dynamic simulation of thermal power plants.
In: Progress in Energy and Combustion Science, 59, pp. 79-162. ISSN 0360-1285,
[Article]

Angelberger, C. ; Nicollet, Franck ; Krüger, Christian ; Schorr, Jürgen ; Nicoud, Edouard ; Colin, Olivier ; Angelberger, Christian ; Bode, Johannes ; Böhm, Benjamin (2017):
A PIV-Guided Large-Eddy Simulation of In-Cylinder Flows.
In: Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles, 72 (5), p. 28. ISSN 1294-4475,
DOI: 10.2516/ogst/2017022,
[Article]

Acosta, Matias ; Detsch, Rainer ; Grünewald, Alina ; Rojas, Virginia ; Schultheiß, Jan ; Wajda, Aleksandra ; Stark, Robert W. ; Narayan, Suman ; Sitarz, Maciej ; Koruza, Jurij ; Boccaccini, Aldo R. (2017):
Cytotoxicity, chemical stability, and surface properties of ferroelectric ceramics for biomaterials.
In: Journal of the American Ceramic Society, 101 (1), pp. 440-449. ISSN 00027820,
DOI: 10.1111/jace.15193,
[Article]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES),
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arzt, Steven ; Bodden, Eric (2016):
StubDroid: automatic inference of precise data-flow summaries for the android framework.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 725-735,
ACM, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884816,
[Conference or Workshop Item]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, p. 10,
Springer, Fes, Morocco, [Conference or Workshop Item]

Alber, Gernot ; Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, 672, IOP Publishing Ltd., ISSN 1742-6596,
DOI: 10.1088/1742-6596/672/1/012004,
[Article]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, pp. 155-168,
Springer, Koper, Slovenia, [Conference or Workshop Item]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Al-Maliki, Wisam Abed Kattea ; Alobaid, Falah ; Kez, Vitali ; Epple, Bernd (2016):
Modelling and dynamic simulation of a parabolic trough power plant.
In: Journal of Process Control, 26, pp. 123-138. ISSN 0959-1524,
[Article]

Avdic, A. ; Kuenne, G. ; Janicka, J. (2016):
Flow Physics of a Bluff-Body Swirl Stabilized Flame and their Prediction by Means of a Joint Eulerian Stochastic Field and Tabulated Chemistry Approach.
In: Flow Turbulence and Combustion, 97 (4), pp. 1185-1210. ISSN 1386-6184,
[Article]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, pp. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Book Section]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Albert, C. ; Kromer, Johannes ; Robertson, A. M. ; Bothe, D. (2015):
Dynamic behaviour of buoyant high viscosity droplets rising in a quiescent liquid.
In: Journal of Fluid Mechanics, 778, pp. 485-533. ISSN 0022-1120,
[Article]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Conference or Workshop Item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]

Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko (2015):
Hybrid Monitors for Concurrent Noninterference.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), pp. 137-151,
IEEE Computer Society, Verona, Italy, ISBN 978-1-4673-7539-9,
DOI: 10.1109/CSF.2015.17,
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Bachelor Thesis]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master Thesis]

Acosta, Matias ; Liu, Na ; Deluca, Marco ; Heidt, Sabrina ; Ringl, Ines ; Dietz, Christian ; Stark, Robert W. ; Jo, Wook (2015):
Tailoring ergodicity through selective A-site doping in the Bi1/2Na1/2TiO3–Bi1/2K1/2TiO3 system.
In: Journal of Applied Physics, 117 (13), pp. 134106(1-8). AIP Publishing, ISSN 0021-8979,
[Article]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 430-454,
Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 673-701,
Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015):
Evaluation of User Feedback in Smart Home for Situational Context Identification.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 20-25,
IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8426-8,
DOI: 10.1109/PERCOMW.2015.7133987,
[Conference or Workshop Item]

Abele, Eberhard ; Stoffregen, Hanns Alexander ; Kniepkamp, Michael ; Lang, Sebastian ; Hampe, Manfred (2015):
Selective laser melting for manufacturing of thin-walled porous elements.
In: Journal of Materials Processing Technology, 215, pp. 114-122. ISSN 0924-0136,
[Article]

Alobaid, Falah ; Starkloff, Ralf ; Pfeiffer, Stefan ; Karner, Karl ; Epple, Bernd ; Kim, Hyun-Gee (2015):
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part A: Part loads and off-design operation.
In: Fuel, 153, pp. 692-706. ISSN 0016-2361,
[Article]

Alobaid, Falah ; Starkloff, Ralf ; Pfeiffer, Stefan ; Karner, Karl ; Epple, Bernd ; Kim, Hyun-Gee (2015):
A comparative study of different dynamic process simulation codes for combined cycle power plants - Part B: Start-up procedure.
In: Fuel, 153, pp. 707-716. ISSN 0016-2361,
[Article]

Aghajari, Nima ; Schaefer, Michael (2015):
Efficient shape optimization for fluid-structure interaction problems.
In: Journal of Fluids and Structures, 57, pp. 298-313. ISSN 0889-9746,
[Article]

Abe, Ken ; Giga, Yoshikazu ; Hieber, Matthias (2015):
STOKES RESOLVENT ESTIMATES IN SPACES OF BOUNDED FUNCTIONS.
In: Annales Scientifiques De L Ecole Normale Superieure, 48 (3), pp. 537-559. ISSN 0012-9593,
[Article]

Alobaid, Falah ; Ohlemueller, Peter ; Stroehle, Jochen ; Epple, Bernd (2015):
Extended Euler-Euler model for the simulation of a 1 MWth chemical-looping pilot plant.
In: Energy, 93, pp. 2395-2405. ISSN 0360-5442,
[Article]

Ardham, Vikram Reddy ; Deichmann, Gregor ; van der Vegt, Nico F. A. ; Leroy, Frederic (2015):
Solid-liquid work of adhesion of coarse-grained models of n-hexane on graphene layers derived from the conditional reversible work method.
In: The Journal of chemical physics, 143 (24), p. 243135. ISSN 0021-9606,
[Article]

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 942-953,
Scottsdale, AZ, USA, [Conference or Workshop Item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, 8712, In: Computer Security - ESORICS 2014, pp. 76-93, Springer International Publishing, ISBN 978-3-319-11202-2,
DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]

Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, pp. 288-298,
DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science, 8383, In: Public-Key Cryptography PKC 2014, pp. 556-573,
[Conference or Workshop Item]

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 9, San Rafael, Morgan & Claypool, ISBN 9781627050975,
DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013,
Seoul, Korea, [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013,
University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2), pp. 209-232. [Article]

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3,
[Article]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), pp. 234-251,
Springer, [Conference or Workshop Item]

B

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]

Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2020):
A fully coupled numerical model for deposit formation from evaporating urea-water drops.
In: International Journal of Heat and Mass Transfer, 159, p. 120069. Elsevier, ISSN 00179310, e-ISSN 18792189,
DOI: 10.1016/j.ijheatmasstransfer.2020.120069,
[Article]

Bothe, Dieter (2020):
Reflections on the article “Moving contact lines and dynamic contact angles: a ‘litmus test’ for mathematical models and some new challenges” by Yulii D. Shikhmurzaev.
In: The European Physical Journal Special Topics, 229 (10), pp. 1979-1987. Springer, ISSN 1951-6355,
DOI: 10.1140/epjst/e2020-000149-6,
[Article]

Bothe, Dieter (2020):
On moving hypersurfaces and the discontinuous ODE-system associated with two-phase flows.
In: Nonlinearity, 33 (10), pp. 5425-5456. IOP Publishing, ISSN 0951-7715,
DOI: 10.1088/1361-6544/ab987d,
[Article]

Brulin, Sebastian ; Roisman, Ilia V. ; Tropea, Cameron (2020):
Fingering instability of a viscous liquid bridge stretched by an accelerating substrate.
In: Journal of Fluid Mechanics, 899, ISSN 0022-1120,
DOI: 10.1017/jfm.2020.422,
[Article]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Brilmayer, Robert ; Förster, Claire ; Zhao, Lucy ; Andrieu-Brunsen, Annette (2020):
Recent trends in nanopore polymer functionalization.
In: Current Opinion in Biotechnology, 63, pp. 200-209. Elsevier, ISSN 09581669,
DOI: 10.1016/j.copbio.2020.03.005,
[Article]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Brulin, Sebastian ; Tropea, Cameron ; Roisman, Ilia V. (2020):
Pinch-off of a viscous liquid bridge stretched with high Reynolds numbers.
587, In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 2020, p. 124271. Elsevier, ISSN 09277757,
DOI: 10.1016/j.colsurfa.2019.124271,
[Article]

Brilmayer, Robert ; Kübelbeck, Sonja ; Khalil, Adnan ; Brodrecht, Martin ; Kunz, Ulrike ; Kleebe, Hans‐Joachim ; Buntkowsky, Gerd ; Baier, Grit ; Andrieu‐Brunsen, Annette (2020):
Influence of Nanoconfinement on the pKa of Polyelectrolyte Functionalized Silica Mesopores.
In: Advanced Materials Interfaces, 2020, p. 1901914. Wiley, e-ISSN 2196-7350,
DOI: 10.1002/admi.201901914,
[Article]

Bauer, Andreas ; Bopp, Maximilian ; Jakirlic, Suad ; Tropea, Cameron ; Krafft, Axel Joachim ; Shokina, Nina ; Hennig, Jürgen (2020):
Analysis of the wall shear stress in a generic aneurysm under pulsating and transitional flow conditions.
61, In: Experiments in Fluids, (2), p. 59. Springer, ISSN 0723-4864, e-ISSN 1432-1114,
DOI: 10.1007/s00348-020-2901-4,
[Article]

Burzynski, David A. ; Roisman, Ilia V. ; Bansmer, Stephan E. (2020):
On the splashing of high-speed drops impacting a dry surface.
In: Journal of Fluid Mechanics, 892, ISSN 0022-1120,
DOI: 10.1017/jfm.2020.168,
[Article]

Baier, Tobias ; Hardt, Steffen (2020):
Gas separation in a Knudsen pump inspired by a Crookes radiometer.
24, In: Microfluidics and Nanofluidics, (6), ISSN 1613-4982,
DOI: 10.1007/s10404-020-02342-6,
[Article]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference or Workshop Item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020):
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020), virtual Conference, 19.-23.10., [Conference or Workshop Item]

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference or Workshop Item]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Boyaciyan, Dikran ; von Klitzing, R. (2019):
Stimuli-responsive polymer/metal composites: From fundamental research to self-regulating devices.
44, In: Current Opinion in Colloid & Interface Science, 2019, pp. 193-207. ISSN 1359-0294,
DOI: 10.1016/j.cocis.2019.10.005,
[Article]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Report]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, p. 16. SpringerOpen, DOI: 10.1186/s13635-019-0099-x,
[Article]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Bodenstein, Christina ; Sauer, Hans Martin ; Hirmer, Katrin ; Dörsam, Edgar (2019):
Printing process and characterization of fully pad printed electroluminescent panels on curved surfaces.
16, In: Journal of Coatings Technology and Research, 2019 (6), pp. 1673-1681. Springer US, ISSN 1547-0091,
DOI: 10.1007/s11998-019-00243-0,
[Article]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, pp. 535-542,
Springer, Faro, Portugal, 12.-14.06.2019, DOI: 10.1007/978-3-030-22750-0_48,
[Conference or Workshop Item]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), pp. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Baumli, Philipp ; Teisala, Hannu ; Bauer, Hoimar ; Garcia‐Gonzalez, Diana ; Damle, Viraj ; Geyer, Florian ; D'Acunzi, Maria ; Kaltbeitzel, Anke ; Butt, Hans‐Jürgen ; Vollmer, Doris (2019):
Flow‐Induced Long‐Term Stable Slippery Surfaces.
In: Advanced Science, p. 1900019. ISSN 2198-3844,
DOI: 10.1002/advs.201900019,
[Article]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Butz, David ; Hartl, Sandra ; Popp, Sebastian ; Walther, Steffen ; Barlow, Robert S. ; Hasse, Christian ; Dreizler, Andreas ; Geyer, Dirk (2019):
Local flame structure analysis in turbulent CH4/air flames with multi-regime characteristics.
In: Combustion and Flame, 210, pp. 426 - 438. Elsevier, ISSN 0010-2180,
DOI: 10.1016/j.combustflame.2019.08.032,
[Article]

Becker, Lukas G. ; von Langenthal, Thomas ; Pielsticker, Stefan ; Böhm, Benjamin ; Kneer, Reinhold ; Dreizler, Andreas (2019):
Experimental investigation of particle-laden flows in an oxy-coal combustion chamber for non-reacting conditions.
In: Fuel, 235, pp. 753-762. ISSN 00162361,
DOI: 10.1016/j.fuel.2018.08.076,
[Article]

Bender, Achim ; Stroh, Alexander ; Frohnapfel, Bettina ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2019):
Combined direct numerical simulation and long-wave simulation of a liquid film sheared by a turbulent gas flow in a channel.
In: Physics of Fluids, 31 (2), pp. 022103. DOI: 10.1063/1.5064423,
[Article]

Brumm, Pauline ; Sauer, Hans Martin ; Dörsam, Edgar (2019):
Scaling Behavior of Pattern Formation in the Flexographic Ink Splitting Process.
In: Colloids and Interfaces, 3 (1), p. 37. ISSN 2504-5377,
DOI: 10.3390/colloids3010037,
[Article]

Bürkle, Sebastian ; Becker, Lukas G. ; Agizza, Maria A. ; Dreizler, Andreas ; Wagner, Steven (2019):
Comparison of two measurement strategies to obtain the residence time distribution in combustion chambers using tunable diode laser absorption spectroscopy.
In: Applied Optics, 58 (10), pp. C36. ISSN 1559-128X,
DOI: 10.1364/ao.58.000c36,
[Article]

Bruce, Ellen E. ; Bui, Pho T. ; Rogers, Bradley A. ; Cremer, Paul S. ; van der Vegt, Nico F. A. (2019):
Nonadditive Ion Effects Drive Both Collapse and Swelling of Thermoresponsive Polymers in Water.
In: Journal of the American Chemical Society, 141 (16), pp. 6609-6616. ISSN 0002-7863,
DOI: 10.1021/jacs.9b00295,
[Article]

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André
Meyer-Aurich, A. (ed.) (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: Gesellschaft für Informatik: GI-Edition / Proceedings, 287, In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, pp. 25-30,
Bonn, Gesellschaft für Informatik, 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19.2.2019, ISBN 978-3-88579-681-7,
[Conference or Workshop Item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Article]

Bansarkhani, Rachid El (2019):
LARA - A Design Concept for Lattice-based Encryption.
pp. 377-395, FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Conference or Workshop Item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Conference or Workshop Item]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), pp. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]

Baier, Tobias ; Tiwari, Sudarshan ; Shrestha, Samir ; Klar, Axel ; Hardt, Steffen (2018):
Thermophoresis of Janus particles at large Knudsen numbers.
In: Physical Review Fluids, 3 (094202), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.094202,
[Article]

Bansarkhani, Rachid El (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Butt, Hans-Jürgen ; Berger, Rüdiger ; Steffen, Werner ; Vollmer, Doris ; Weber, Stefan A. L. (2018):
Adaptive Wetting – Adaptation in Wetting.
In: Langmuir, 34 (38), pp. 11292-11304. ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.8b01783,
[Article]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor Thesis]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium, [Conference or Workshop Item]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master Thesis]

Bender, Achim ; Hänichen, Philipp ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018):
Modeling Crystallization and Heat Transfer in an Evaporating Urea-Water Drop.
In: IHTC 16 - International Heat Transfer Conference 16 Digital Libary, August 10-15, Beijing, China, Begellhouse, ISSN 2377-424X,
DOI: 10.1615/IHTC16,
[Article]

Backes, Sebastian ; von Klitzing, R. (2018):
Nanomechanics and Nanorheology of Microgels at Interfaces.
In: Polymers, 10 (9), p. 978. ISSN 2073-4360,
DOI: 10.3390/polym10090978,
[Article]

Bakhshandeh Chamazkoti, Rohollah ; Oberlack, Martin (2018):
Geometry of two-point velocity correlation tensor of homogeneous isotropic turbulence with helicity in sol-manifold coordinates.
In: Journal of Mathematical Physics, 59 (10), p. 103507. ISSN 0022-2488,
DOI: 10.1063/1.5048802,
[Article]

Boyaciyan, D. ; Krause, P. ; von Klitzing, R. (2018):
Making strong polyelectrolyte brushes pH-sensitive by incorporation of gold nanoparticles.
In: Soft Matter, 14 (20), pp. 4029-4039. ISSN 1744-683X,
DOI: 10.1039/c8sm00411k,
[Article]

Bürkle, Sebastian ; Dreizler, Andreas ; Ebert, Volker ; Wagner, Steven (2018):
Experimental comparison of a 2D laminar diffusion flame under oxy-fuel and air atmosphere.
In: Fuel, 212, pp. 302-308. ISSN 00162361,
DOI: 10.1016/j.fuel.2017.10.067,
[Article]

Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2018):
Numerical investigation of the evolution and breakup of an evaporating liquid film on a structured wall.
In: International Journal of Heat and Fluid Flow, 70, pp. 104 - 113. ISSN 0142-727X,
DOI: 10.1016/j.ijheatfluidflow.2018.01.013,
[Article]

Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2018):
From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59 (3), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2514-3,
[Article]

Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2018):
Publisher Correction: From drop impact physics to spray cooling models: a critical review.
In: Experiments in Fluids, 59 (5), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2535-y,
[Article]

Bruce, Ellen E. ; van der Vegt, Nico F. A. (2018):
Does an electronic continuum correction improve effective short-range ion-ion interactions in aqueous solution?
In: The Journal of Chemical Physics, 148 (22), p. 222816. ISSN 0021-9606,
DOI: 10.1063/1.5017101,
[Article]

Bürkle, Sebastian ; Becker, Lukas Georg ; Dreizler, Andreas ; Wagner, Steven (2018):
Experimental investigation of the flue gas thermochemical composition of an oxy-fuel swirl burner.
In: Fuel, 231, pp. 61-72. ISSN 00162361,
DOI: 10.1016/j.fuel.2018.05.039,
[Article]

Bürkle, Sebastian ; Biondo, Luigi ; Ding, Carl-Philipp ; Honza, Rene ; Ebert, Volker ; Böhm, Benjamin ; Wagner, Steven (2018):
In-Cylinder Temperature Measurements in a Motored IC Engine using TDLAS.
In: Flow, Turbulence and Combustion, 101 (1), pp. 139-159. ISSN 1386-6184,
DOI: 10.1007/s10494-017-9886-y,
[Article]

Bürkle, Sebastian ; Walter, Nicole ; Wagner, Steven (2018):
Laser-based measurements of pressure broadening and pressure shift coefficients of combustion-relevant absorption lines in the near-infrared region.
In: Applied Physics B, 124 (6), ISSN 0946-2171,
DOI: 10.1007/s00340-018-6993-y,
[Article]

Benneckendorf, Frank S. ; Hillebrandt, Sabina ; Ullrich, Florian ; Rohnacher, Valentina ; Hietzschold, Sebastian ; Jänsch, Daniel ; Freudenberg, Jan ; Beck, Sebastian ; Mankel, Eric ; Jaegermann, Wolfram ; Pucci, Annemarie ; Bunz, Uwe H. F. ; Müllen, Klaus (2018):
Structure–Property Relationship of Phenylene-Based Self-Assembled Monolayers for Record Low Work Function of Indium Tin Oxide.
In: The Journal of Physical Chemistry Letters, 9 (13), pp. 3731-3737. ISSN 1948-7185,
DOI: 10.1021/acs.jpclett.8b01242,
[Article]

Bibouche, Bachir ; Peral, Daniel ; Stehl, Dmitrij ; Söderholm, Viktor ; Schomäcker, Reinhard ; von Klitzing, R. ; Vogt, Dieter (2018):
Multiphasic aqueous hydroformylation of 1-alkenes with micelle-like polymer particles as phase transfer agents.
In: RSC Advances, 8 (41), pp. 23332-23338. ISSN 2046-2069,
DOI: 10.1039/c8ra04022b,
[Article]

Barz, Dominik P. J. ; Scholz, Mathias ; Hardt, Steffen (2018):
Electrokinetic manipulation of the von Kármán vortex street in the wake of a confined cylinder. I. DC electric field.
In: Physics of Fluids, 30 (8), pp. 082004. ISSN 1070-6631,
DOI: 10.1063/1.5037595,
[Article]

Boyaciyan, Dikran ; Braun, Larissa ; Löhmann, Oliver ; Silvi, Luca ; Schneck, Emanuel ; von Klitzing, R. (2018):
Gold nanoparticle distribution in polyelectrolyte brushes loaded at different pH conditions.
In: The Journal of Chemical Physics, 149 (16), p. 163322. ISSN 0021-9606,
DOI: 10.1063/1.5035554,
[Article]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, pp. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Batzdorf, Stefan ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2018):
Direct Numerical Simulation of the Microscale Fluid Flow and Heat Transfer in the Three-Phase Contact Line Region During Evaporation.
In: Journal of Heat Transfer, 140 (3), pp. 032401-1. ISSN 00221481,
DOI: 10.1115/1.4038191,
[Article]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India,
Springer, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security,
Springer, [Conference or Workshop Item]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion,
Springer, [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, pp. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Bender, Achim ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2017):
Thin liquid films with time-dependent chemical reactions sheared by an ambient gas flow.
In: Physical Review Fluids, 2 (8), pp. 084002-1. ISSN 2469-990X,
[Article]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, pp. 651-681,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, pp. 12-13. [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), pp. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Article]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Book]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Springer, Auckland, New Zealand, [Conference or Workshop Item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Master Thesis]

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, pp. 118–134,
De Gruyter, Minneapolis, USA, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Billes, Marina ; Møller, Anders ; Pradel, Michael (2017):
Systematic Black-Box Analysis of Collaborative Web Applications.
In: PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, p. 708,
ACM New York, NY, USA, Barcelona, Spain, ISBN 978-1-4503-4988-8,
DOI: 10.1145/3062341.3062363,
[Conference or Workshop Item]

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference,
IEEE, Valencia Spain, [Conference or Workshop Item]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress,
SecuMedia Verlag, [Conference or Workshop Item]

Böhm, A. ; Biesalski, M. (2017):
Paper-based microfluidic devices: A complex low-cost material in high-tech applications.
In: MRS Bulletin, 42 (05), pp. 356-364. ISSN 0883-7694,
DOI: 10.1557/mrs.2017.92,
[Article]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Baier, Tobias ; Hardt, Steffen ; Shahabi, Vahid ; Roohi, Ehsan (2017):
Knudsen pump inspired by Crookes radiometer with a specular wall.
In: Physical Review Fluids, 2 (3), pp. 033401. ISSN 2469-990X,
[Article]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, pp. 142-160,
Springer, Rabat, Morocco, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 461-468,
New York, ACM, ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Conference or Workshop Item]

Bork, B. ; Preusche, A. ; Weckenmann, F. ; Lamanna, G. ; Dreizler, A. (2017):
Measurement of species concentration and estimation of temperature in the wake of evaporating n-heptane droplets at trans-critical conditions.
In: Proceedings of the Combustion Institute, 36 (2), pp. 2433-2440. ISSN 1540-7489,
[Article]

Becker, Lukas G. ; Kosaka, Hidemasa ; Böhm, Benjamin ; Doost, Samim ; Knappstein, Robert ; Habermehl, Martin ; Kneer, Reinhold ; Janicka, J. ; Dreizler, Andreas (2017):
Experimental investigation of flame stabilization inside the quarl of an oxyfuel swirl burner.
In: Fuel, 201, pp. 124-135. ISSN 00162361,
[Article]

Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2017):
Heat transfer in the film boiling regime: Single drop impact and spray cooling.
In: International Journal of Heat and Mass Transfer, 110, pp. 34-42. ISSN 00179310,
[Article]

Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron (2017):
Drop collision with a hot, dry solid substrate: Heat transfer during nucleate boiling.
In: Physical Review Fluids, 2 (7), ISSN 2469-990X,
[Article]

Bürkle, Sebastian ; Becker, Lukas G. ; Agizza, Maria Angela ; Dreizler, Andreas ; Ebert, Volker ; Wagner, Steven (2017):
In-situ measurement of residence time distributions in a turbulent oxy-fuel gas-flame combustor.
In: Experiments in Fluids, 58 (7), ISSN 0723-4864,
[Article]

Bothe, Dieter ; Denk, Robert ; Hieber, Matthias ; Schnaubelt, Roland ; Simonett, Gieri ; Wilke, Mathias ; Zacher, Rico (2017):
Special Issue: Parabolic Evolution Equations, Maximal Regularity, and Applications - Dedicated to Jan Pruss Preface.
In: Journal of Evolution Equations, 17 (1), pp. 1-15. ISSN 1424-3199,
[Article]

Bothe, D. ; Fischer, A. ; Pierre, M. ; Rolland, G. (2017):
Global wellposedness for a class of reaction-advection-anisotropic-diffusion systems.
In: Journal of Evolution Equations, 17 (1), pp. 101-130. ISSN 1424-3199,
[Article]

Bothe, D. ; Kashiwabara, T. ; Koehne, M. (2017):
Strong well-posedness for a class of dynamic outflow boundary conditions for incompressible Newtonian flows.
In: Journal of Evolution Equations, 17 (1), pp. 131-171. ISSN 1424-3199,
[Article]

Batzdorf, Stefan ; Breitenbach, Jan ; Schlawitschek, Christiane ; Roisman, Ilia V. ; Tropea, Cameron ; Stephan, Peter ; Gambaryan-Roisman, Tatiana (2017):
Heat transfer during simultaneous impact of two drops onto a hot solid substrate.
In: International Journal of Heat and Mass Transfer, 113, pp. 898-907. ISSN 0017-9310,
[Article]

Bothe, D. ; Koehne, M. ; Maier, S. ; Saal, J. (2017):
Global strong solutions for a class of heterogeneous catalysis models.
In: Journal of Mathematical Analysis and Applications, 445 (1), pp. 677-709. ISSN 0022-247X,
[Article]

Braun, Larissa ; Uhlig, Martin ; von Klitzing, R. ; Campbell, Richard A. (2017):
Polymers and surfactants at fluid interfaces studied with specular neutron reflectometry.
In: Advances in Colloid and Interface Science, 247, pp. 130-148. ISSN 00018686,
DOI: 10.1016/j.cis.2017.07.005,
[Article]

Backes, Sebastian ; Krause, Patrick ; Tabaka, Weronika ; Witt, Marcus U. ; Mukherji, Debashish ; Kremer, Kurt ; von Klitzing, R. (2017):
Poly(N-isopropylacrylamide) Microgels under Alcoholic Intoxication: When a LCST Polymer Shows Swelling with Increasing Temperature.
In: ACS Macro Letters, 6 (10), pp. 1042-1046. ISSN 2161-1653,
DOI: 10.1021/acsmacrolett.7b00557,
[Article]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
pp. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
pp. 15:1-15:8, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Conference or Workshop Item]

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016,
Milan, Italy, [Conference or Workshop Item]

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security,
IEEE, [Conference or Workshop Item]

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 37-46,
ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelor Thesis]

Bekheet, Maged F. ; Svoboda, Ingrid ; Liu, Na ; Bayarjargal, Lkhamsuren ; Irran, Elisabeth ; Dietz, Christian ; Stark, Robert W. ; Riedel, Ralf ; Gurlo, Aleksander (2016):
Ferroelectric InMnO3: Growth of single crystals, structure and high-temperature phase transitions.
In: Journal of Solid State Chemistry, 241, pp. 54-63. Elsevier, ISSN 0022-4596,
[Article]

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016,
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), pp. 1-28. International Association for Cryptologic Research (IACR), [Article]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography,
IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 1-13,
New York, ACM, ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, ISBN 978-1-4503-4944-4,
[Conference or Workshop Item]

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography,
ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security,
ACM, Xi'an, China, [Conference or Workshop Item]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
In: SpringerBriefs in Computer Science, Cham, Springer International Publishing - Springer, ISBN 978-3-319-53797-9,
[Book]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016,
Springer, Fes, Morocco, [Conference or Workshop Item]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, p. 24,
Springer, Taipei, Taiwan, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Master Thesis]

Bruschewski, Martin ; Scherhag, Christian ; Grundmann, Sven ; Schiffer, Heinz-Peter (2016):
Influence of Channel Geometry and Flow Variables on Cyclone Cooling of Turbine Blades.
In: ASME Journal of Turbomachinery, 138 (6), pp. 061005-061005. ISSN 0889-504X,
[Article]

Babu, Deepu J. ; Kuehl, Frank G. ; Yadav, Sandeep ; Markert, Daniel ; Bruns, Michael ; Hampe, Manfred J. ; Schneider, Joerg J. (2016):
Adsorption of pure SO2 on nanoscaled graphene oxide.
In: Rsc Advances, 6 (43), pp. 36834-36839. ISSN 2046-2069,
[Article]

Bachmann, Svenja ; Schulze, Marcus ; Morasch, Jan ; Hesse, Sabine ; Hussein, Laith ; Krell, Lisa ; Schnagl, Johann ; Stark, Robert W. ; Narayan, Suman (2016):
Aging of oxygen and hydrogen plasma discharge treated a-C:H and ta-C coatings.
In: Applied Surface Science, 371, pp. 613-623. ISSN 0169-4332,
[Article]

Bruschewski, Martin ; Freudenhammer, Daniel ; Buchenberg, Waltraud B. ; Schiffer, Heinz-Peter ; Grundmann, Sven (2016):
Estimation of the measurement uncertainty in magnetic resonance velocimetry based on statistical models.
In: Experiments in Fluids, 57 (5), ISSN 0723-4864,
[Article]

Buchenberg, Waltraud B. ; Wassermann, Florian ; Grundmann, Sven ; Jung, Bernd ; Simpson, Robin (2016):
Acquisition of 3D Temperature Distributions in Fluid Flow Using Proton Resonance Frequency Thermometry.
In: Magnetic Resonance in Medicine, 76 (1), pp. 145-155. ISSN 0740-3194,
[Article]

Blume, Niels Goeran ; Ebert, Volker ; Dreizler, Andreas ; Wagner, Steven (2016):
Broadband fitting approach for the application of supercontinuum broadband laser absorption spectroscopy to combustion environments.
In: Measurement Science and Technology, 27 (1), ISSN 0957-0233,
[Article]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias (2015):
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: ACSAC 2015, In: Using Channel State Information for Tamper Detection in the Internet of Things, pp. 131-140,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818028,
[Conference or Workshop Item]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, pp. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Buescher, Niklas ; Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15),
USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Dodis, Yevgeniy ; Nielsen, Arno Buus (eds.) (2015):
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Lecture Notes in Computer Science 9015, In: Theory of Cryptography. TCC 2015., pp. 428-455,
Springer, Warsaw, Poland, ISBN 978-3-662-46497-7,
DOI: 10.1007/978-3-662-46497-7_17,
[Conference or Workshop Item]

Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf (2015):
A Concept for a C2X-based Crossroad Assistant.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 360-364,
IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8425-1,
DOI: 10.1109/PERCOMW.2015.7134063,
[Conference or Workshop Item]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p. 20,
Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20. [Article]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13. [Article]

Barckmann, K. ; Tropea, Cameron ; Grundmann, S. (2015):
Attenuation of Tollmien-Schlichting Waves Using Plasma Actuator Vortex Generators.
In: Aiaa Journal, 53 (5), pp. 1384-U290. ISSN 0001-1452,
[Article]

Bohlin, Alexis ; Mann, Markus ; Patterson, Brian D. ; Dreizler, Andreas ; Kliewer, Christopher J. (2015):
Development of two-beam femtosecond/picosecond one-dimensional rotational coherent anti-Stokes Raman spectroscopy: Time-resolved probing of flame wall interactions.
In: Proceedings of the Combustion Institute, 35, pp. 3723-3730. ISSN 1540-7489,
[Article]

Bolkart, Martin ; Hieber, Matthias (2015):
Pointwise upper bounds for the solution of the Stokes equation on L-sigma(infinity)(Omega) and applications.
In: Journal of Functional Analysis, 268 (7), pp. 1678-1710. ISSN 0022-1236,
[Article]

Bogris, A. ; Juretzka, C. ; Simos, H. ; Syvridis, D. ; Roditi, E. ; Elsasser, W. ; Carras, M. (2015):
Experimental investigation of intensity noise in injection locked mid-infrared quantum cascade lasers.
In: Proceedings of the SPIE, 9382, pp. 938210 (10 pp.)-938210 (10 pp.). ISSN 0277-786X,
[Article]

Bothe, D. ; Dreyer, W. (2015):
Continuum thermodynamics of chemically reacting fluid mixtures.
In: Acta Mechanica, 226 (6), pp. 1757-1805. ISSN 0001-5970,
[Article]

Bernardin, John ; Chiaramonte, Francis ; Dhir, Vijay ; Galloway, Jesse ; Goodson, Ken ; Incropera, Frank ; Kabov, Oleg ; Kaviany, Massoud ; Kazimi, Mujid ; Khusid, Boris ; Kim, Jungho ; Kim, Sung-Min ; Lee, Jaeseon ; Minkowycz, W. J. ; Qu, Weilin ; Rose, John ; Sammakia, Bahgat ; Stephan, Peter ; Vafai, Kambiz ; Wen, Chang-Da (2015):
Professor Issam Mudawar on his 60th birthday.
In: International Journal of Heat and Mass Transfer, 89, pp. A1-A3. ISSN 0017-9310,
[Article]

Bothe, Dieter ; Rolland, Guillaume (2015):
Global Existence for a Class of Reaction-Diffusion Systems with Mass Action Kinetics and Concentration-Dependent Diffusivities.
In: Acta Applicandae Mathematicae, 139 (1), pp. 25-57. ISSN 0167-8019,
DOI: 10.1007/s10440-014-9968-y,
[Article]

Butin, Denis ; Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015),
IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015),
Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS),
[Conference or Workshop Item]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14, In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 6-15,
ACM, New Orleans, Louisiana, USA, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference or Workshop Item]

Brzuska, Christina ; Mittelbach, Arno
Sarkar, Palash ; Iwata, Tetsu (eds.) (2014):
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Lecture Notes in Computer Science, 2, In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., pp. 142-161, Berlin, Heidelberg, Springer, ISBN 978-3-662-45607-1,
DOI: 10.1007/978-3-662-45608-8_8,
[Book Section]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Conference or Workshop Item]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Conference or Workshop Item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, pp. 67-80,
Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, pp. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1415-1426,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Garay, Arno A. ; Gennaro, Rosario (eds.) (2014):
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Lecture Notes in Computer Science 8616, 1, In: Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., pp. 188-205,
Springer, Santa Barbara, CA, USA, ISBN 978-3-662-44370-5,
DOI: 10.1007/978-3-662-44371-2_11,
[Conference or Workshop Item]

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014). [Article]

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3), pp. 459-478. DOI: 10.1007/s10623-012-9747-6,
[Article]

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pp. 187-198,
ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, pp. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference or Workshop Item]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, pp. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Brzuska, Christina ; Mittelbach, Arno (2014):
Using Indistinguishability Obfuscation via UCEs.
In: Lecture Notes in Computer Science, 2, In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., pp. 22-141, Berlin, Heidelberg, Springer, ISBN 978-3-662-45607-1,
DOI: 10.1007/978-3-662-45608-8,
[Book Section]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), pp. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, pp. 168-171,
Bremen, [Conference or Workshop Item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, pp. 1819-1824,
ACM, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, pp. 336-355,
Springer, Marrakesh, Morocco, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334,
[Conference or Workshop Item]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014):
Scalable Offline Monitoring.
pp. 31-47, Heidelberg, Germany, Springer, Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37, pp. 720 - 725. ISSN 11,
DOI: 10.1007/s11623-013-0300-1,
[Article]

Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia (2013):
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
In: MobiCom'13, In: The 19th Annual International Conference on Mobile Computing and Networking, pp. 231-233,
ACM, Miami, FL, USA, ISBN 978-1-4503-1999-7/13/09,
DOI: 10.1145/2500423.2504583,
[Conference or Workshop Item]

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, pp. 31-46,
Springer Berlin Heidelberg, RHUL, Egham, UK, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hildebrandt, Mireille (ed.) (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013, pp. 139-164, Amsterdam, Iso Press, ISBN 978-1-61499-294-3 (print) ; 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book Section]

Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, pp. 1971-1984,
Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 48-67,
Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor Thesis]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13),
USENIX, [Conference or Workshop Item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 752 - 766,
Koblenz, [Conference or Workshop Item]

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), pp. 291 - 296,
IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), pp. 198-207,
IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013),
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), pp. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013):
Identification element-based authentication and identification with decentralised service use.
EP 2600270,
[Standards, patents]

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 347-359,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, pp. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt (2013):
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 8-13,
IEEE Computer Society, San Diego, CA, USA, ISBN 978-1-4673-5075-4,
DOI: 10.1109/PerComW.2013.6529448,
[Conference or Workshop Item]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242,
ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), pp. 4966-4976,
IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1), pp. 84-96. [Article]

Braun, Johannes ; Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, pp. 600-605,
Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 402-417,
Springer, Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53, pp. 81-102. [Article]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: LNCS, In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), pp. 259-276,
Springer, Hangzhou, China, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, pp. 53-68,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012,
Birmingham, UK, [Conference or Workshop Item]

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, pp. 1-5,
IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
Petcu, Dana ; Vazquez-Poletti, Jose Luis (eds.) (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing, pp. 151-177, New Castle upon Tyne, Cambridge Scholars Publishing, ISBN 978-1-44383-550-3,
[Book Section]

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Bansarkhani, Rachid El ; Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS, In: WISTP - Workshop in Information Security Theory and Practice 2012,
Springer, London, UK, [Conference or Workshop Item]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013),
London, UK, [Conference or Workshop Item]

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen,
[Ph.D. Thesis]

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1502-1507,
ACM, Trento, Italy, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), pp. 389-400,
ACM, DOI: 10.1145/2046707.2046753,
[Conference or Workshop Item]

Bothe, Dieter (1997):
Reaction-diffusion systems with discontinuities. A viability approach.
In: Nonlinear Analysis: Theory, Methods & Applications, 30 (2), pp. 677-686. ISSN 0362546X,
DOI: 10.1016/S0362-546X(97)00247-2,
[Article]

C

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020):
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium, virtual Conference, August 12.–14.2020, [Conference or Workshop Item]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Connor, Paula ; Schuch, Jona ; Kaiser, Bernhard ; Jaegermann, Wolfram (2020):
The Determination of Electrochemical Active Surface Area and Specific Capacity Revisited for the System MnOx as an Oxygen Evolution Catalyst.
234, In: Zeitschrift für Physikalische Chemie, (5), pp. 979-994. ISSN 0942-9352,
DOI: 10.1515/zpch-2019-1514,
[Article]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Other]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Conference or Workshop Item]

Chen, Longquan ; Bonaccurso, Elmar ; Gambaryan-Roisman, Tatiana ; Starov, Victor ; Koursari, Nektaria ; Zhao, Yapu (2018):
Static and dynamic wetting of soft substrates.
In: Current Opinion in Colloid & Interface Science, 36, pp. 46 - 57. ISSN 1359-0294,
DOI: 10.1016/j.cocis.2017.12.001,
[Article]

Cherkashinin, Gennady ; Eilhardt, Robert ; Lebedev, Mikhail V. ; Nappini, Silvia ; Magnano, Elena ; Jaegermann, Wolfram (2018):
Olivine-LiNiPO 4 Thin Films: Chemical Compatibility with Liquid Electrolyte and Interface Stability at High Potential.
In: Journal of The Electrochemical Society, 165 (4), pp. H3143-H3147. ISSN 0013-4651,
DOI: 10.1149/2.0211804jes,
[Article]

Cordes, U. ; Lambie, B. ; Hufnagel, K. ; Spiegelberg, H. ; Kampers, G. ; Tropea, C. (2018):
The Adaptive Camber Concept - A passive approach for gust load alleviation on wind turbines.
In: Wind Energy, 21 (9), pp. 732-744. ISSN 10954244,
DOI: 10.1002/we.2190,
[Article]

Chilukoti, Hari Krishna ; Müller-Plathe, Florian ; Yang, Hua (2018):
Application of Reverse Nonequilibrium Molecular Dynamics to the Calculation of the Mutual Diffusion Coefficient of Alkane Mixtures.
In: The Journal of Physical Chemistry B, 122 (39), pp. 9210-9217. ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.8b06886,
[Article]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pp. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Master Thesis]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor Thesis]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Conference or Workshop Item]

Cordes, Ulrike ; Kampers, G. ; Meissner, T. ; Tropea, C. ; Peinke, J. ; Hoelling, M. (2017):
Note on the limitations of the Theodorsen and Sears functions.
In: Journal of Fluid Mechanics, 811, ISSN 0022-1120,
[Article]

Cloos, F.-J. ; Zimmermann, Anna- L. ; Pelz, P. F. (2017):
Two turbulent flow regimes at the inlet of a rotating pipe.
In: European Journal of Mechanics B-Fluids, 61,2 (1/2), pp. 330-335. Elsevier, ISSN 0997-7546,
[Article]

Cavalcanti Miranda, Flavia ; di Mare, F. ; Sadiki, Amsini ; Janicka, J. (2017):
Performance Analysis of Different Solvers for Computing the Radiative Transfer Equation in Complex Geometries Using Finite Volume Method and Block Structured Grids.
In: Computational Thermal Sciences: An International Journal, 9 (3), pp. 269-282. ISSN 1940-2503,
[Article]

Cloos, F.-J. ; Stapp, D. ; Pelz, P. F. (2017):
Swirl boundary layer and flow separation at the inlet of a rotating pipe.
In: Journal of Fluid Mechanics, 811, pp. 350-371. ISSN 0022-1120,
[Article]

Cai, Xuan ; Wörner, Martin ; Marschall, Holger ; Deutschmann, Olaf (2017):
CFD Simulation of Liquid Back Suction and Gas Bubble Formation in a Circular Tube with Sudden or Gradual Expansion.
In: Emission Control Science and Technology, 3 (4), pp. 289-301. ISSN 2199-3629,
DOI: 10.1007/s40825-017-0073-3,
[Article]

Christau, Stephanie ; Moeller, Tim ; Genzer, Jan ; Koehler, Ralf ; von Klitzing, R. (2017):
Salt-Induced Aggregation of Negatively Charged Gold Nanoparticles Confined in a Polymer Brush Matrix.
In: Macromolecules, 50 (18), pp. 7333-7343. ISSN 0024-9297,
DOI: 10.1021/acs.macromol.7b00866,
[Article]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Article]

Chagelishvili, George ; Hau, Jan-Niklas ; Khujadze, George ; Oberlack, Martin (2016):
Mechanical picture of the linear transient growth of vortical perturbations in incompressible smooth shear flows.
In: Physical Review Fluids, 1 (4), pp. 043603. American Physical Society, ISSN 2469-990X,
[Article]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), pp. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Other]

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 596-603,
Heraklion, Crete, Greece, [Conference or Workshop Item]

Chen, X. ; Focke, C. ; Marschall, H. ; Bothe, D.
Fritsching, Udo (ed.) (2016):
Investigation of Elementary Processes of Non-Newtonian Droplets Inside Spray Processes by Means of Direct Numerical Simulation.
In: Process-Spray, pp. 3-51, Springer, ISBN 978-3-319-32368-8,
[Book Section]

Chen, Jian ; Dörsam, Edgar ; Spiehl, Dieter ; Hakimi Tehrani, Arash (2016):
Elastic model of paper stacks by considering the paper structure.
In: Nordic Pulp & Paper Research Journal (NPPRJ), 31 (4), pp. 648-658. Mid Sweden University, ISSN 0283-2631,
[Article]

Christau, S. ; Moller, T. ; Brose, F. ; Genzer, J. ; Soltwedel, O. ; von Klitzing, R. (2016):
Effect of gold nanoparticle hydrophobicity on thermally induced color change of PNIPAM brush/gold nanoparticle hybrids.
In: Polymer, 98, pp. 454-463. ISSN 0032-3861,
[Article]

Cai, Xuan ; Wörner, Martin ; Marschall, Holger ; Deutschmann, Olaf (2016):
Numerical study on the wettability dependent interaction of a rising bubble with a periodic open cellular structure.
In: Catalysis Today, 273, pp. 151-160. ISSN 09205861,
DOI: 10.1016/j.cattod.2016.03.053,
[Article]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Other]

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), pp. 749-762. [Article]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, p. 6,
Paris, France, [Conference or Workshop Item]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), p. 8,
Florence, Italy, [Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference or Workshop Item]

Criscione, A. ; Roisman, Ilia V. ; Jakirlić, Suad ; Tropea, Cameron (2015):
Towards modelling of initial and final stages of supercooled water solidification.
In: International Journal of Thermal Sciences, 92, pp. 150-161. ISSN 1290-0729,
[Article]

Chen, Xingyuan ; Schäfer, Michael ; Bothe, Dieter (2015):
Numerical modeling and investigation of viscoelastic fluid-structure interaction applying an implicit partitioned coupling algorithm.
In: Journal of Fluids and Structures, 54, pp. 390-421. Elsevier, ISSN 0889-9746,
[Article]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Conference or Workshop Item]

Culhane, William ; Jayaram, K. R. ; Eugster, Patrick (2014):
Fast, Expressive Top-k Matching.
In: Middleware '14, In: Proceedings of the 15th International Middleware Conference, pp. 73-84,
ACM, Bordeaux, France, ISBN 978-1-4503-2785-5,
DOI: 10.1145/2663165.2663326,
[Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
Darmstadt, Technische Universität, [Bachelor Thesis]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference or Workshop Item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014),
Glasgow, UK, [Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, pp. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference or Workshop Item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014),
Paris, France, [Conference or Workshop Item]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
Darmstadt, Technische Universität, [Master Thesis]

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107. [Article]

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164), pp. 1-20. International Association for Cryptologic Research (IACR), [Article]

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, pp. 359-368,
ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]

Cuong, N. ; Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), pp. 3-15,
Springer, [Conference or Workshop Item]

D

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Conference or Workshop Item]

Deußen, Benjamin ; Oberlack, Martin ; Wang, Yongqi (2021):
Probability theory of active suspensions.
33, In: Physics of Fluids, (6), pp. 061902. ISSN 1070-6631,
DOI: 10.1063/5.0047227,
[Article]

Deußen, Bejamin ; Jayaram, A ; Kummer, Florian ; Wang, Yongqi ; Speck, T ; Oberlack, Martin (2021):
High-order simulation scheme for active particles driven by stress boundary conditions.
33, In: Journal of Physics: Condensed Matter, (24), p. 244004. ISSN 0953-8984,
DOI: 10.1088/1361-648X/abf8cf,
[Article]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Article]

Deußen, Benjamin ; Dierkes, Dominik ; Oberlack, Martin (2020):
Statistical theory of helical turbulence.
In: Physics of Fluids, 32 (6), pp. 065109. ISSN 1070-6631,
DOI: 10.1063/5.0010874,
[Article]

Dehe, Sebastian ; Rofman, Baruch ; Bercovici, Moran ; Hardt, Steffen (2020):
Electro-osmotic flow enhancement over superhydrophobic surfaces.
In: Physical Review Fluids, 5, pp. 053701. ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.5.053701,
[Article]

Dressler, L. ; Sacomano Filho, F. L. ; Sadiki, A. ; Janicka, J. (2020):
Influence of Thickening Factor Treatment on Predictions of Spray Flame Properties Using the ATF Model and Tabulated Chemistry.
In: Flow, Turbulence and Combustion, 2020, Springer, ISSN 1386-6184, e-ISSN 1573-1987,
DOI: 10.1007/s10494-020-00149-7,
[Article]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Dierkes, Dominik ; Cheviakov, Alexei ; Oberlack, Martin (2020):
Publisher’s Note: “New similarity reductions and exact solutions for helically symmetric viscous flows” [Phys. Fluids 32, 053604 (2020)].
32, In: Physics of Fluids, (6), pp. 069901. ISSN 1070-6631,
DOI: 10.1063/5.0015297,
[Article]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Conference or Workshop Item]

Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020):
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-27.08., [Conference or Workshop Item]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Dressler, L. ; Ries, F. ; Kuenne, G. ; Janicka, J. ; Sadiki, A. (2019):
Analysis of Shear Effects on Mixing and Reaction Layers in Premixed Turbulent Stratified Flames using LES coupled to Tabulated Chemistry.
In: Combustion Science and Technology, 2019, pp. 1-16. Taylor & Francis, ISSN 1563-521X,
DOI: 10.1080/00102202.2019.1678915,
[Article]

Ding, Carl-Philipp ; Vuilleumier, David ; Kim, Namho ; Reuss, David L. ; Sjöberg, Magnus ; Böhm, Benjamin (2019):
Effect of engine conditions and injection timing on piston-top fuel films for stratified direct-injection spark-ignition operation using E30.
In: International Journal of Engine Research, p. 146808741986978. Sage, ISSN 1468-0874,
DOI: 10.1177/1468087419869785,
[Article]

Dillen, Sebastian ; Oberlack, Martin ; Wang, Yongqi (2019):
Analytical investigation of rotationally symmetrical oscillating flows of viscoelastic fluids.
In: Journal of Non-Newtonian Fluid Mechanics, 272, p. 104168. Elsevier, ISSN 03770257,
DOI: 10.1016/j.jnnfm.2019.104168,
[Article]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Conference or Workshop Item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Dimesso, Lucangelo ; Wittich, Carolin ; Mayer, Thomas ; Jaegermann, Wolfram (2019):
Phase-change behavior of hot-pressed methylammonium lead bromide hybrid perovskites.
In: Journal of Materials Science, 54 (3), pp. 2001-2015. Springer, ISSN 0022-2461,
DOI: 10.1007/s10853-018-3009-6,
[Article]

Dammel, Frank ; Oltmanns, Johannes ; Stephan, Peter (2019):
Nutzung der Abwärme des Hochleistungsrechners am Campus Lichtwiese.
In: Euro Heat & Power, pp. 28-31. EW Medien und Kongresse GmbH, ISSN 0949-166X,
[Article]

Deichmann, Gregor ; Dallavalle, Marco ; Rosenberger, David ; van der Vegt, Nico F. A. (2019):
Phase Equilibria Modeling with Systematically Coarse-Grained Models—A Comparative Study on State Point Transferability.
In: The Journal of Physical Chemistry B, 123 (2), pp. 504-515. ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.8b07320,
[Article]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
pp. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Conference or Workshop Item]

Dalgicdir, Cahit ; van der Vegt, Nico F. A. (2019):
Improved Temperature Behavior of PNIPAM in Water with a Modified OPLS Model.
In: The Journal of Physical Chemistry B, 123 (17), pp. 3875-3883. ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.9b01644,
[Article]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

De Oliveira Nunes, Ivan ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Conference or Workshop Item]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018,
Springer, Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Conference or Workshop Item]

De Maleprade, Helene ; Soto, Dan ; Quéré, David ; Hinch, E. John ; Baier, Tobias ; Schür, Maximilian T. ; Hardt, Steffen (2018):
Air-propelled, herringbone-textured platelets.
In: Physical Review Fluids, 3 (104101), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.104101,
[Article]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master Thesis]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Deising, D. ; Bothe, D. ; Marschall, H. (2018):
Direct Numerical Simulation of Mass Transfer in Bubbly Flows.
In: Computers & Fluids, 172, pp. 524-538. ISSN 00457930,
DOI: 10.1016/j.compfluid.2018.03.041,
[Article]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Master Thesis]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master Thesis]

Deichmann, Gregor ; van der Vegt, Nico F. A. (2018):
Bottom-up approach to represent dynamic properties in coarse-grained molecular simulations.
In: The Journal of Chemical Physics, 149 (24), p. 244114. ISSN 0021-9606,
DOI: 10.1063/1.5064369,
[Article]

Dimesso, Lucangelo ; Das, Chittaranjan ; Mayer, Thomas ; Jaegermann, Wolfram (2018):
Investigation of earth-alkaline (EA = Mg, Ca, Sr) containing methylammonium tin iodide perovskite systems.
In: Journal of Materials Science, 53 (1), pp. 356-368. ISSN 0022-2461,
DOI: 10.1007/s10853-017-1545-0,
[Article]

Dimesso, L. ; Mayer, T. ; Jaegermann, W. (2018):
Investigation of Methylammonium Tin Strontium Bromide Perovskite Systems.
In: ECS Journal of Solid State Science and Technology, 7 (3), pp. R27-R33. ISSN 2162-8769,
DOI: 10.1149/2.0181803jss,
[Article]

Ding, Carl-Philipp ; Sjöberg, Magnus ; Vuilleumier, David ; Reuss, David L. ; He, Xu ; Böhm, Benjamin (2018):
Fuel film thickness measurements using refractive index matching in a stratified-charge SI engine operated on E30 and alkylate fuels.
In: Experiments in Fluids, 59 (3), ISSN 0723-4864,
DOI: 10.1007/s00348-018-2512-5,
[Article]

Daikeler, Alexander ; Ströhle, Jochen ; Epple, Bernd (2018):
Experimental Flow Structure Analysis in a 1 MWth Circulating Fluidized Bed Pilot Plant.
In: Chemical Engineering Science, ISSN 00092509,
DOI: 10.1016/j.ces.2018.10.037,
[Article]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Article]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
pp. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Conference or Workshop Item]

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelor Thesis]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Conference or Workshop Item]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Just-in-Time Static Analysis.
In: Proceedings of ISSTA ’17, p. 447,
ACM, Santa Barbara, California, United States, ISBN 978-1-4503-5076-1,
DOI: 10.1145/3092703.3092705,
[Conference or Workshop Item]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), pp. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Cheetah: Just-in-Time Taint Analysis for Android Apps.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 39-42,
Curran Associates, Inc., Buenos Aires, Argentina, ISBN 978-1-5386-1589-8,
DOI: 10.1109/ICSE-C.2017.20,
[Conference or Workshop Item]

Dayal, Ram ; Gambaryan-Roisman, Tatiana (2017):
Heat transfer in granular medium for application to selective laser melting: A numerical study.
In: International Journal of Thermal Sciences, 113, pp. 38-50. ISSN 12900729,
[Article]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems,
Uppsala, Sweden, [Conference or Workshop Item]

Dietzel, Mathias ; Hardt, Steffen (2017):
Flow and streaming potential of an electrolyte in a channel with an axial temperature gradient.
In: Journal of Fluid Mechanics, 813, pp. 1060-1111. ISSN 0022-1120,
[Article]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Darmstadt, Technische Universität, [Bachelor Thesis]

Dierkes, Dominik ; Oberlack, Martin (2017):
Euler and Navier-Stocks equations in a new time-dependent helically symmetric system: derivation of the fundamental system and new conservation laws.
In: Journal of Fluid Mechanics, 818, pp. 344-365. ISSN 0022-1120,
[Article]

Diemel, O. ; Pareja, J. ; Dreizler, A. ; Wagner, S. (2017):
An interband cascade laser-based in situ absorption sensor for nitric oxide in combustion exhaust gases.
In: Applied Physics B, 123 (5), ISSN 0946-2171,
[Article]

Ding, Carl-Philipp ; Honza, Rene ; Böhm, Benjamin ; Dreizler, Andreas (2017):
“Simultaneous measurement of flame impingement and piston surface temperatures in an optically accessible spark ignition engine”.
In: Applied Physics B, 123 (4), ISSN 0946-2171,
[Article]

Dimesso, L. ; Fasel, C. ; Lakus-Wollny, K. ; Mayer, T. ; Jaegermann, W. (2017):
Thermal stability of lead-free CH 3 NH 3 Sn x I 3 systems (0.9 ≤ x ≤ 1.1) for photovoltaics.
In: Materials Science in Semiconductor Processing, 68, pp. 152-158. ISSN 13698001,
[Article]

Dalgicdir, Cahit ; Rodríguez-Ropero, Francisco ; van der Vegt, Nico F. A. (2017):
Computational Calorimetry of PNIPAM Cononsolvency in Water/Methanol Mixtures.
In: The Journal of Physical Chemistry B, 121 (32), pp. 7741-7748. ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.7b05960,
[Article]

Dallavalle, Marco ; van der Vegt, Nico F. A. (2017):
Evaluation of mapping schemes for systematic coarse graining of higher alkanes.
In: Phys. Chem. Chem. Phys., 19 (34), pp. 23034-23042. ISSN 1463-9076,
DOI: 10.1039/c7cp03926c,
[Article]

Dimesso, Lucangelo ; Stöhr, Maximilian ; Das, Chittaranjan ; Mayer, Thomas ; Jaegermann, Wolfram (2017):
Investigation on the properties of hybrid CH3NH3SnxI3 (0.9 ≤ x ≤ 1.4) perovskite systems.
In: Journal of Materials Research, 32 (22), pp. 4132-4141. ISSN 0884-2914,
DOI: 10.1557/jmr.2017.418,
[Article]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
pp. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052, In: Cryptology and Network Security. CANS 2016,
Springer, Cham, Milano, Italy, [Conference or Workshop Item]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016,
IEEE, Salzburg, Austria, [Conference or Workshop Item]

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas (2016):
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 88-97,
IEEE, Salzburg, Austria, ISBN 978-1-5090-0990-9/16,
DOI: 10.1109/ARES.2016.88,
[Conference or Workshop Item]

Dietzel, Mathias ; Hardt, Steffen (2016):
Thermoelectricity in confined liquid electrolytes.
In: Physical Review Letters, 116 (22), p. 225901. ISSN 0031-9007,
[Article]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Bachelor Thesis]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), pp. 637-657. Springer, ISSN 1615-5270,
[Article]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81), pp. 1-33. International Association for Cryptologic Research (IACR), [Article]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2016):
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: International Journal of Thermodynamics, 19 (1), pp. 43-51. ISSN 1301-9724,
[Article]

Doerr, Aaron ; Hardt, Steffen ; Masoud, Hassan ; Stone, Howard A. (2016):
Drag and diffusion coefficients of a spherical particle attached to a fluid-fluid interface.
In: Journal of Fluid Mechanics, 790, pp. 607-618. ISSN 0022-1120,
[Article]

Dayal, Ram ; Gambaryan-Roisman, Tatiana (2016):
A novel numerical method for radiation exchange in granular medium.
In: Heat and Mass Transfer, 52 (11), pp. 2587-2591. ISSN 0947-7411,
[Article]

De Nicola, Antonio ; Kawakatsu, Toshihiro ; Mueller-Plathe, Florian ; Milano, Giuseppe (2016):
Fast relaxation of coarse-grained models of polymer interphases by hybrid particle-field molecular dynamics: Polystyrene-silica nanocomposites as an example.
In: European Physical Journal-Special Topics, 225 (8-9), pp. 1817-1841. ISSN 1951-6355,
[Article]

Dietrich, Axel ; Fraunholz, Christoph ; Dammel, Frank ; Stephan, Peter (2016):
Exergoeconomic Analysis of Concepts for Pumped Heat Electricity Storage Systems.
Joint Conference “Thermal Energy Storage – Perspectives and Applications in an Industrial Environment”, Frankfurt, 2016, [Conference or Workshop Item]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

Doost, A. S. ; Ries, E. ; Becker, L. G. ; Buerkle, S. ; Wagner, S. ; Ebert, V. ; Dreizler, A. ; di Mare, F. ; Sadiki, A. ; Janicka, J. (2016):
Residence time calculations for complex swirling flow in a combustion chamber using large-eddy simulations.
156, In: Chemical Engineering Science, 2016, pp. 97-114. ISSN 0009-2509,
DOI: 10.1016/j.ces.2016.09.001,
[Article]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

De, Simanta ; Bhattacharyya, Somnath ; Hardt, Steffen (2015):
Electroosmotic flow in a slit nanochannel with superhydrophobic walls.
In: Microfluidics and Nanofluidics, 19 (6), pp. 1465-1476. [Article]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Conference or Workshop Item]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197-1210,
ACM, Denver, Colorado, USA, [Conference or Workshop Item]

Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
Andy, Gill (ed.) (2015):
Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: OOPSLA 2015, 50, In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 607-622,
ACM, Pittsburgh, PA, USA, ISBN 978-1-4503-3689-5,
DOI: 10.1145/2814270.2814290,
[Conference or Workshop Item]

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20, pp. 13-28. DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), pp. 2665-2670,
IEEE, First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Dörr, A. ; Hardt, Steffen (2015):
Driven particles at fluid interfaces acting as capillary dipoles.
In: Journal of Fluid Mechanics, 770, pp. 5-26. ISSN 0022-1120,
[Article]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
Darmstadt, Technische Universität, [Diploma Thesis or Magisterarbeit]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Conference or Workshop Item]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Dreizler, A. ; Boehm, B. (2015):
Advanced laser diagnostics for an improved understanding of premixed flame-wall interactions.
In: Proceedings of the Combustion Institute, 35, pp. 37-64. ISSN 1540-7489,
[Article]

Dietrich, Axel ; Dammel, Frank ; Stephan, Peter (2015):
Exergoeconomic Analysis of a Pumped Heat Electricity Storage System with Concrete Thermal Energy Storage.
In: Proceedings of ECOS 2015 - The 28th International Conference on Efficiency, COST, Optimization, Simulation and Environmental Impact of Energy Systems, June 30 - July 3, 2015, Pau, France, [Article]

Debrabant, Kristian ; Lang, Jens (2015):
On asymptotic global error estimation and control of finite difference solutions for semilinear parabolic equations.
In: Computer Methods in Applied Mechanics and Engineering, 288, pp. 110-126. ISSN 0045-7825,
[Article]

Dietz, Christian ; Schulze, Marcus ; Voss, Agnieszka ; Riesch, Christian ; Stark, Robert W. (2015):
Bimodal frequency-modulated atomic force microscopy with small cantilevers.
In: Nanoscale, 7 (5), pp. 1849-1856. ROYAL SOC CHEMISTRY, CAMBRIDGE, ENGLAND, ISSN 2040-3364,
[Article]

Domschke, Pia ; Kolb, Oliver ; Lang, Jens (2015):
Adjoint-based error control for the simulation and optimization of gas and water supply networks.
In: Applied Mathematics and Computation, 259, pp. 1003-1018. ISSN 0096-3003,
DOI: 10.1016/j.amc.2015.03.029,
[Article]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014):
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
24th International Conference on Field Programmable Logic and Applications (FPL), München, Deutschland, 2014, [Conference or Workshop Item]

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, pp. 76-87,
Springer, Waterloo, Canada, [Conference or Workshop Item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS, In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, pp. 161-172,
Springer, Istanbul, Turkey, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
pp. 893-908, USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4), [Article]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing,
[Conference or Workshop Item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf (2014):
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
In: PerCom Workshops 2014, In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp. 1-9,
IEEE, Budapest, Hungary, ISBN 978-1-4799-2737-1,
DOI: 10.1109/PerComW.2014.6815157,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference,
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Lecture Notes in Computer Science, In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), pp. 1-25, Cham, Springer, ISBN 978-3-319-14054-4,
[Book Section]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014,
Marrakech, Morocco, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory,
Honolulu HI USA, [Conference or Workshop Item]

Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko (2013):
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
In: CCS '13, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 285-298,
ACM, Berlin, Germany, ISBN 978-1-4503-2477-9,
DOI: 10.1145/2508859.2516750,
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]

Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: LNCS, In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, pp. 156-175,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013,
Bangalore, India, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi,
[Conference or Workshop Item]

Demirel, Denise ; Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Article]

Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012,
Bellevue, WA, [Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012),
[Conference or Workshop Item]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238,
Springer, [Conference or Workshop Item]

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012):
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2483-2488,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223823,
[Conference or Workshop Item]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

E

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 09.-13.05.2021, [Conference or Workshop Item]

Encinas, Noemí ; Yang, Ching-Yu ; Geyer, Florian ; Kaltbeitzel, Anke ; Baumli, Philipp ; Reinholz, Jonas ; Mailänder, Volker ; Butt, Hans-Jürgen ; Vollmer, Doris (2020):
Submicrometer-Sized Roughness Suppresses Bacteria Adhesion.
In: ACS Applied Materials & Interfaces, 12 (19), pp. 21192-21200. American Chemical Society, ISSN 1944-8244,
DOI: 10.1021/acsami.9b22621,
[Article]

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
pp. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Conference or Workshop Item]

Emmert, Johannes ; Grauer, Samuel J. ; Wagner, Steven ; Daun, Kyle J. (2019):
Efficient Bayesian inference of absorbance spectra from transmitted intensity spectra.
In: Optics Express, 27 (19), p. 26893. Optical Society of America (OSA), ISSN 1094-4087,
DOI: 10.1364/oe.27.026893,
[Article]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor Thesis]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor Thesis]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Conference or Workshop Item]

Etzold, Bastian J. M. ; Begin, Dominique (2018):
Editoral special issue CarboCat-VII.
In: Catalysis Today, 301, p. 1. Elsevier, ISSN 09205861,
DOI: 10.1016/j.cattod.2017.11.001,
[Article]

Endoh, Kenkoh S. ; Kawakatsu, Toshihiro ; Müller-Plathe, Florian (2018):
Coarse-Grained Molecular Simulation Model for Gecko Feet Keratin.
In: The Journal of Physical Chemistry B, 122 (8), pp. 2203-2212. ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.7b10481,
[Article]

Eslami, Hossein ; Bahri, Kheiri ; Müller-Plathe, Florian (2018):
Solid–Liquid and Solid–Solid Phase Diagrams of Self-Assembled Triblock Janus Nanoparticles from Solution.
In: The Journal of Physical Chemistry C, 122 (16), pp. 9235-9244. ISSN 1932-7447,
DOI: 10.1021/acs.jpcc.8b02043,
[Article]

Emmert, Johannes ; Blume, Niels Göran ; Dreizler, Andreas ; Wagner, Steven (2018):
Data analysis and uncertainty estimation in supercontinuum laser absorption spectroscopy.
In: Scientific Reports, 8 (1), ISSN 2045-2322,
DOI: 10.1038/s41598-018-28705-2,
[Article]

Eigenbrod, Michael ; Bihler, Florian ; Hardt, Steffen (2018):
Electrokinetics of a particle attached to a fluid interface: Electrophoretic mobility and interfacial deformation.
In: Physical Review Fluids, 3 (10), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.3.103701,
[Article]

Eslami, Hossein ; Sedaghat, Parvin ; Müller-Plathe, Florian (2018):
Local bond order parameters for accurate determination of crystal structures in two and three dimensions.
In: Physical Chemistry Chemical Physics, 20 (42), pp. 27059-27068. ISSN 1463-9076,
DOI: 10.1039/c8cp05248d,
[Article]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017,
[Conference or Workshop Item]

Egger, H. ; Seitz, T. ; Tropea, C. (2017):
Enhancement of flow measurements using fluid-dynamic constraints.
In: Journal of Computational Physics, 344, pp. 558-574. ISSN 00219991,
[Article]

Eslami, Hossein ; Khanjari, Neda ; Mueller-Plathe, Florian (2017):
A Local Order Parameter-Based Method for Simulation of Free Energy Barriers in Crystal Nucleation.
In: Journal of chemical theory and computation, 13 (3), pp. 1307-1316. ISSN 1549-9618,
[Article]

Eitel, Felix ; Pareja, Jhon ; Johchi, Ayane ; Böhm, Benjamin ; Geyer, Dirk ; Dreizler, Andreas (2017):
Temporal evolution of auto-ignition of ethylene and methane jets propagating into a turbulent hot air co-flow vitiated with NOx.
In: Combustion and Flame, 177, pp. 193-206. ISSN 0010-2180,
[Article]

Ermuth, Markus ; Pradel, Michael (2016):
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 82-93,
ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931053,
[Conference or Workshop Item]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

Eifert, Alexander ; Petit, Julien ; Baier, Tobias ; Bonaccurso, Elmar ; Hardt, Steffen (2015):
Inscribing wettability gradients onto polymer substrates with different stiffness using corona discharge in point-to-plane geometry.
In: Applied Surface Science, 330, pp. 104-110. ISSN 0169-4332,
[Article]

Eitel, Felix ; Pareja, Jhon ; Geyer, Dirk ; Johchi, Ayane ; Michel, Florian ; Elsaesser, Wolfgang ; Dreizler, Andreas (2015):
A novel plasma heater for auto-ignition studies of turbulent non-premixed flows.
In: Experiments in Fluids, 56 (10), ISSN 0723-4864,
[Article]

Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. (2014):
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4), pp. 29-37. DOI: 10.1109/MSP.2014.38,
[Article]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

F

Fischlin, Marc ; Rohrbach, Felix (2021):
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 9.-13.05.2021, [Conference or Workshop Item]

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Conference or Workshop Item]

Fickel, Beatrice ; Postulka, Niels ; Hartmann, Maximilian ; Gründing, Dirk M. ; Nau, Maximilian ; Meckel, Tobias ; Biesalski, Markus (2021):
Changes of meniscus shapes and capillary rise heights under hypergravity.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 610, Elsevier ScienceDirect, ISSN 0927-7757,
DOI: 10.1016/j.colsurfa.2020.125688,
[Article]

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Conference or Workshop Item]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2021):
Zero-Interaction Security-Towards Sound Experimental Validation. (Postprint)
In: GetMobile: Mobile Computing and Communications, 23 (2), Association for Computing Machinery (ACM), ISSN 2375-0529, e-ISSN 2375-0537,
DOI: 10.26083/tuprints-00018518,
[Article]

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020):
Information-Theoretic Security of Cryptographic Channels.
In: Information and Communications Security, pp. 295-311,
Springer Nature, 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-26.08.2021, ISBN 978-3-030-61078-4,
DOI: 10.1007/978-3-030-61078-4_17,
[Conference or Workshop Item]

Fricke, Mathis ; Bothe, Dieter (2020):
Boundary conditions for dynamic wetting - A mathematical analysis.
In: The European Physical Journal Special Topics, 229 (10), pp. 1849-1865. Springer, ISSN 1951-6355,
DOI: 10.1140/epjst/e2020-900249-7,
[Article]

Fricke, Mathis ; Marić, Tomislav ; Bothe, Dieter (2020):
Contact line advection using the geometrical Volume-of-Fluid method.
In: Journal of Computational Physics, 407, Elsevier, ISSN 0021-9991,
DOI: 10.1016/j.jcp.2019.109221,
[Article]

Friedrich, Jonas ; Schäfer, Michael (2020):
Towards an Acoustic Simulation of a Water Drop Impacting in a Water Pool.
In: Flow, Turbulence and Combustion, 2020, pp. 1-17. Springer, ISSN 1386-6184,
DOI: 10.1007/s10494-020-00130-4,
[Article]

Friman-Gayer, Udo (2020):
Probing Nuclear Structure Relevant for Neutrinoless Double-Beta Decay with Nuclear Resonance Fluorescence.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00011385,
[Ph.D. Thesis]

Fischlin, Marc ; Harasser, Patrick ; Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Conference or Workshop Item]

Fraga, G.C. ; Miranda, F.C. ; França, F.H.R. ; Janicka, J. ; Coelho, P.J. (2020):
Assessment of a model for emission subgrid-scale turbulence-radiation interaction applied to a scaled Sandia flame DD.
248, In: Journal of Quantitative Spectroscopy and Radiative Transfer, p. 106986. ISSN 00224073,
DOI: 10.1016/j.jqsrt.2020.106986,
[Article]

Feldmann, Johannes ; Roisman, Ilia V. ; Tropea, Cameron (2020):
Dynamics of a steady liquid flow in a rim bounding a falling wall film: Influence of aerodynamic effects.
5, In: Physical Review Fluids, (6), ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.5.064001,
[Article]

Fricke, Mathis ; Marić, Tomislav ; Bothe, Dieter (2019):
Contact line advection using the geometrical Volume-of-Fluid method.
[Report]

Fricke, Mathis ; Maric, T. ; Bothe, D. (2019):
Contact line advection using the Level Set method.
In: Proceedings in Applied Mathematics and Mechanics, 19 (1), Wiley-VCH, ISSN 1617-7061,
DOI: 10.1002/pamm.201900476,
[Article]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), pp. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Article]

Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Article]

Fischler, Yannic ; Lehr, Jan-Patrick ; Kiehn, Matthäus Magnus ; Bischof, Christian (2019):
Automatic identification of standard template algorithms in raw loops.
In: AI-SEPS 2019: Proceedings of the 6th ACM SIGPLAN International Workshop on AI-Inspired and Empirical Methods for Software Engineering on Parallel Computing Systems, pp. 11-14,
ACM, 6th ACM SIGPLAN International Workshop on AI-Inspired and Empirical Methods for Software Engineering on Parallel Computing Systems, Athens, Greece, 22.10.2019, ISBN 978-1-4503-6983-1,
DOI: 10.1145/3358500.3361568,
[Conference or Workshop Item]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Fricke, Mathis ; Maric, Tomislav ; Bothe, DieterContact Line Advection using the Level Set Method : Data and C++ Implementations.
DOI: 10.25534/tudatalib-58,
[Data]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Master Thesis]

Fricke, Mathis ; Köhne, Matthias ; Bothe, Dieter (2019):
A kinematic evolution equation for the dynamic contact angle and some consequences.
In: Physica D: Nonlinear Phenomena, ISSN 01672789,
DOI: 10.1016/j.physd.2019.01.008,
[Article]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Article]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Master Thesis]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF),
IEEE, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, pp. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Conference or Workshop Item]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, pp. 202-220,
16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, [Conference or Workshop Item]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Fräbel, Sabine ; Wagner, Bastian ; Krischke, Markus ; Schmidts, Volker ; Thiele, Christina M. ; Staniek, Agata ; Warzecha, Heribert (2018):
Engineering of new-to-nature halogenated indigo precursors in plants.
In: Metabolic Engineering, 46, pp. 20-27. ISSN 1096-7184,
DOI: 10.1016/j.ymben.2018.02.003,
[Article]

Fink, V. ; Cai, X. ; Stroh, A. ; Bernard, R. ; Kriegseis, J. ; Frohnapfel, B. ; Marschall, H. ; Wörner, M. (2018):
Drop bouncing by micro-grooves.
In: International Journal of Heat and Fluid Flow, 70, pp. 271-278. ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.02.014,
[Article]

Forooghi, Pourya ; Weidenlener, Alex ; Magagnato, Franco ; Böhm, Benjamin ; Kubach, Heiko ; Koch, Thomas ; Frohnapfel, Bettina (2018):
DNS of momentum and heat transfer over rough surfaces based on realistic combustion chamber deposit geometries.
In: International Journal of Heat and Fluid Flow, 69, pp. 83-94. ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2017.12.002,
[Article]

Falcone, M. ; Bothe, D. ; Marschall, H. (2018):
3D direct numerical simulations of reactive mass transfer from deformable single bubbles: An analysis of mass transfer coefficients and reaction selectivities.
In: Chemical Engineering Science, 177, pp. 523-536. ISSN 00092509,
DOI: 10.1016/j.ces.2017.11.024,
[Article]

Fegan, Sarah K. ; Kirsch, Peer ; Müller-Plathe, Florian (2018):
The alignment of dichroic dyes in a nematic liquid crystal: a molecular dynamics investigation.
In: Liquid Crystals, 45 (9), pp. 1377-1384. ISSN 0267-8292,
DOI: 10.1080/02678292.2018.1441456,
[Article]

Fricke, Mathis ; Köhne, Matthias ; Bothe, Dieter (2018):
On the Kinematics of Contact Line Motion.
In: PAMM, 18 (1), pp. e201800451. ISSN 16177061,
DOI: 10.1002/pamm.201800451,
[Article]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelor Thesis]

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS),
Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference or Workshop Item]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Conference or Workshop Item]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]

Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]

Fenner, Andreas ; Stephan, Peter (2017):
Two dye combinations suitable for two‐color/two‐dye laser‐induced fluorescence thermography for ethanol.
In: Experiments in Fluids, 58 (6), p. 65. Springer, ISSN 1432-1114,
[Article]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017),
IEEE, Paris, France, [Conference or Workshop Item]

Fischer, Sebastian ; Sahu, R. P. ; Sinha-Ray, S. ; Yarin, A. L. ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2017):
Effect of nano-textured heater surfaces on evaporation at a single meniscus.
In: International Journal of Heat and Mass Transfer, 108, pp. 2444-2450. ISSN 00179310,
[Article]

Franz, Benjamin ; Stephan, Peter (2017):
Numerical simulation of nucleate boiling in microgravity in presence of a shear flow.
Napoli (Italy), May 28-June 1, 2017, DOI: 10.1615/ICHMT.2017.CHT-7.810,
[Conference or Workshop Item]

Farwig, Reinhard ; Kozono, Hideo ; Wegmann, David (2017):
Existence of strong solutions and decay of turbulent solutions of Navier–Stokes flow with nonzero Dirichlet boundary data.
In: Journal of Mathematical Analysis and Applications, 453 (1), pp. 271-286. ISSN 0022247X,
[Article]

Falcone, Manuel ; Marschall, Holger (2017):
Explicit Radial-Basis-Function-Based Finite-Difference Method for Interfacial Mass-Transfer Problems.
In: Chemical Engineering & Technology, 40 (8), pp. 1385-1390. ISSN 09307516,
[Article]

Forooghi, Pourya ; Stroh, Alexander ; Magagnato, Franco ; Jakirlić, Suad ; Frohnapfel, Bettina (2017):
Toward a Universal Roughness Correlation.
In: Journal of Fluids Engineering, 139 (12), p. 121201. ISSN 0098-2202,
DOI: 10.1115/1.4037280,
[Article]

Frigge, Lorenz ; Ströhle, Jochen ; Epple, Bernd (2017):
Release of sulfur and chlorine gas species during coal combustion and pyrolysis in an entrained flow reactor.
In: Fuel, 201, pp. 105-110. ISSN 00162361,
[Article]

Fischer, Michael ; Lindemann, Florian ; Ulbrich, Michael ; Ulbrich, Stefan (2017):
Fréchet Differentiability of Unsteady Incompressible Navier--Stokes Flow with Respect to Domain Variations of Low Regularity by Using a General Analytical Framework.
In: SIAM Journal on Control and Optimization, 55 (5), pp. 3226-3257. ISSN 0363-0129,
DOI: 10.1137/16m1089563,
[Article]

Freudigmann, H.-A. ; Dörr, Aaron ; Iben, Uwe ; Pelz, P. F. (2017):
Modeling of Cavitation-Induced Air Release Phenomena in Micro-Orifice Flows.
In: Journal of Fluids Engineering, 139 (11), p. 111301. ISSN 0098-2202,
DOI: 10.1115/1.4037048,
[Article]

Fojtik, Roman (2016):
Salt Synchronization Service.
Darmstadt, Technische Universität, [Bachelor Thesis]

Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro (2016):
Capture and Replay: Reproducible Network Experiments in Mininet.
In: SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, pp. 621-622,
ACM, Florianopolis, Brazil, ISBN 978-1-4503-4193-6,
DOI: 10.1145/2934872.2959076,
[Conference or Workshop Item]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Conference or Workshop Item]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016),
IEEE, San Jose, California, USA, [Conference or Workshop Item]

Falk, Paul Michael ; Meggers, F. ; Stephan, Peter ; Dammel, Frank (2016):
Comparison of District Heating Systems and Distributed Geothermal Network for Optimal Exergetic Performance.
In: Expanding Boundaries: Systems Thinking for the Built Environment,
Sustainable Built Environment (SBE) Regional Conference, [Conference or Workshop Item]

Farwig, Reinhard ; Rosteck, Veronika (2016):
Note on Friedrichs' inequality in N-star-shaped domains.
In: Journal of Mathematical Analysis and Applications, 435 (2), pp. 1514-1524. ISSN 0022-247X,
[Article]

Farwig, Reinhard ; Riechwald, Paul Felix (2016):
REGULARITY CRITERIA FOR WEAK SOLUTIONS OF THE NAVIER-STOKES SYSTEM IN GENERAL UNBOUNDED DOMAINS.
In: Discrete and Continuous Dynamical Systems-Series S, 9 (1), pp. 157-172. ISSN 1937-1632,
[Article]

Farwig, Reinhard ; Rosteck, Veronika (2016):
RESOLVENT ESTIMATES OF THE STOKES SYSTEM WITH NAVIER BOUNDARY CONDITIONS IN GENERAL UNBOUNDED DOMAINS.
In: Advances in Differential Equations, 21 (5-6), pp. 401-428. ISSN 1079-9389,
[Article]

Farwig, Reinhard ; Giga, Yoshikazu ; Hsu, Pen-Yuan (2016):
Initial Values for the Navier-Stokes Equations in Spaces with Weights in Time.
In: Funkcialaj Ekvacioj-Serio Internacia, 59 (2), pp. 199-216. ISSN 0532-8721,
[Article]

Falconi, C. J. ; Lehrenfeld, C. ; Marschall, H. ; Meyer, C. ; Abiev, R. ; Bothe, D. ; Reusken, A. ; Schlueter, M. ; Woerner, M. (2016):
Numerical and experimental analysis of local flow phenomena in laminar Taylor flow in a square mini-channel.
In: Physics of Fluids, 28 (1), ISSN 1070-6631,
[Article]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
Darmstadt, Technische Universität, [Master Thesis]

Freystein, Martin ; Kolberg, Felix ; Spiegel, Lucas ; Sinha-Ray, Sumit ; Sahu, Rakesh P. ; Yarin, Alexander L. ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2016):
Trains of Taylor bubbles over hot nano-textured mini-channel surface.
In: International Journal of Heat and Mass Transfer, 93, pp. 827-833. ISSN 0017-9310,
[Article]

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062322,
[Article]

Fath, Anja ; Bothe, Dieter (2015):
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, 77, pp. 209-221. ISSN 0301-9322,
[Article]

Fath, Anja ; Bothe, Dieter (2015):
Direct numerical simulations of thermocapillary migration of a droplet attached to a solid wall.
In: International Journal of Multiphase Flow, 77, pp. 209-221. ISSN 0301-9322,
[Article]

Fischlin, Marc ; Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: WPES '15, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pp. 55-64,
ACM, Denver, Colorado, USA, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Conference or Workshop Item]

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28.-30. Sept. 2015, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, pp. 545-564,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, 48 (2), IOP Publishing Ltd., ISSN 0953-4075,
DOI: 10.1088/0953-4075/48/2/025501,
[Article]

Fischer, Sebastian ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2015):
On the development of a thin evaporating liquid film at a receding liquid/vapour-interface.
In: International Journal of Heat and Mass Transfer, 88, pp. 346-356. ISSN 0017-9310,
[Article]

Fabbiane, Nicolo ; Simon, Bernhard ; Fischer, Felix ; Grundmann, Sven ; Bagheri, Shervin ; Henningson, Dan S. (2015):
On the role of adaptivity for robust laminar flow control.
In: Journal of Fluid Mechanics, 767, pp. 767 R1-12. ISSN 0022-1120,
[Article]

Fath, Anja ; Horn, Tobias ; Gambaryan-Roisman, Tatiana ; Stephan, Peter ; Bothe, Dieter (2015):
Numerical and experimental analysis of short-scale Marangoni convection on heated structured surfaces.
In: International Journal of Heat and Mass Transfer, 86, pp. 764-779. ISSN 0017-9310,
[Article]

Farwig, Reinhard ; Nakatsuka, Tomoyuki ; Taniuchi, Yasushi (2015):
Existence of solutions on the whole time axis to the Navier-Stokes equations with precompact range in L (3).
In: Archiv Der Mathematik, 104 (6), pp. 539-550. ISSN 0003-889X,
[Article]

Farwig, Reinhard ; Riechwald, Paul Felix (2015):
Very weak solutions to the Navier-Stokes system in general unbounded domains.
In: Journal of Evolution Equations, 15 (2), pp. 253-279. ISSN 1424-3199,
[Article]

Fuest, Frederik ; Barlow, Robert S. ; Magnotti, Gaetano ; Dreizler, Andreas ; Ekoto, Isaac W. ; Sutton, Jeffrey A. (2015):
Quantitative acetylene measurements in laminar and turbulent flames using 1D Raman/Rayleigh scattering.
In: Combustion and Flame, 162 (5), pp. 2248-2255. ISSN 0010-2180,
[Article]

Farwig, Reinhard ; Nakatsuka, Tomoyuki ; Taniuchi, Yasushi (2015):
Uniqueness of Solutions on the Whole Time Axis to the Navier-Stokes Equations in Unbounded Domains.
In: Communications in Partial Differential Equations, 40 (10), pp. 1884-1904. ISSN 0360-5302,
[Article]

Farwig, Reinhard ; Riechwald, Paul Felix (2015):
Very weak solutions and the Fujita-Kato approach to the Navier-Stokes system in general unbounded domains.
In: Nodea-Nonlinear Differential Equations and Applications, 22 (5), pp. 1143-1165. ISSN 1021-9722,
[Article]

Fiorina, B. ; Mercier, R. ; Kuenne, G. ; Ketelheun, Anja ; Avdic, Amer ; Janicka, J. ; Geyer, D. ; Dreizler, A. ; Alenius, E. ; Duwig, C. ; Trisjono, P. ; Kleinheinz, K. ; Kang, S. ; Pitsch, H. ; Proch, F. ; Marincola, F. Cavallo ; Kempf, A. (2015):
Challenging modeling strategies for LES of non-adiabatic turbulent stratified combustion.
In: Combustion and Flame, 162 (11), pp. 4264-4282. ISSN 0010-2180,
[Article]

Farwig, Reinhard ; Sohr, Hermann ; Varnhorn, Werner (2015):
LOCAL STRONG SOLUTIONS OF THE NONHOMOGENEOUS NAVIER-STOKES SYSTEM WITH CONTROL OF THE INTERVAL OF EXISTENCE.
In: Topological Methods in Nonlinear Analysis, 46 (2), pp. 999-1012. ISSN 1230-3429,
[Article]

Fleckenstein, Stefan ; Bothe, Dieter (2015):
A Volume-of-Fluid-based numerical method for multi-component mass transfer with local volume changes.
In: Journal of Computational Physics, 301, pp. 35-58. ISSN 0021-9991,
[Article]

Fehr, Victoria ; Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015, p. 765. [Article]

Fischlin, Marc ; Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p. 12,
ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, pp. 191-205,
Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1401-1414,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
8409, In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, pp. 244-249,
[Conference or Workshop Item]

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
27, In: J. Cryptology, pp. 397-428,
DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]

Felzer, Torsten ; Rinderknecht, Stephan (2013):
Mouse mode of OnScreenDualScribe: Three types of keyboard-driven mouse replacement.
In: CHI '13 Extended Abstracts on Human Factors in Computing Systems, pp. 1593-1598, ACM Press, ISBN 978-1-4503-1952-2,
DOI: 10.1145/2468356.2468641,
[Book Section]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013,
Bergen (Norway), [Conference or Workshop Item]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Fehr, Victoria (2012):
Sophisticated Public-Key Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

G

Guo, Xiaogang ; Peng, Chong ; Wu, Wei ; Wang, Yongqi (2021):
Unified constitutive model for granular–fluid mixture in quasi-static and dense flow regimes.
In: Acta Geotechnica, 16 (3), pp. 775-787. Springer Nature, ISSN 1861-1125,
DOI: 10.1007/s11440-020-01044-1,
[Article]

Gründing, Dirk ; Smuda, Martin ; Antritter, Thomas ; Fricke, Mathis ; Rettenmaier, Daniel ; Kummer, Florian ; Stephan, Peter ; Marschall, Holger ; Bothe, Dieter (2020):
A comparative study of transient capillary rise using direct numerical simulations.
In: Applied Mathematical Modelling, 86, pp. 142 - 165. ISSN 0307-904X,
DOI: 10.1016/j.apm.2020.04.020,
[Article]

Gholijani, Alireza ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2020):
Experimental investigation of hydrodynamics and heat transport during vertical coalescence of multiple successive drops impacting a hot wall under saturated vapor atmosphere.
In: Experimental Thermal and Fluid Science, 118, p. 110145. ISSN 08941777,
DOI: 10.1016/j.expthermflusci.2020.110145,
[Article]

Glanz, Leonid ; Müller, Patrick ; Baumgärtner, Lars ; Reif, Michael ; Anthonysamy, Pauline ; Mezini, Mira (2020):
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 694-707,
ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10, ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384745,
[Conference or Workshop Item]

Ghillani, Noemi ; Heinz, Michael ; Gambaryan-Roisman, Tatiana (2020):
Capillary rise and evaporation of a liquid in a corner between a plane and a cylinder: A model of imbibition into a nanofiber mat coating.
In: The European Physical Journal Special Topics, 229 (10), pp. 1799-1818. Springer, ISSN 1951-6355,
DOI: 10.1140/epjst/e2020-000011-y,
[Article]

Giga, Yoshikazu ; Gries, Mathis ; Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2020):
The hydrostatic Stokes semigroup and well-posedness of the primitive equations on spaces of bounded functions.
In: Journal of Functional Analysis, 279 (3), p. 108561. ISSN 00221236,
DOI: 10.1016/j.jfa.2020.108561,
[Article]

Greifenstein, M. ; Heinze, J. ; Willert, C. ; Voigt, L. ; Zedda, M. ; Richter, C. ; Dreizler, A. (2020):
Time-resolved temperature profile measurements in the exhaust of a single sector gas turbine combustor at realistic operating conditions.
In: Experiments in Fluids, 61 (8), p. 177. Springer, ISSN 0723-4864,
DOI: 10.1007/s00348-020-03011-8,
[Article]

Gholijani, Alireza ; Schlawitschek, Christiane ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2020):
Heat transfer during drop impingement onto a hot wall: The influence of wall superheat, impact velocity, and drop diameter.
In: International Journal of Heat and Mass Transfer, 153, p. 119661. Elsevier, ISSN 00179310,
DOI: 10.1016/j.ijheatmasstransfer.2020.119661,
[Article]

Ganguly, Pritam ; Polák, Jakub ; van der Vegt, Nico F. A. ; Heyda, Jan ; Shea, Joan-Emma (2020):
Protein Stability in TMAO and Mixed Urea–TMAO Solutions.
In: The Journal of Physical Chemistry B, 124 (29), pp. 6181-6197. ISSN 1520-6106,
DOI: 10.1021/acs.jpcb.0c04357,
[Article]

Gerlach, Felix ; Hussong, Jeanette ; Roisman, Ilia V ; Tropea, Cameron (2020):
Capillary rivulet rise in real-world corners.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 592, p. 124530. ISSN 09277757,
DOI: 10.1016/j.colsurfa.2020.124530,
[Article]

Geyer, Florian ; D’Acunzi, Maria ; Sharifi-Aghili, Azadeh ; Saal, Alexander ; Gao, Nan ; Kaltbeitzel, Anke ; Sloot, Tim-Frederik ; Berger, Rüdiger ; Butt, Hans-Jürgen ; Vollmer, Doris (2020):
When and how self-cleaning of superhydrophobic surfaces works.
In: Science Advances, 6 (3), pp. eaaw9727. American Association for the Advancement of Science, ISSN 2375-2548,
DOI: 10.1126/sciadv.aaw9727,
[Article]

Gerlach, Felix ; Hartmann, Maximilian ; Tropea, Cameron (2019):
The interaction of inner and outer surface corners during spontaneous wetting.
583, In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 2019, p. 123977. ISSN 09277757,
DOI: 10.1016/j.colsurfa.2019.123977,
[Article]

Giga, Yoshikazu ; Gries, Mathis ; Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2019):
Analyticity of solutions to the primitive equations.
In: Mathematische Nachrichten, 2020, ISSN 0025-584X,
DOI: 10.1002/mana.201700401,
[Article]

Gründing, Dirk ; Fricke, Mathis ; Bothe, Dieter (2019):
Capillary Rise ‐ Jurin's Height vs Spherical Cap.
In: PAMM, 19 (1), pp. e201900336. ISSN 1617-7061,
DOI: 10.1002/pamm.201900336,
[Article]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]

Geschwindner, Christopher ; Kranz, Patrick ; Welch, Cooper ; Schmidt, Marius ; Böhm, Benjamin ; Kaiser, Sebastian A. ; De la Morena, Joaquin (2019):
Analysis of the interaction of Spray G and in-cylinder flow in two optical engines for late gasoline direct injection.
In: International Journal of Engine Research, (Online First), p. 146808741988153. Sage Publications, ISSN 1468-0874,
DOI: 10.1177/1468087419881535,
[Article]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference or Workshop Item]

Gräßle, Carmen ; Hinze, Michael ; Lang, Jens ; Ullmann, Sebastian (2019):
POD model order reduction with space-adapted snapshots for incompressible flows.
In: Advances in Computational Mathematics, 45, pp. 2401-2428. Springer, ISSN 1019-7168,
DOI: 10.1007/s10444-019-09716-7,
[Article]

Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer, Hamburg, Germany, 8. bis 11. September 2019, ISBN 978-1-4503-7198-8,
DOI: 10.1145/3340764.3340782,
[Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Article]

Grefe, Ann-Kathrin ; Kuttich, Björn ; Stühn, Lukas ; Stark, Robert ; Stühn, Bernd (2019):
Oriented crystallization of PEG induced by confinement in cylindrical nanopores: Structural and thermal properties.
In: Soft Matter, (15), pp. 3149-3159. ISSN 1744-683X,
DOI: 10.1039/C9SM00053D,
[Article]

Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Conference or Workshop Item]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Conference or Workshop Item]

Geyer, Florian ; Seiler, Patrick M. ; Vollmer, Doris ; Berger, Rüdiger (2019):
Wie sich Tropfen bewegen.
In: Physik in unserer Zeit, 50 (2), pp. 90-96. ISSN 00319252,
DOI: 10.1002/piuz.201901531,
[Article]

Geyer, Florian ; Asaumi, Yuta ; Vollmer, Doris ; Butt, Hans-Jürgen ; Nakamura, Yoshinobu ; Fujii, Syuji (2019):
Polyhedral Liquid Marbles.
In: Advanced Functional Materials, 29 (25), p. 1808826. Wiley-Blackwell - STM, ISSN 1616301X,
DOI: 10.1002/adfm.201808826,
[Article]

Gambaryan-Roisman, Tatiana (2019):
Simultaneous imbibition and evaporation of liquids on grooved substrates.
7, In: Interfacial Phenomena and Heat Transfer, 2019 (3), pp. 239-253. Begell, ISSN 2169-2785, e-ISSN 2167-857X,
DOI: 10.1615/InterfacPhenomHeatTransfer.2019031166,
[Article]

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: Information Security and Cryptology- ICISC 2018, pp. 269-286,
Springer Nature, 21st Annual International Conference on Information Security and Cryptology, Seoul, Korean, 28.-30.11.2018, ISBN 978-3-030-12145-7,
DOI: 10.1007/978-3-030-12146-4_17,
[Conference or Workshop Item]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor Thesis]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference or Workshop Item]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018,
Songdo, Incheon, Korea, The Sixth International Workshop on Security in Cloud Computing (SCC), [Conference or Workshop Item]

Guhl, Conrad ; Kehne, Philipp ; Ma, Qianli ; Tietz, Frank ; Alff, Lambert ; Komissinskiy, Philipp ; Jaegermann, Wolfram ; Hausbrand, René (2018):
In-operando photoelectron spectroscopy for batteries: Set-up using pristine thin film cathode and first results on NaxCoO2.
In: Review of Scientific Instruments, 89 (7), pp. 073104. AMER INST PHYSICS, 1305 WALT WHITMAN RD, STE 300, MELVILLE, NY 11747-4501 USA, ISSN 0034-6748,
DOI: 10.1063/1.5022616,
[Article]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelor Thesis]

Guhl, Conrad ; Kehne, Philipp ; Ma, Qianli ; Tietz, Frank ; Komissinskiy, Philipp ; Jaegermann, Wolfram ; Hausbrand, René (2018):
Interfaces in solid-state sodium-ion batteries: NaCoO 2 thin films on solid electrolyte substrates.
In: Electrochimica Acta, 268, pp. 226-233. Elsevier Science Publishing, ISSN 00134686,
DOI: 10.1016/j.electacta.2018.02.109,
[Article]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, pp. 117-118, Gesellschaft für Informatik, [Book Section]

Godina, Lidia I. ; Tokarev, Anton V. ; Simakova, Irina L. ; Mäki-Arvela, Päivi ; Kortesmäki, Ewelina ; Gläsel, Jan ; Kronberg, Leif ; Etzold, Bastian ; Murzin, Dmitry Yu. (2018):
Aqueous-phase reforming of alcohols with three carbon atoms on carbon-supported Pt.
In: Catalysis Today, 301, pp. 78-89. Elsevier, ISSN 09205861,
DOI: 10.1016/j.cattod.2017.03.042,
[Article]

Gao, Nan ; Geyer, Florian ; Pilat, Dominik W. ; Wooh, Sanghyuk ; Vollmer, Doris ; Butt, Hans-Jürgen ; Berger, Rüdiger (2018):
How drops start sliding over solid surfaces.
In: Nature Physics, 14 (2), pp. 191-196. ISSN 1745-2473,
DOI: 10.1038/nphys4305,
[Article]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Groß, T. F. ; Bauer, J. ; Ludwig, G. ; Fernandez Rivas, D. ; Pelz, P. F. (2018):
Bubble nucleation from micro-crevices in a shear flow.
In: Experiments in Fluids, 59 (1), pp. 1-10. Springer, ISSN 0723-4864,
DOI: 10.1007/s00348-017-2459-y,
[Article]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]

Gao, Yangyang ; Müller-Plathe, Florian (2018):
Molecular Dynamics Study on the Thermal Conductivity of the End-grafted Carbon Nanotubes Filled Polyamide-6.6 Nanocomposites.
In: The Journal of Physical Chemistry C, 122 (2), pp. 1412-1421. ISSN 1932-7447,
DOI: 10.1021/acs.jpcc.7b11310,
[Article]

Ghoussoub, Yara E. ; Zerball, Maximilian ; Fares, Hadi M. ; Ankner, John F. ; von Klitzing, R. ; Schlenoff, Joseph B. (2018):
Ion distribution in dry polyelectrolyte multilayers: a neutron reflectometry study.
In: Soft Matter, 14 (9), pp. 1699-1708. ISSN 1744-683X,
DOI: 10.1039/c7sm02461d,
[Article]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Ganter, Sebastian ; Straßacker, Christina ; Kuenne, Guido ; Meier, Thorsten ; Heinrich, Arne ; Maas, Ulrich ; Janicka, J. (2018):
Laminar near-wall combustion: Analysis of tabulated chemistry simulations by means of detailed kinetics.
In: International Journal of Heat and Fluid Flow, 70, pp. 259-270. ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.02.015,
[Article]

Gugat, Martin ; Ulbrich, Stefan (2018):
Lipschitz solutions of initial boundary value problems for balance laws.
In: Mathematical Models and Methods in Applied Sciences, 28 (05), pp. 921-951. ISSN 0218-2025,
DOI: 10.1142/s0218202518500240,
[Article]

Grebenev, Vladimir N. ; Oberlack, Martin (2018):
Homogeneous Isotropic Turbulence: Geometric and Isometry Properties of the 2-point Velocity Correlation Tensor.
In: Journal of Nonlinear Mathematical Physics, 25 (4), pp. 650-672. ISSN 1402-9251,
DOI: 10.1080/14029251.2018.1503447,
[Article]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11), pp. 680-685. [Article]

Gründing, Dirk ; Bothe, Dieter ; Marschall, Holger (2018):
Wetting phenomena with ALE interface tracking.
In: PAMM, 18 (1), pp. e201800430. ISSN 16177061,
DOI: 10.1002/pamm.201800430,
[Article]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Gerlach, Felix ; Garoff, Stephen ; Tropea, Cameron (2018):
Quantitative optical measurement of contact lines on milliscale metal structures dipped into a liquid pool.
In: Proceedings of the 19th International Symposium on Application of Laser and Imaging Techniques to Fluid Mechanics, pp. 862-875,
Lisbon, 19th International Symposium on Application of Laser and Imaging Techniques to Fluid Mechanics, Lisbon, 16-19 July 2018, ISBN 978-989-20-9177-8,
[Conference or Workshop Item]

Geyer, Florian ; D'Acunzi, Maria ; Yang, Ching-Yu ; Müller, Michael ; Baumli, Philipp ; Kaltbeitzel, Anke ; Mailänder, Volker ; Encinas, Noemí ; Vollmer, Doris ; Butt, Hans-Jürgen (2018):
How to Coat the Inside of Narrow and Long Tubes with a Super-Liquid-Repellent Layer-A Promising Candidate for Antibacterial Catheters.
In: Advanced Materials, 31 (2), p. 1801324. ISSN 09359648,
DOI: 10.1002/adma.201801324,
[Article]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, pp. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Conference or Workshop Item]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, UK, 04.-07.12., [Conference or Workshop Item]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 638-648,
Paderborn, Germany, Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, pp. 279-287,
Gesellschaft für Informatik, Regensburg, Germany, DOI: 10.18420/muc2017-ws05-0405,
[Conference or Workshop Item]

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
[Conference or Workshop Item]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Gielok, Martin ; Lopes, Marcus ; Bonaccurso, Elmar ; Gambaryan-Roisman, Tatiana (2017):
Droplet on an elastic substrate: Finite Element Method coupled with lubrication approximation.
In: Colloids and Surfaces A: Physicochemical and Engineering Aspects, 521, pp. 13-21. ISSN 09277757,
[Article]

Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. (2017):
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
In: CHI'17 CHI Conference on Human Factors in Computing Systems, pp. 3293-3316,
ACM, Denver, CO, USA, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025808,
[Conference or Workshop Item]

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques,
Springer, [Conference or Workshop Item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), pp. 281-297. Springer, ISSN 1615-5270,
[Article]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]

Gugat, Martin ; Ulbrich, Stefan (2017):
The isothermal Euler equations for ideal gas with source term: Product solutions, flow reversal and no blow up.
In: Journal of Mathematical Analysis and Applications, 454 (1), pp. 439-452. ISSN 0022247X,
[Article]

Galdi, Giovanni P. ; Hieber, Matthias ; Kashiwabara, Takahito (2017):
Strong time-periodic solutions to the 3D primitive equations subject to arbitrary large forces.
In: Nonlinearity, 30 (10), pp. 3979-3992. ISSN 0951-7715,
DOI: 10.1088/1361-6544/aa8166,
[Article]

Grebenev, V. N. ; Wacławczyk, M. ; Oberlack, M. (2017):
Conformal invariance of the Lungren–Monin–Novikov equations for vorticity fields in 2D turbulence.
In: Journal of Physics A: Mathematical and Theoretical, 50 (43), p. 435502. ISSN 1751-8113,
DOI: 10.1088/1751-8121/aa8c69,
[Article]

Ganter, Sebastian ; Heinrich, Arne ; Meier, Thorsten ; Kuenne, Guido ; Jainski, Christopher ; Rißmann, Martin C. ; Dreizler, Andreas ; Janicka, J. (2017):
Numerical analysis of laminar methane–air side-wall-quenching.
In: Combustion and Flame, 186, pp. 299-310. Elsevier, ISSN 00102180,
DOI: 10.1016/j.combustflame.2017.08.017,
[Article]

Gao, Yangyang ; Müller-Plathe, Florian (2017):
Effect of grafted chains on the heat transfer between carbon nanotubes in a polyamide-6.6 matrix: A molecular dynamics study.
In: Polymer, 129, pp. 228-234. ISSN 00323861,
DOI: 10.1016/j.polymer.2017.09.066,
[Article]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Groß, M. ; Tupinamba Lima, M. ; Uhlig, M. ; Ebraheme, A. ; Roeber, O. ; Olschewski, B. ; von Klitzing, R. ; Schomäcker, R. ; Schwarze, M. (2017):
Biopolymers for dye removal via foam separation.
In: Separation and Purification Technology, 188, pp. 451-457. ISSN 13835866,
DOI: 10.1016/j.seppur.2017.07.025,
[Article]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
pp. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
pp. 18-34, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Gronarz, Tim ; Schulze, Jan ; Laemmerhold, Mischka ; Graeser, Philipp ; Gorewoda, Jeanette ; Kez, Vitali ; Habermehl, Martin ; Schiemann, Martin ; Ströhle, Jochen ; Epple, Bernd ; Scherer, Viktor ; Kneer, Reinhold (2017):
Quantification of the influence of parameters determining radiative heat transfer in an oxy-fuel operated boiler.
In: Fuel Processing Technology, 157, pp. 76-89. ISSN 03783820,
DOI: 10.1016/j.fuproc.2016.11.012,
[Article]

Groß, T. F. ; Pöttgen, P. F. ; Pelz, P. F. (2017):
Analytical Approach for the Optimal Operation of Pumps in Booster Systems.
In: Journal of Water Resources Planning and Management, 143 (8), pp. 04017029. ISSN 0733-9496,
DOI: 10.1061/(asce)wr.1943-5452.0000776,
[Article]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 317 - 324,
IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, [Conference or Workshop Item]

Ghiglieri, Marco ; Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, pp. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Gründing, Dirk ; Fleckenstein, Stefan ; Bothe, Dieter (2016):
A subgrid-scale model for reactive concentration boundary layers for 3D mass transfer simulations with deformable fluid interfaces.
In: International Journal of Heat and Mass Transfer, 101, pp. 476-487. Elsevier, ISSN 0017-9310,
DOI: 10.1016/j.ijheatmasstransfer.2016.04.119,
[Article]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3), pp. pp. 61-67. [Article]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Gumprich, Werner ; Synek, B. ; Sadiki, A. (2016):
ASSESSMENT OF THE DIRECT QUADRATURE-BASED SECTIONAL METHOD OF MOMENTS FOR THE SIMULATION OF EVAPORATING POLYDISPERSE SPRAYS.
In: Atomization and Sprays, 26 (2), pp. 163-186. ISSN 1044-5110,
[Article]

Gao, Yangyang ; Mueller-Plathe, Florian (2016):
Increasing the Thermal Conductivity of Graphene-Polyamide-6,6 Nanocomposites by Surface-Grafted Polymer Chains: Calculation with Molecular Dynamics and Effective-Medium Approximation.
In: Journal of Physical Chemistry B, 120 (7), pp. 1336-1346. ISSN 1520-6106,
[Article]

Geissert, Matthias ; Hieber, Matthias ; Thieu Huy, Nguyen (2016):
A General Approach to Time Periodic Incompressible Viscous Fluid Flow Problems.
In: Archive for Rational Mechanics and Analysis, 220 (3), pp. 1095-1118. ISSN 0003-9527,
[Article]

Golzke, Hendrik ; Leick, Philippe ; Dreizler, Andreas (2016):
Differential infrared thermography of gasoline direct injection sprays.
In: Quantitative Infrared Thermography Journal, 13 (1), pp. 50-69. ISSN 1768-6733,
[Article]

Ganguly, Pritam ; van der Vegt, Nico F. A. ; Shea, Joan-Emma (2016):
Hydrophobic Association in Mixed Urea-TMAO Solutions.
In: Journal of Physical Chemistry Letters, 7 (15), pp. 3052-3059. ISSN 1948-7185,
[Article]

Guan, Lulu ; Yu, Haitao ; Shen, Jianqi ; Tropea, Cameron (2016):
Simulation of optical caustics associated with the tertiary rainbow of oblate droplets.
In: Applied Optics, 55 (23), pp. 6447-6451. ISSN 1559-128X,
[Article]

Guo, Xiaogang ; Peng, Chong ; Wu, Wei ; Wang, Yongqi (2016):
A hypoplastic constitutive model for debris materials.
In: Acta Geotechnica, 11 (6), pp. 1217-1229. ISSN 1861-1125,
[Article]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal,
[Conference or Workshop Item]

Gong, Liang ; Pradel, Michael ; Sen, Koushik (2015):
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: ESEC/FSE 2015, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 357-368,
ACM, Bergamo, Italy, ISBN 978-1-4503-3675-8,
DOI: 10.1145/2786805.2786831,
[Conference or Workshop Item]

Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik (2015):
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: ISSTA 2015, In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 94-105,
ACM, Baltimore, MD, USA, ISBN 978-1-4503-3620-8,
DOI: 10.1145/2771783.2771809,
[Conference or Workshop Item]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), pp. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,
[Article]

Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2), pp. 108 - 113. DOI: 10.1007/s11623-015-0375-y,
[Article]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC,
Las Vegas, NV, [Conference or Workshop Item]

Gambaryan-Roisman, Tatiana (2015):
Modulation of Marangoni convection in liquid films.
In: Advances in colloid and interface science, 222, pp. 319-331. ISSN 0001-8686,
[Article]

Gatti, Davide ; Guettler, Andreas ; Frohnapfel, Bettina ; Tropea, Cameron (2015):
Experimental assessment of spanwise-oscillating dielectric electroactive surfaces for turbulent drag reduction in an air channel flow.
In: Experiments in Fluids, 56 (5), ISSN 0723-4864,
[Article]

Ganguly, Pritam ; Hajari, Timir ; Shea, Joan-Emma ; van der Vegt, Nico F. A. (2015):
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment.
In: Journal of Physical Chemistry Letters, 6 (4), pp. 581-585. ISSN 1948-7185,
[Article]

Ganguly, Pritam ; Hajari, Timir ; Shea, Joan-Emma ; van der Vegt, Nico F. A. (2015):
Mutual Exclusion of Urea and Trimethylamine N-Oxide from Amino Acids in Mixed Solvent Environment (vol 6, pg 581, 2015).
In: Journal of Physical Chemistry Letters, 6 (23), pp. 4728-4729. ISSN 1948-7185,
[Article]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Conference or Workshop Item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), pp. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien,
[Conference or Workshop Item]

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS, In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, pp. 48-63,
Springer, Florianópolis, Brazil, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy, San Jose, California, 18.5.2014, [Conference or Workshop Item]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]

Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
In: Computer Security Symposium 2013, pp. 518-525,
Tokyo, Jōhō Shori Gakkai, Computer Security Symposium 2013, Kagawa, Japan, 21-23 October, 2013, [Conference or Workshop Item]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
Darmstadt, Technische Universität, [Bachelor Thesis]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), pp. 471 - 480,
IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference or Workshop Item]

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), pp. 512-529,
Springer, Leuven, Belgium, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Gupta, Aditi ; Miettinen, Markus ; Nagy, Marcin ; Asokan, Nadarajah ; Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 516-518,
Lugano, Switzerland, ISBN 978-1-4673-0905-9,
DOI: 10.1109/PerComW.2012.6197553,
[Conference or Workshop Item]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Darmstadt, Technische Universität, [Bachelor Thesis]

H

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium, virtual Conference, 11.-13.08.2021, [Conference or Workshop Item]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021):
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
In: WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 374-376,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468251,
[Conference or Workshop Item]

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
In: WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 371-373,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468252,
[Conference or Workshop Item]

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, pp. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Conference or Workshop Item]

Haase, Thorsten ; Alber, Gernot ; Stojanovic, Vladimir M. (2021):
Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems.
In: Physical Review A, 103 (3), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.032427,
[Article]

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]

Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021):
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3), pp. 227-245. Sciendo, e-ISSN 2299-0984,
DOI: 10.2478/popets-2021-0045,
[Article]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy. (Postprint)
In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20),
New York, NY, Association for Computing Machinery (ACM), WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Österreich, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.26083/tuprints-00017839,
[Conference or Workshop Item]

Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021), virtual Conference, 12.-16.07.2021, [Conference or Workshop Item]

Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
pp. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Conference or Workshop Item]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Conference or Workshop Item]

Hieber, Matthias ; Kozono, Hideo ; Seyfert, Anton ; Shimizu, Senjo ; Yanagisawa, Taku (2020):
The Helmholtz–Weyl decomposition of Lr vector fields for two dimensional exterior domains.
In: The Journal of Geometric Analysis, 2020, Springer, ISSN 1050-6926,
DOI: 10.1007/s12220-020-00473-4,
[Article]

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Conference or Workshop Item]

Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020):
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
In: WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 306-316,
ACM, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006,
DOI: 10.1145/3395351.3399423,
[Conference or Workshop Item]

Hieber, Matthias ; Stinner, Christian (2020):
Strong time periodic solutions to Keller-Segel systems: An approach by the quasilinear Arendt-Bu theorem.
In: Journal of Differential Equations, 269 (2), pp. 1636-1655. ISSN 00220396,
DOI: 10.1016/j.jde.2020.01.020,
[Article]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
In: Proceedings of the 13th ACM Conference onSecurity and Privacy in Wireless and MobileNetworks, pp. 331-333,
ACM, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3401796,
[Conference or Workshop Item]

Habibi, Nahal ; Christau, Stephanie ; Ochyl, Lukasz J. ; Fan, Zixing ; Hassani Najafabadi, Alireza ; Kuehnhammer, Matthias ; Zhang, Mengwen ; Helgeson, Matthew ; von Klitzing, R. ; Moon, James J. ; Lahann, Joerg (2020):
Engineered Ovalbumin Nanoparticles for Cancer Immunotherapy.
In: Advanced Therapeutics, p. 2000100. ISSN 2366-3987,
DOI: 10.1002/adtp.202000100,
[Article]

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
pp. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Conference or Workshop Item]

Haussmann, Marc ; Ries, Florian ; Jeppener-Haltenhoff, Jonathan B. ; Li, Yongxiang ; Schmidt, Marius ; Welch, Cooper ; Illmann, Lars ; Böhm, Benjamin ; Nirschl, Hermann ; Krause, Mathias J. ; Sadiki, Amsini (2020):
Evaluation of a Near-Wall-Modeled Large Eddy Lattice Boltzmann Method for the Analysis of Complex Flows Relevant to IC Engines.
In: Computation, 8 (2), p. 43. MDPI, ISSN 2079-3197,
DOI: 10.3390/computation8020043,
[Article]

Herzog, Nicole ; Hübner, Hanna ; Rüttiger, Christian ; Gallei, Markus ; Andrieu-Brunsen, Annette (2020):
Functional Metalloblock Copolymers for the Preparation and In Situ Functionalization of Porous Silica Films.
In: Langmuir, 36 (15), pp. 4015-4024. American Chemical Society, ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.0c00245,
[Article]

Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
GITO, 15th International Conference on Wirtschaftsinformatik (WI2020), Potsdam, Germany, 08.-11.03.2020, DOI: 10.30844/wi_2020_o2-haunschild,
[Conference or Workshop Item]

Hori, Yohei ; Bothe, Dieter ; Hayashi, Kosuke ; Hosokawa, Shigeo ; Tomiyama, Akio (2020):
Mass transfer from single carbon-dioxide bubbles in surfactant-electrolyte mixed aqueous solutions in vertical pipes.
124, In: International Journal of Multiphase Flow, p. 103207. Elsevier, ISSN 03019322, e-ISSN 18793533,
DOI: 10.1016/j.ijmultiphaseflow.2020.103207,
[Article]

Hieber, Matthias ; Kajiwara, Naoto ; Kress, Klaus ; Tolksdorf, Patrick (2020):
The periodic version of the Da Prato–Grisvard theorem and applications to the bidomain equations with FitzHugh–Nagumo transport.
In: Annali di Matematica Pura ed Applicata (1923 -), ISSN 0373-3114,
DOI: 10.1007/s10231-020-00975-6,
[Article]

Hardt, Steffen ; Hartmann, Johannes ; Zhao, Sicheng ; Bandopadhyay, Aditya (2020):
Electric-Field-Induced Pattern Formation in Layers of DNA Molecules at the Interface between Two Immiscible Liquids.
124, In: Physical Review Letters, (6), pp. 064501. APS Physics, ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.124.064501,
[Article]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]

Hartmann, Maximilian ; Fricke, Mathis ; Weimar, Lukas ; Gründing, Dirk ; Marić, Tomislav ; Bothe, Dieter ; Hardt, Steffen (2019):
Breakup dynamics of capillary bridges on hydrophobic stripes.
In: arXiv-Physics, In: Fluid Dynamics, (Preprint), [Article]

Henrich, Franziska ; Linke, Dorota ; Sauer, Hans Martin ; Dörsam, Edgar ; Hardt, Steffen ; Butt, Hans-Jürgen ; Auernhammer, Günter K. (2019):
Forced dynamic dewetting of structured surfaces: Influence of surfactants.
4, In: Physical Review Fluids, 2019 (12), p. 124202. American Physical Society, ISSN 2469-990X,
DOI: 10.1103/PhysRevFluids.4.124202,
[Article]

Hatakenaka, Ryuta ; Breitenbach, Jan ; Roisman, Ilia V. ; Tropea, Cameron ; Tagawa, Yoshiyuki (2019):
Magic carpet breakup of a drop impacting onto a heated surface in a depressurized environment.
145, In: International Journal of Heat and Mass Transfer, 2019, p. 118729. Elsevier, ISSN 00179310,
DOI: 10.1016/j.ijheatmasstransfer.2019.118729,
[Article]

Haubner, Johannes ; Ulbrich, Michael ; Ulbrich, Stefan (2019):
Analysis of shape optimization problems for unsteady fluid-structure interaction.
In: Inverse Problems, 2019, Institute of Physics Publishing (IOP), ISSN 0266-5611, e-ISSN 1361-6420,
DOI: 10.1088/1361-6420/ab5a11,
[Article]

Hill, Simon ; Acher, Thomas ; Hoffmann, Rainer ; Ferstl, Johann ; Deising, Daniel ; Marschall, Holger ; Rehfeldt, Sebastian ; Klein, Harald (2019):
Quantifizierung der Trenneffizienz einer strukturierten Packung mittels numerischer Simulation.
In: Chemie Ingenieur Technik, ISSN 0009-286X,
DOI: 10.1002/cite.201900041,
[Article]

Heß, Julian ; Tai, Yih-Chin ; Wang, Yongqi (2019):
Debris flows with pore pressure and intergranular friction on rugged topography.
In: Computers & Fluids, 190, pp. 139-155. ISSN 00457930,
DOI: 10.1016/j.compfluid.2019.06.015,
[Article]

Hark, Rhaban Simon (2019):
Monitoring Federated Softwarized Networks: Approaches for Efficient and Collaborative Data Collection in Large-Scale Software-Defined Networks.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Heidt, Margareta ; Gerlach, Jin ; Buxmann, Peter (2019):
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
Hawaii International Conference on System Sciences (HICSS), Wailea, USA, 08.-11.01.2019, [Conference or Workshop Item]

Heidt, Margareta ; Olt, Christian M. ; Buxmann, Peter (2019):
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
Internationale Tagung Wirtschaftsinformatik, Siegen, Deutschland, 24.02.2019-27.02.2019, [Conference or Workshop Item]

Heß, Julian ; Wang, Yongqi (2019):
On the role of pore-fluid pressure evolution and hypoplasticity in debris flows.
In: European Journal of Mechanics - B/Fluids, 74, pp. 363-379. ISSN 09977546,
DOI: 10.1016/j.euromechflu.2018.09.005,
[Article]

Hartmann, Maximilian ; Hardt, Steffen (2019):
Stability of Evaporating Droplets on Chemically Patterned Surfaces.
In: Langmuir, 35 (14), pp. 4868-4875. ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.9b00172,
[Article]

Hartl, S. ; Van Winkle, R. ; Geyer, D. ; Dreizler, A. ; Magnotti, G. ; Hasse, C. ; Barlow, R.S. (2019):
Assessing the relative importance of flame regimes in Raman/Rayleigh line measurements of turbulent lifted flames.
In: Proceedings of the Combustion Institute, 37 (2), pp. 2297-2305. ISSN 15407489,
DOI: 10.1016/j.proci.2018.06.067,
[Article]

Han, Wang ; Wang, Haiou ; Kuenne, Guido ; Hawkes, Evatt R. ; Chen, Jacqueline H. ; Janicka, Johannes ; Hasse, Christian (2019):
Large eddy simulation/dynamic thickened flame modeling of a high Karlovitz number turbulent premixed jet flame.
In: Proceedings of the Combustion Institute, 37 (2), pp. 2555-2563. ISSN 15407489,
DOI: 10.1016/j.proci.2018.06.228,
[Article]

Han, Wang ; Scholtissek, Arne ; Hasse, Christian (2019):
The role of tangential diffusion in evaluating the performance of flamelet models.
In: Proceedings of the Combustion Institute, 37 (2), pp. 1767-1774. ISSN 15407489,
DOI: 10.1016/j.proci.2018.06.171,
[Article]

Hieber, Matthias ; Mahalov, Alex ; Takada, Ryo (2019):
Time periodic and almost time periodic solutions to rotating stratified fluids subject to large forces.
In: Journal of Differential Equations, 266 (2-3), pp. 977-1002. ISSN 00220396,
DOI: 10.1016/j.jde.2018.07.067,
[Article]

Hänichen, Philipp ; Bender, Achim ; Voß, Bernhard ; Gambaryan-Roisman, Tatiana ; Stephan, Peter (2019):
Drop evaporation of hydrocarbon fluids with deposit formation.
In: International Journal of Heat and Mass Transfer, 128, pp. 115 - 124. ISSN 0017-9310,
DOI: 10.1016/j.ijheatmasstransfer.2018.08.102,
[Article]

Haaf, Martin ; Ohlemüller, Peter ; Ströhle, Jochen ; Epple, Bernd (2019):
Techno-economic assessment of alternative fuels in second-generation carbon capture and storage processes.
In: Mitigation and Adaptation Strategies for Global Change, ISSN 1381-2386,
DOI: 10.1007/s11027-019-09850-z,
[Article]

Hartwig, Katrin ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Hartwig, Katrin ; Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Herzog, Nicole ; Brilmayer, Robert ; Stanzel, Mathias ; Kalyta, Anastasia ; Spiehl, Dieter ; Dörsam, Edgar ; Hess, Christian ; Andrieu-Brunsen, Annette (2019):
Gravure printing for mesoporous film preparation.
In: RSC Advances, 9 (41), pp. 23570-23578. Royal Socienty of Chemistry, ISSN 2046-2069,
DOI: 10.1039/C9RA04266K,
[Article]

Hill, H. ; Ding, C.-P. ; Baum, E. ; Böhm, B. ; Dreizler, A. ; Peterson, B. (2019):
An application of tomographic PIV to investigate the spray-induced turbulence in a direct-injection engine.
In: International Journal of Multiphase Flow, 121, p. 103116. Elsevier, ISSN 0301-9322,
DOI: 10.1016/j.ijmultiphaseflow.2019.103116,
[Article]

Heidt, Margareta ; Gerlach, Jin (2018):
The Influence of SME Constraints in an Organizational IT Security Context.
San Francisco, USA, International Conference on Information Systems (ICIS), San Francisco, USA, 13.-16.12.2018, [Conference or Workshop Item]

Hutter, Kolumban ; Wang, Yongqi (2018):
Fluid and Thermodynamics. Volume 3: Structured and Multiphase Fluids.
Springer, ISSN 1866-8348, ISBN 978-3-319-77744-3,
DOI: 10.1007/978-3-319-77745-0,
[Book]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Conference or Workshop Item]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelor Thesis]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Master Thesis]

Haaf, Martin ; Hilz, Jochen ; Helbig, Martin ; Weingärtner, Christoph ; Stallmann, Olaf ; Ströhle, Jochen ; Epple, Bernd (2018):
Assessment of the operability of a 20 MWth calcium looping demonstration plant by advanced process modelling.
In: International Journal of Greenhouse Gas Control, 75, pp. 224-234. ISSN 17505836,
DOI: 10.1016/j.ijggc.2018.05.014,
[Article]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master Thesis]

Heidt, Margareta (2018):
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress], [Article]

Heinrich, A. ; Ries, F. ; Kuenne, G. ; Ganter, S. ; Hasse, C. ; Sadiki, A. ; Janicka, J. (2018):
Large Eddy Simulation with tabulated chemistry of an experimental sidewall quenching burner.
In: International Journal of Heat and Fluid Flow, 71, pp. 95-110. ISSN 0142727X,
DOI: 10.1016/j.ijheatfluidflow.2018.03.011,
[Article]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Master Thesis]

Heß, Julian ; Wang, Yongqi (2018):
Modeling Debris Flow: On The Influence Of Pore Pressure Evolution And Hypoplasticity.
In: International Journal of Computational Methods and Experimental Measurements, 6 (2), pp. 385-397. WIT Press, ISSN 2046-0554,
DOI: 10.2495/CMEM-V6-N2-385-397,
[Article]

Han, Haoya ; Li, Li ; Yang, Qingsong ; Tian, Yuchuan ; Wang, Yunwei ; Ye, Zhishuang ; von Klitzing, R. ; Guo, Xuhong (2018):
Characterization of hollow silica–polyelectrolyte composite nanoparticles by small-angle X-ray scattering.
In: Journal of Materials Science, 53 (5), pp. 3210-3224. ISSN 0022-2461,
DOI: 10.1007/s10853-017-1747-5,
[Article]

Hänichen, Philipp ; Eyk, Maximilian van ; Stephan, Peter (2018):
Experimental investigations of fuel film evaporation with deposit formation.
In: International Journal of Heat and Fluid Flow, 70, pp. 125 - 130. ISSN 0142-727X,
DOI: 10.1016/j.ijheatfluidflow.2018.02.001,
[Article]

Hartl, Sandra ; Geyer, Dirk ; Dreizler, Andreas ; Magnotti, Gaetano ; Barlow, Robert S. ; Hasse, Christian (2018):
Regime identification from Raman/Rayleigh line measurements in partially premixed flames.
In: Combustion and Flame, 189, pp. 126 - 141. ISSN 0010-2180,
DOI: 10.1016/j.combustflame.2017.10.024,
[Article]

Hill, S. ; Deising, D. ; Acher, T. ; Klein, H. ; Bothe, D. ; Marschall, H. (2018):
Boundedness-preserving implicit correction of mesh-induced errors for VOF based heat and mass transfer.
In: Journal of Computational Physics, 352, pp. 285-300. ISSN 00219991,
DOI: 10.1016/j.jcp.2017.09.027,
[Article]

Hellwig, Johannes ; Strebe, Julia ; von Klitzing, R. (2018):
Effect of environmental parameters on the nano mechanical properties of hyaluronic acid/poly(l-lysine) multilayers.
In: Physical Chemistry Chemical Physics, 20 (28), pp. 19082-19086. ISSN 1463-9076,
DOI: 10.1039/c8cp02621a,
[Article]

Hieber, Matthias ; Prüss, Jan (2018):
On the bidomain problem with FitzHugh–Nagumo transport.
In: Archiv der Mathematik, 111 (3), pp. 313-327. ISSN 0003-889X,
DOI: 10.1007/s00013-018-1188-7,
[Article]

Hajduk, Andreas ; Lebedev, Mikhail V. ; Kaiser, Bernhard ; Jaegermann, Wolfram (2018):
Interaction of liquid water with the p-GaInP2(100) surface covered with submonolayer oxide.
In: Physical Chemistry Chemical Physics, 20 (32), pp. 21144-21150. ISSN 1463-9076,
DOI: 10.1039/c8cp03337d,
[Article]

Heinrich, Arne ; Kuenne, Guido ; Ganter, Sebastian ; Hasse, Christian ; Janicka, J. (2018):
Investigation of the Turbulent Near Wall Flame Behavior for a Sidewall Quenching Burner by Means of a Large Eddy Simulation and Tabulated Chemistry.
In: Fluids, 3 (3), p. 65. ISSN 2311-5521,
DOI: 10.3390/fluids3030065,
[Article]

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017,
Karlstad, Sweden, [Conference or Workshop Item]

Haaf, Martin ; Stroh, Alexander ; Hilz, Jochen ; Helbig, Martin ; Ströhle, Jochen ; Epple, Bernd (2017):
Process Modelling of the Calcium Looping Process and Validation Against 1 MWth Pilot Testing.
In: Energy Procedia, 114, pp. 167-178. ISSN 18766102,
DOI: 10.1016/j.egypro.2017.03.1159,
[Article]

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Auckland, New Zealand, [Conference or Workshop Item]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2, In: 2017 IEEE Symposium on Security and Privacy (SP 2017), pp. 1.109,
Curran Associates, Inc, San Jose, CA, USA, ISBN 978-1-5090-5534-0,
[Conference or Workshop Item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master Thesis]

Heß, Julian ; Wang, Yongqi ; Hutter, Kolumban (2017):
Thermodynamically consistent modeling of granular-fluid mixtures incorporating pore pressure evolution and hypoplastic behavior.
In: Continuum Mechanics and Thermodynamics, 29 (1), pp. 311-343. ISSN 0935-1175,
[Article]

Horn, Benjamin M. ; Luethen, H. ; Pfetsch, M. E. ; Ulbrich, S. (2017):
Geometry and topology optimization of sheet metal profiles by using a branch-and-bound framework.
In: Materialwissenschaft Und Werkstofftechnik, 48 (1), pp. 27-40. ISSN 0933-5137,
[Article]

Han, Haoxue ; Merabia, Samy ; Muller-Plathe, Florian (2017):
Thermal Transport at Solid-Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The journal of physical chemistry letters, 8, pp. 1946-1951. [Article]

Hieber, Matthias ; Saito, Hirokazu (2017):
Strong solutions for two-phase free boundary problems for a class of non-Newtonian fluids.
In: Journal of Evolution Equations, 17 (1), pp. 335-358. ISSN 1424-3199,
[Article]

Han, Haoxue ; Mérabia, Samy ; Müller-Plathe, Florian (2017):
Thermal Transport at Solid–Liquid Interfaces: High Pressure Facilitates Heat Flow through Nonlocal Liquid Structuring.
In: The Journal of Physical Chemistry Letters, 8 (9), pp. 1946-1951. ISSN 1948-7185,
[Article]

Han, Haoxue ; Schlawitschek, Christiane ; Katyal, Naman ; Stephan, Peter ; Gambaryan-Roisman, Tatiana ; Leroy, Frédéric ; Müller-Plathe, Florian (2017):
Solid–Liquid Interface Thermal Resistance Affects the Evaporation Rate of Droplets from a Surface: A Study of Perfluorohexane on Chromium Using Molecular Dynamics and Continuum Theory.
In: Langmuir, 33 (21), pp. 5336-5343. ISSN 0743-7463,
[Article]

Han, Haoxue ; Merabia, Samy ; Müller-Plathe, Florian (2017):
Thermal transport at a solid–nanofluid interface: from increase of thermal resistance towards a shift of rapid boiling.
In: Nanoscale, 9 (24), pp. 8314-8320. ISSN 2040-3364,
[Article]

Hansmann, Stefanie ; Schmidts, Volker ; Thiele, Christina M. (2017):
Synthesis of Poly-γ-S -2-methylbutyl-l -glutamate and Poly-γ-S -2-methylbutyl-d -glutamate and Their Use as Enantiodiscriminating Alignment Media in NMR Spectroscopy.
In: Chemistry - A European Journal, 23 (38), pp. 9114-9121. ISSN 09476539,
[Article]

He, Chao ; Leudesdorff, Wibke ; di Mare, Francesca ; Sadiki, Amsini ; Janicka, J. (2017):
Analysis of In-cylinder Flow Field Anisotropy in IC Engine using Large Eddy Simulation.
In: Flow, Turbulence and Combustion, 99 (2), pp. 353-383. ISSN 1386-6184,
[Article]

Honza, Rene ; Ding, Carl-Philipp ; Dreizler, Andreas ; Böhm, Benjamin (2017):
Flame imaging using planar laser induced fluorescence of sulfur dioxide.
In: Applied Physics B, 123 (9), ISSN 0946-2171,
DOI: 10.1007/s00340-017-6823-7,
[Article]

Hieber, Matthias ; Prüss, Jan (2017):
Dynamics of the Ericksen–Leslie equations with general Leslie stress I: the incompressible isotropic case.
In: Mathematische Annalen, 369 (3-4), pp. 977-996. ISSN 0025-5831,
DOI: 10.1007/s00208-016-1453-7,
[Article]

Hilz, Jochen ; Helbig, Martin ; Haaf, Martin ; Daikeler, Alexander ; Ströhle, Jochen ; Epple, Bernd (2017):
Long-term pilot testing of the carbonate looping process in 1 MWth scale.
In: Fuel, 210, pp. 892-899. ISSN 00162361,
DOI: 10.1016/j.fuel.2017.08.105,
[Article]

He, Chao ; Kuenne, Guido ; Yildar, Esra ; van Oijen, Jeroen ; di Mare, Francesca ; Sadiki, Amsini ; Ding, Carl-Philipp ; Baum, Elias ; Peterson, Brian ; Böhm, Benjamin ; Janicka, J. (2017):
Evaluation of the flame propagation within an SI engine using flame imaging and LES.
In: Combustion Theory and Modelling, 21 (6), pp. 1080-1113. ISSN 1364-7830,
DOI: 10.1080/13647830.2017.1343498,
[Article]

Hietzschold, Sebastian ; Hillebrandt, Sabina ; Ullrich, Florian ; Bombsch, Jakob ; Rohnacher, Valentina ; Ma, Shuangying ; Liu, Wenlan ; Köhn, Andreas ; Jaegermann, Wolfram ; Pucci, Annemarie ; Kowalsky, Wolfgang ; Mankel, Eric ; Beck, Sebastian ; Lovrincic, Robert (2017):
Functionalized Nickel Oxide Hole Contact Layers: Work Function versus Conductivity.
In: ACS Applied Materials & Interfaces, 9 (45), pp. 39821-39829. ISSN 1944-8244,
DOI: 10.1021/acsami.7b12784,
[Article]

Hosseinzadeh, Arash ; Sadiki, Amsini ; di Mare, Francesca ; Janicka, J. (2017):
Effects of subgrid scale and combustion modelling on flame structure of a turbulent premixed flame within LES and tabulated chemistry framework.
In: Combustion Theory and Modelling, 21 (5), pp. 838-863. ISSN 1364-7830,
DOI: 10.1080/13647830.2017.1305514,
[Article]

Han, Haoya ; Li, Li ; Tian, Yuchuan ; Wang, Yunwei ; Ye, Zhishuang ; Yang, Qingsong ; Wang, Yiming ; von Klitzing, R. ; Guo, Xuhong (2017):
Spherical polyelectrolyte nanogels as templates to prepare hollow silica nanocarriers: observation by small angle X-ray scattering and TEM.
In: RSC Adv., 7 (76), pp. 47877-47885. ISSN 2046-2069,
DOI: 10.1039/C7RA10011F,
[Article]

Han, Haoya ; Li, Li ; Wang, Weihua ; Tian, Yuchuan ; Wang, Yunwei ; Wang, Junyou ; von Klitzing, R. ; Guo, Xuhong (2017):
Core–Shell–Corona Silica Hybrid Nanoparticles Templated by Spherical Polyelectrolyte Brushes: A Study by Small Angle X-ray Scattering.
In: Langmuir, 33 (38), pp. 9857-9865. ISSN 0743-7463,
DOI: 10.1021/acs.langmuir.7b02239,
[Article]

Huang, Shilin ; Gawlitza, Kornelia ; von Klitzing, R. ; Steffen, Werner ; Auernhammer, Günter K. (2017):
Structure and Rheology of Microgel Monolayers at the Water/Oil Interface.
In: Macromolecules, 50 (9), pp. 3680-3689. ISSN 0024-9297,
DOI: 10.1021/acs.macromol.6b02779,
[Article]

Herdel, Philipp ; Krause, David ; Peters, Jens ; Kolmorgen, Brigga ; Ströhle, Jochen ; Epple, Bernd (2017):
Experimental investigations in a demonstration plant for fluidized bed gasification of multiple feedstock’s in 0.5 MWth scale.
In: Fuel, 205, pp. 286-296. ISSN 00162361,
[Article]

Hajian, Soheil ; Hintermüller, Michael ; Ulbrich, Stefan (2017):
Total variation diminishing schemes in optimal control of scalar conservation laws.
In: IMA Journal of Numerical Analysis, 39 (1), pp. 105-140. ISSN 0272-4979,
DOI: 10.1093/imanum/drx073,
[Article]

Holl, M. ; Rausch, L. ; Pelz, P. F. (2017):
New methods for new systems – How to find the techno-economically optimal hydrogen conversion system.
In: International Journal of Hydrogen Energy, 42 (36), pp. 22641-22654. ISSN 03603199,
DOI: 10.1016/j.ijhydene.2017.07.061,
[Article]

Heid, Maurice ; Knoche, Stefan ; Gora, Niklas ; Ohlig, Dominik ; Drochner, Alfons ; Etzold, Bastian J. M. ; Vogel, Herbert (2017):
Dynamics of Bulk Oxygen in the Selective Oxidation of Acrolein.
In: ChemCatChem, 9 (12), pp. 2390-2398. Wiley-VCH, ISSN 18673880,
DOI: 10.1002/cctc.201700124,
[Article]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW),
Vienna, Austria, [Conference or Workshop Item]

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala,
ACM, [Conference or Workshop Item]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelor Thesis]

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy,
Melbourne, Australia, [Conference or Workshop Item]

Hardt, Steffen (2016):
Free-molecule heat transfer in a conservative force field between parallel surfaces.
In: Physical Review E, 93 (5), pp. 052139. ISSN 1063-651X,
[Article]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Holl, M. ; Pelz, P. F. (2016):
Multi-pole system analysis (MPSA) - A systematic method towards techno-economic optimal system design.
In: Applied Energy, 169, pp. 937-949. ISSN 0306-2619,
[Article]

Hieber, Matthias ; Nesensohn, Manuel ; Pruess, Jan ; Schade, Katharina (2016):
Dynamics of nematic liquid crystal flows: The quasilinear approach.
In: Annales De L Institut Henri Poincare-Analyse Non Lineaire, 33 (2), pp. 397-408. ISSN 0294-1449,
[Article]

Hosseinzadeh, A. ; Sadiki, A. ; Janicka, J. (2016):
Assessment of the Dynamic SGS Wrinkling Combustion Modeling Using the Thickened Flame Approach Coupled with FGM Tabulated Detailed Chemistry.
In: Flow Turbulence and Combustion, 96 (4), pp. 939-964. ISSN 1386-6184,
[Article]

Hidouri, A. ; Yahya, N. ; Boushaki, T. ; Sadiki, A. ; Sautet, J. C. (2016):
Numerical and experimental investigation of turbulent three separated jets.
In: Applied Thermal Engineering, 104, pp. 153-161. ISSN 1359-4311,
[Article]

Hieber, Matthias ; Hussein, Amru ; Kashiwabara, Takahito (2016):
Global strong L-P well-posedness of the 3D primitive equations with heat and salinity diffusion.
In: Journal of Differential Equations, 261 (12), pp. 6950-6981. ISSN 0022-0396,
[Article]

Huang, Weizhang ; Kamenski, Lennard ; Lang, Jens (2016):
STABILITY OF EXPLICIT ONE-STEP METHODS FOR P1-FINITE ELEMENT APPROXIMATION OF LINEAR DIFFUSION EQUATIONS ON ANISOTROPIC MESHES.
In: Siam Journal on Numerical Analysis, 54 (3), pp. 1612-1634. ISSN 0036-1429,
[Article]

Hutter, Kolumban ; Wang, Yongqi (2016):
Fluid and Thermodynamics. Volume 1: Basic Fluid Mechanics.
In: Advances in Geophysical and Environmental Mechanics and Mathematics, Berlin-Heidelberg-New York, Springer Verlag, ISBN 978-3319336329,
[Book]

Hutter, Kolumban ; Wang, Yongqi (2016):
Fluid and Thermodynamics. Volume 2: Advanced Fluid Mechanics and Thermodynamic Fundamentals.
In: Advances in Geophysical and Environmental Mechanics and Mathematics, Berlin-Heidelberg-NewYork, Springer Verlag, ISBN 978-3-319-33635-0,
[Book]

Hajian, Ramin ; Hardt, Steffen (2015):
Formation and lateral migration of nanodroplets via solvent shifting in a microfluidic device.
In: Microfluidics and Nanofluidics, 19 (6), pp. 1281-1296. ISSN 1613-4982,
[Article]

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO,
[Conference or Workshop Item]

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES),
Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, pp. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), pp. 1-10,
ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19), pp. 80-84. [Article]

Hieber, Matthias ; Murata, Miho (2015):
THE L-P-APPROACH TO THE FLUID-RIGID BODY INTERACTION PROBLEM FOR COMPRESSIBLE FLUIDS.
In: Evolution Equations and Control Theory, 4 (1), pp. 69-87. ISSN 2163-2480,
[Article]

Hajari, Timir ; van der Vegt, Nico F. A. (2015):
Publisher's Note: "Solvation thermodynamics of amino acid side chains on a short peptide backbone" J. Chem. Phys. 142, 144502 (2015).
In: The Journal of chemical physics, 142 (16), p. 169901. [Article]

Hajari, Timir ; van der Vegt, Nico F. A. (2015):
Solvation thermodynamics of amino acid side chains on a short peptide backbone.
In: Journal of Chemical Physics, 142 (14), ISSN 0021-9606,
[Article]

Hartmann, S. ; Friedrich, F. ; Molitor, A. ; Reichert, M. ; Elsaesser, W. ; Walser, R. (2015):
Tailored quantum statistics from broadband states of light.
In: New Journal of Physics, 17, ISSN 1367-2630,
[Article]

Hosseinzadeh, A. ; Schmitt, T. ; Sadiki, A. ; Janicka, J. (2015):
Application of the Dynamic F-TACLES Combustion Model to a Lean Premixed Turbulent Flame.
In: Flow Turbulence and Combustion, 95 (2-3), pp. 481-500. ISSN 1386-6184,
[Article]

Hauk, T. ; Bonaccurso, E. ; Roisman, I. V. ; Tropea, C. (2015):
Ice crystal impact onto a dry solid wall. Particle fragmentation.
In: Proceedings of the Royal Society a-Mathematical Physical and Engineering Sciences, 471 (2181), ISSN 1364-5021,
[Article]

Hau, Jan-Niklas ; Chagelishvili, George ; Khujadze, George ; Oberlack, Martin ; Tevzadze, Alexander (2015):
A comparative numerical analysis of linear and nonlinear aerodynamic sound generation by vortex disturbances in homentropic constant shear flows.
In: Physics of Fluids, 27 (12), p. 126101. ISSN 1070-6631,
[Article]

Hartmann, Sebastien ; Molitor, Andreas ; Elsaesser, Wolfgang (2015):
Ultrabroadband ghost imaging exploiting optoelectronic amplified spontaneous emission and two-photon detection.
In: Optics Letters, 40 (24), pp. 5770-5773. ISSN 0146-9592,
[Article]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC, In: 30th Annual Computer Security Applications Conference, pp. 356-365,
New Orleans, LA, USA, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC),
ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014):
SAML Privacy-Enhancing Profile.
In: LNI, P-237, In: Open Identity Summit 2014, pp. 11-22,
GI, Stuttgart, Germany, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11), pp. 2185-2200. DOI: 10.1002/sec.748,
[Article]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014,
Berlin, Germany, [Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014):
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4), pp. 237-241. DOI: 10.1007/s11623-014-0098-5,
[Article]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158. [Article]

Herzberg, Amir ; Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: ARES 2013, In: 2013 International Conference on Availability, Reliability and Security, pp. 236-241,
IEEE Computer Society, Regensburg, Germany, DOI: 10.1109/ARES.2013.138,
[Conference or Workshop Item]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 459-468,
IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 565-576,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 391-403,
SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: LNCS, In: MoCrySEn 2013, pp. 194-208, Springer, [Book Section]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference or Workshop Item]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
pp. 1963-1965, ACM, Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13), Coimbra, Portugal, March 2013, ISBN 978-1-4503-1656-9,
DOI: 10.1145/2480362.2480727,
[Conference or Workshop Item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), pp. 772-783,
ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: LNCS, In: SAC2012 - Conference on Selected Areas in Cryptography, pp. 66-80,
Springer Berlin Heidelberg, Windsor, Canada, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Henß, Stefan ; Monperrus, Martin ; Mezini, Mira (2012):
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
In: ICSE '12, In: Proceedings of the 34th International Conference on Software Engineering, pp. 793-803,
IEEE Press, Zurich, Switzerland, ISBN 978-1-4673-1067-3,
[Conference or Workshop Item]

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max (2012):
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 1897-1900,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1015-4,
DOI: 10.1145/2208276.2208328,
[Conference or Workshop Item]

Hauke, Sascha ; Volk, Florian ; Habib, Sheikh Mahbub ; Mühlhäuser, Max
Dimitrakos, Theo ; Moona, Rajat ; Patel, Dhiren ; McKnight, D. Harrison (eds.) (2012):
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models.
pp. 158-173, Springer, Proceedings of the 6th International Conference on Trust Management (IFIPTM 2012), Surat, India, 21.-25.05., ISBN 978-3-642-29851-6,
DOI: 10.1007/978-3-642-29852-3_11,
[Conference or Workshop Item]

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max (2012):
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
In: CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2513-2518,
ACM, 30th ACM Conference on Human Factors in Computing Systems (CHI '12), Austin, USA, 05.-10.05.2012, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223828,
[Conference or Workshop Item]

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389,
Springer, [Conference or Workshop Item]

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit,
Darmstadt, [Conference or Workshop Item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September,
[Conference or Workshop Item]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Darmstadt, Technische Universität, [Master Thesis]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011):
Towards a Trust Management System for Cloud Computing.
In: Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933-939,
IEEE, 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16.-18.11.2011, ISBN 978-1-4577-2135-9,
DOI: 10.1109/TrustCom.2011.129,
[Conference or Workshop Item]

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Ilie, Ioana M. ; Nayar, Divya ; den Otter, Wouter K. ; van der Vegt, Nico F. A. ; Briels, Wim J. (2018):
Intrinsic Conformational Preferences and Interactions in α-Synuclein Fibrils: Insights from Molecular Dynamics Simulations.
In: Journal of Chemical Theory and Computation, 14 (6), pp. 3298-3310. ISSN 1549-9618,
DOI: 10.1021/acs.jctc.8b00183,
[Article]

Ilgen, Julian ; Kaltschnee, Lukas ; Thiele, Christina M. (2018):
perfect BASH: Band-selective homonuclear decoupling in peptides and peptidomimetics.
In: Magnetic Resonance in Chemistry, 56 (10), pp. 918-933. Wiley-Blackwell - STM, ISSN 07491581, e-ISSN 1097458X,
DOI: 10.1002/mrc.4757,
[Article]

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
In: MobiSys PhD Forum '18, pp. 1-2, New York, NY, USA, ACM, Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Conference or Workshop Item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Conference or Workshop Item]

Iapichino, L. ; Ulbrich, S. ; Volkwein, S. (2017):
Multiobjective PDE-constrained optimization using the reduced-basis method.
In: Advances in Computational Mathematics, 43 (5), pp. 945-972. Springer, ISSN 1019-7168,
DOI: 10.1007/s10444-016-9512-x,
[Article]

Izdebska-Podsiadły, Joanna ; Dörsam, Edgar (2017):
Effects of argon low temperature plasma on PLA film surface and aging behaviors.
In: Vacuum, 145, pp. 278-284. ISSN 0042207X,
DOI: 10.1016/j.vacuum.2017.09.001,
[Article]

Ilgen, Julian ; Kaltschnee, Lukas ; Thiele, Christina M. (2017):
A pure shift experiment with increased sensitivity and superior performance for strongly coupled systems.
In: Journal of Magnetic Resonance, 286, pp. 18-29. Elsevier, ISSN 1090-7807, e-ISSN 1096-0856,
DOI: 10.1016/j.jmr.2017.11.001,
[Article]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor Thesis]

J

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Article]