Items in division
- TU Darmstadt (101463)
- LOEWE (2454)
- LOEWE-Schwerpunkte (172)
- LOEWE-Zentren (2314)
- LOEWE (2454)
A
Audrito, Giorgio ; Casadei, Roberto ; Damiani, Ferruccio ; Salvaneschi, Guido ; Viroli, Mirko
Ali, Karim ; Vitek, Jan (eds.) (2022):
Functional Programming for Distributed Systems with XC.
In: Leibniz International Proceedings in Informatics, 222, In: 36th European Conference on Object-Oriented Programming (ECOOP 2022),
Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 36th European Conference on Object-Oriented Programming, Berlin, Germany, 06.-10.06.2022, ISSN 1868-8969, ISBN 978-3-95977-225-9,
DOI: 10.4230/LIPIcs.ECOOP.2022.20,
[Conference or Workshop Item]
Almon, Lars ; Krause, Arno ; Fietze, Oliver ; Hollick, Matthias (2021):
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
In: MobiWac '21: Proceedings of the 19th ACM Symposium on Mobility Management and Wireless Access, pp. 97-105,
ACM, 19th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’21), virtual Conference, 22.-26.11.2021, ISBN 978-1-4503-9079-8,
DOI: 10.1145/3479241.3486689,
[Conference or Workshop Item]
Ansell, Alan ; Edoardo, Maria Ponti ; Pfeiffer, Jonas ; Ruder, Sebastian ; Glavaš, Goran ; Vulić, Ivan ; Korhonen, Anna (2021):
MAD-G: Multilingual Adapter Generation for Efficient Cross-Lingual Transfer.
In: Findings of the Association for Computational Linguistics: EMNLP 2021, pp. 4762-4781,
ACL, Conference on Empirical Methods in Natural Language Processing (EMNLP 2021), Punta Cana, Dominican Republic, 07.-11.11.2021, [Conference or Workshop Item]
Alhamwy, Yasin (2021):
Information Management for Multi-Agent Systems.
Virtual, NetSys 2021, Lübeck, 13.-16.09.2021, [Conference or Workshop Item]
Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021):
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
Bari, Italy, ACM, 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21), virtual conference, Mon 11 - Fri 15 October 2021, DOI: 10.1145/3475716.3475783,
[Conference or Workshop Item]
Alhamwy, Yasin ; Watson, Simon ; Carrasco, Joaquin ; Cooper, Glen ; Geihs, Kurt (2021):
A Feasibility Analysis of Tether
Localisation for Mobile Robots.
1st European Workshop on Maritime Systems Resilience and Security (MARESEC 2021), virtual Conference, 14.06.2021, [Conference or Workshop Item]
Araslanov, Nikita ; Roth, Stefan (2021):
Self-supervised Augmentation Consistency for Adapting Semantic Segmentation.
In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 15384-15394,
virtual, IEEE, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2021), virtual Conference, 19.-25.06.2021, DOI: 10.1109/CVPR46437.2021.01513,
[Conference or Workshop Item]
Araslanov, Nikita ; Schaub-Meyer, Simone ; Roth, Stefan
Ranzato, Marc'Aurelio ; Beygelzimer, Alina ; Dauphin, Yann N. ; Liang, Percy ; Vaughan, Jennifer Wortman (eds.) (2021):
Dense Unsupervised Learning for Video Segmentation.
34, In: Advances in Neural Information Processing Systems, pp. 25308-25319,
virtual, 6.12. - 14.12.2021, [Conference or Workshop Item]
Abanto-Leon, Luis F. ; Bäuml, Andreas ; Sim, Gek Hong ; Hollick, Matthias ; Asadi, Arash (2020):
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints.
In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4 (3), ACM, ISSN 2476-1249,
DOI: 10.1145/3428329,
[Article]
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020):
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1), Association for Computing Machinery, ISSN 2471-2566,
DOI: 10.1145/3406112,
[Article]
Araslanov, N. ; Roth, S. (2020):
Single-stage semantic segmentation from image labels.
In: Proceedings : 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition CVPR 2020, pp. 4252-4261,
IEEE, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, virtual Conference, 13.-19.06.2020, ISBN 978-1-7281-7168-5,
DOI: 10.1109/CVPR42600.2020.00431,
[Conference or Workshop Item]
Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020):
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
pp. 332-341, ACM, 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), virtual Conference, 30.03.-03.04., ISBN 978-1-4503-6866-7,
DOI: 10.1145/3341105.3374020,
[Conference or Workshop Item]
Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Conference or Workshop Item]
Alexopoulos, Nikolaos ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max
Cavallaro, Lorenzo ; Kinder, Johannes ; Wang, XiaoFeng ; Katz, Jonathan (eds.) (2019):
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
pp. 2677-2679, ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, DOI: 10.1145/3319535.3363285,
[Conference or Workshop Item]
Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the 16th ISCRAM Conference : Information Systems for Crisis Response and Management,
ISCRAM, 16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019), València, Spain, May 19 to 22, 2019, ISSN 2411-3387, ISBN 978-84-09-10498-7,
[Conference or Workshop Item]
Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]
Almon, Lars ; Álvarez, Flor ; Lieser, Patrick ; Meuser, Tobias ; Schaller, Fabian (2018):
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt.
In: DuD-Fachbeiträge, DuD-Fachbeiträge, In: Die Fortentwicklung des Datenschutzes, pp. 77-98, Vieweg, Wiesbaden, Springer, ISBN 978-3-658-23726-4,
DOI: 10.1007/978-3-658-23727-1_5,
[Book Section]
Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]
Asadi, Arash ; Sim, Gek Hong ; Hollick, Matthias ; Klein, Anja ; Müller, Sabrina (2018):
FML: Fast Machine Learning for 5G mmWave Vehicular Communications.
In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 1961-1969,
IEEE, 37th IEEE Conference on Computer Communications, Honolulu, USA, 15.-19.4.2018, ISBN 978-1-5386-4128-6,
DOI: 10.1109/INFOCOM.2018.8485876,
[Conference or Workshop Item]
Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Master Thesis]
Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
pp. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Conference or Workshop Item]
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Association, 26th USENIX Security Symposium, Vancouver, Canada, 16.-18.08.2017, [Conference or Workshop Item]
Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), pp. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Article]
Asadi, Arash ; Mancuso, Vincenzo ; Gupta, Rohit (2017):
DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks.
In: IEEE/ACM Transactions on Networking, 25 (5), pp. 2930-2943. IEEE, ISSN 1063-6692,
DOI: 10.1109/TNET.2017.2712285,
[Article]
Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Asadi, Arash ; Mancuso, Vincenzo (2016):
Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice.
In: IEEE Transactions on mobile computing, 16 (8), pp. 2246-2259. IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2016.2621041,
[Article]
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]
Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES),
[Conference or Workshop Item]
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]
Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, pp. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Book Section]
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]
Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Conference or Workshop Item]
Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015),
[Conference or Workshop Item]
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]
Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis,
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]
Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Bachelor Thesis]
Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master Thesis]
Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 430-454,
Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, pp. 673-701,
Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]
Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés (2015):
Blended Identity: Pervasive IdM for Continuous Authentication.
[Conference or Workshop Item]
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, 8712, In: Computer Security - ESORICS 2014, pp. 76-93, Springer International Publishing, ISBN 978-3-319-11202-2,
DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8), pp. 1189-1206. [Article]
Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, pp. 288-298,
DOI: 10.1145/2568225.2568243,
[Conference or Workshop Item]
Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: ECOOP '14, pp. (Acceptance Rate: 26%), Proceedings of the 28th European Conference on Object-Oriented Programming, [Conference or Workshop Item]
Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
p. 29, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, [Conference or Workshop Item]
Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 21-26, 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, [Conference or Workshop Item]
Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
pp. 288-298, ICSE, Hyderabad, [Conference or Workshop Item]
Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science, 8383, In: Public-Key Cryptography PKC 2014, pp. 556-573,
[Conference or Workshop Item]
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 9, San Rafael, Morgan & Claypool, ISBN 9781627050975,
DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), pp. 535-548,
ACM, Berlin, November 04 - 08, 2013, DOI: 10.1145/2508859.2516738,
[Conference or Workshop Item]
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), pp. 1-12,
ACM Press, [Conference or Workshop Item]
Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013,
Seoul, Korea, [Conference or Workshop Item]
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), pp. 364-381. Springer, [Article]
Arzt, Steven ; Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Report]
Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
pp. 432-440, Springer, 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Report]
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2), pp. 209-232. [Article]
Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
In: GI Lecture Notes in Informatics, Gesellschaft für Informatik, 6. Arbeitstagung Programmiersprachen (ATPS 2013), [Conference or Workshop Item]
Ali, Karim ; Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: ECOOP '13, pp. (Acceptance Rate: 25%), Proceedings of the 27th European Conference on Object-Oriented Programming, [Conference or Workshop Item]
Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Lecture Notes in Computer Science, 7483, In: Information Security, pp. 168-187,
15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, ISSN 0302-9743,
[Conference or Workshop Item]
Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012), [Conference or Workshop Item]
Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3), pp. 175-179. DOI: 10.1007/s11623-012-0060-3,
[Article]
Ahn, T. ; Rainovski, G. ; Pietralla, N. ; Coquard, L. ; Möller, T. ; Costin, A. ; Janssens, R. V. ; Lister, C. ; Carpenter, M. ; Zhu, S. (2012):
Identification of the 2_{1,ms}^{+} mixed-symmetry state in ^{136}Ce.
In: Physical Review C, 86 (1), ISSN 0556-2813,
[Article]
Ali, Karim ; Lhoták, Ondřej (2012):
Application-Only Call Graph Construction.
In: ECOOP '12, pp. (Acceptance Rate: 19%), Proceedings of the 26th European Conference on Object-Oriented Programming, [Conference or Workshop Item]
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), pp. 234-251,
Springer, [Conference or Workshop Item]
Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef (2012):
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7), pp. 24-32. [Article]
Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf (2011):
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
In: Proceedings of the 19th European Conference on Information Systems (ECIS),
Helsinki, Finland, [Conference or Workshop Item]
Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), pp. 397-412,
IEEE Computer Society, [Conference or Workshop Item]
Armknecht, Frederik ; Strufe, Thorsten (2011):
An Efficient Distributed Privacy-preserving Recommendation System.
In: Proceedings of the 10th IEEE/IFIP Med-Hoc-Net,
[Conference or Workshop Item]
Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, pp. 39-63,
Springer, [Conference or Workshop Item]
Ackermann, Tobias ; Buxmann, Peter (2010):
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
In: Proceedings of the 16th Americas Conference on Information Systems (AMCIS) 2010, pp. Paper 284,
[Conference or Workshop Item]
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk (2010):
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, 5 (Special Issue), UbiCC, ISSN 1994-4608,
[Article]
Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph (2010):
Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
pp. 95-101, Workshop on Program Semantics, Specification and Verification: Theory and Applications (PSSV 2010), Kazan, Russia, June 14-15, 2010, [Conference or Workshop Item]
Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH),
Springer, [Conference or Workshop Item]
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), pp. 493-510,
Springer, [Conference or Workshop Item]
Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), pp. 158-175,
Springer, [Conference or Workshop Item]
Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) (2010):
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 63-77,
[Conference or Workshop Item]
Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David (2010):
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: Lecture Notes in Computer Science, 6055, In: Progress in Cryptology - AFRICACRYPT 2010, pp. 351-368,
Springer, 3rd International Conference on Cryptology in Africa, Stellenbosch, South Africa, 03.-06.05.2010, ISBN 978-3-642-12677-2,
DOI: 10.1007/978-3-642-12678-9_21,
[Conference or Workshop Item]
Anderl, Reiner ; Henriques, Joselito Rodrigues (2010):
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2), pp. 16-22. [Article]
Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj (2010):
Data-based Agreement for Inter-Vehicle Coordination.
In: Proc. of the 11th International Conference on Mobile Data Management (MDM),
[Conference or Workshop Item]
Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj (2010):
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
In: Proceedings of the 11th International Conference on Mobile Data Management (MDM),
[Conference or Workshop Item]
Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia (2010):
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
[Conference or Workshop Item]
Acker, Robin ; Massoth, Michael (2010):
Secure Ubiquitous House and Facility Control Solution.
In: Proceedings of the 2010 5th International Conference on Internet and Web Applications and Services (ICIW'10), 2010,
[Conference or Workshop Item]
Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael (2010):
Ubiquitous Home Control based on SIP and Presence Service.
In: Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS'10),
[Conference or Workshop Item]
Anderl, Reiner ; Henriques, Joselito (2009):
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
In: Proceedings of the 20th International Congress of Mechanical Engineering (COBEM 2009),
International Congress of Mechanical Engineering, Gramado, Brazil, [Conference or Workshop Item]
Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009):
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: GIIS '09, Global Information Infrastructure Symposium, [Conference or Workshop Item]
Ali, Karim ; Boutaba, Raouf (2009):
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: GIIS '09, Global Information Infrastructure Symposium, [Conference or Workshop Item]
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max (2009):
Shaping the Future Internet.
In: Proceedings of the 3rd International CompanionAble Workshop IoPTS,
3rd International CompanionAble Workshop IoPTS, Brussels, Belgium, 02.12.2009, [Conference or Workshop Item]
Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina (2008):
Smart Products: Integration Challenges.
In: Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08),
[Conference or Workshop Item]
Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008),
[Conference or Workshop Item]
Aciicmez, Onur ; Schindler, Werner
Malkin, T. (ed.) (2008):
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
In: LNCS, In: Topics in Cryptology, CT-RSA, pp. 256--273,
Springer, Berlin, [Conference or Workshop Item]
Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008):
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6), pp. 329-336. [Article]
Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, pp. 39-40,
[Conference or Workshop Item]
Alkassar, Ammar ; Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]
Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
7,603,317,
[Norm, patent, standard]
Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8, pp. 480-482. [Article]
Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security
Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE,
ACM, [Conference or Workshop Item]
Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable
Information.
2003/0014654 A1,
[Norm, patent, standard]
Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable
Information.
2003/0004734 A1,
[Norm, patent, standard]
B
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2023):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft. (Publisher's Version)
In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, pp. 25-30,
Darmstadt, Gesellschaft für Informatik e.V., 39. GIL-Jahrestagung, Wien, Austria, 18.-19.2.2019, ISBN 978-3-88579-681-7,
DOI: 10.26083/tuprints-00022202,
[Conference or Workshop Item]
Bugliarello, Emanuele ; Liu, Fangyu ; Pfeiffer, Jonas ; Reddy, Siva ; Elliott, Desmond ; Ponti, Edoardo M. ; Vulić, Ivan
Chaudhuri, Kamalika ; Jegelka, Stefanie ; Song, Le ; Szepesvari, Csaba ; Niu, Gang ; Sabato, Sivan University of Copenhagen, Mila – Quebec Artificial Intelligence Institute, University of Cambridge, TU Darmstadt, New York University, McGill University (eds.) (2022):
IGLUE: A Benchmark for Transfer Learning across Modalities, Tasks, and Languages.
In: Proceedings of Machine Learning Research, 162, In: Proceedings of the 39th International Conference on Machine Learning, pp. 2370-2392,
Baltimore, Maryland, USA, PMLR, The 39th International Conference on Machine Learning, Baltimore, Maryland USA, 17.-23.07.2022, [Conference or Workshop Item]
Bein, Nicole S. ; Kmet, Brigita ; Rojac, Tadej ; Golob, Andreja Benčan ; Malič, Barbara ; Moxter, Julian ; Schneider, Thorsten ; Fulanovic, Lovro ; Azadeh, Maryam ; Frömling, Till ; Egert, Sonja ; Wang, Hongguang ; Aken, Peter van ; Schwarzkopf, Jutta ; Klein, Andreas (2022):
Fermi energy, electrical conductivity, and the energy gap of NaNbO3.
In: Physical Review Materials, 6 (8), American Physical Society, ISSN 2475-9953,
DOI: 10.1103/PhysRevMaterials.6.084404,
[Article]
Bock, Carolin ; Kurz, Konstantin (2022):
Flip the Tweet - The Two-Sided Coin of Entrepreneurial Empathy.
In: Academy of Management Proceedings, 2022 (1), Academy of Management, ISSN 0065-0668, e-ISSN 2151-6561,
DOI: 10.5465/AMBPP.2022.14076abstract,
[Article]
Beck, Tilman ; Bohlender, Bela ; Viehmann, Christina ; Hane, Vincent ; Adamson, Yanik ; Khuri, Jaber ; Brossmann, Jonas ; Pfeiffer, Jonas ; Gurevych, Iryna (2022):
AdapterHub Playground: Simple and Flexible Few-Shot Learning with Adapters.
In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics: System Demonstrations, pp. 61-75,
ACL, 60th Annual Meeting of the Association for Computational Linguistics, Dublin, Ireland, 22.-27.05.2022, ISBN 978-1-955917-24-7,
[Conference or Workshop Item]
Baumgärtner, Lars ; Meuser, Tobias ; Bloessl, Bastian (2021):
coreemu-lab: An Automated Network Emulation and Evaluation Environment.
In: 2021 IEEE Global Humanitarian Technology Conference, pp. 304-311,
IEEE, 11th IEEE Global Humanitarian Technology Conference (GHTC 2021), virtual Conference, 19.-23.10.2021, ISBN 978-1-6654-3372-3,
DOI: 10.1109/GHTC53159.2021.9612475,
[Conference or Workshop Item]
Baumgärtner, Lars ; Meuser, Tobias ; Becker, Benjamin (2021):
NetSkylines: Digital Twins for Evaluating Disaster Communication.
In: 2021 IEEE Global Humanitarian Technology Conference,
IEEE, 11th IEEE Global Humanitarian Technology Conference (GHTC 2021), virtual Conference, 19.-23.10.2021, ISBN 978-1-66543-372-3,
DOI: 10.1109/GHTC53159.2021.9612413,
[Conference or Workshop Item]
Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2021):
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes.
In: Proceedings: 17th Annual International Conference on Distributed Computing in Sensor Systems, pp. 1-9,
IEEE, 17th International Conference on distributed Computing in sensor systems (DCOSS 2021), virtual Conference, 14.-16.07.2021, ISBN 978-1-6654-3929-9,
DOI: 10.1109/DCOSS52077.2021.00014,
[Conference or Workshop Item]
Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021):
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), virtual Conference, 07.-11.06.2021, [Conference or Workshop Item]
Bock, Carolin ; Kurz, Konstantin ; Madina, Iliyana ; Bejan, Julia ; Bürger, Robin ; Rockel, Jens (2021):
Crowdfunding in Zeiten von COVID-19: Ein geeignetes Finanzinstrument in der Krise?
Leipzig, Fraunhofer IMW, ISBN 978-3-00-068919-2,
DOI: 10.24406/publica-fhg-301034,
[Book]
Börner, Johannes ; Steinke, Florian (2021):
Measuring LTI System Resilience against Adversarial Disturbances based on Efficient Generalized Eigenvalue Computations.
60th IEEE Conference on Decision and Control (CDC 2021), virtual Conference, 13.-15.12.2021, [Conference or Workshop Item]
Becker, Benjamin ; Oberli, Christian ; Lieser, Patrick ; Steinmetz, Ralf
Hölscher, Christoph ; Comes, Tina (eds.) (2020):
A Survey about Resilience in Communication Networks.
In: Proceedings of the Joint International Resilience Conference,
University of Twente, 2020 Joint International Resilience Conference, virtual Conference, 23.-27.11., ISBN 978-90-365-5095-6,
[Conference or Workshop Item]
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]
Baumgärtner, Lars ; Lieser, Patrick ; Zobel, Julian ; Bloessl, Bastian ; Steinmetz, Ralf ; Mezini, Mira (2020):
LoRAgent: A DTN-based Location-aware Communication System using LoRa.
In: 2020 IEEE Global Humanitarian Technology Conference (GHTC),
IEEE, 10th IEEE Global Humanitarian Technology Conference, virtual Conference, 29.10.-01.11.2020, ISBN 978-1-7281-7388-7,
DOI: 10.1109/GHTC46280.2020.9342886,
[Conference or Workshop Item]
Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]
Bach, Rebecca ; Götzinger, Robert ; Kiziltoprak, Nihat ; Pfeiffer, Marcus ; Schabel, Samuel ; Schneider, Jens ; Knaack, Ulrich ; Kolling, Stefan (2020):
Warum … und nicht … ?
Fragen, Gedanken und Diskussionen zum Bauen mit Papier.
In: Wochenblatt für Papierfabrikation, 2020 (9), pp. 449-451. Dt. Fachverl., ISSN 0043-7131,
[Article]
Bloessl, Bastian ; Baumgärtner, Lars ; Hollick, Matthias (2020):
Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio.
pp. 103-109, ACM, Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization, London, United Kingdom, September 2020, ISBN 978-1-4503-8082-9,
DOI: 10.1145/3411276.3412184,
[Conference or Workshop Item]
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]
Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2020):
Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices.
In: EWSN'20 : Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, pp. 176-177,
ACM, International Conference on Embedded Wireless Systems and Networks (EWSN 2020), Lyon, France, 17.02.-19.02.2020, ISBN 978-0-9949886-4-5,
[Conference or Workshop Item]
Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference or Workshop Item]
Baumgärtner, Lars ; Lieser, Patrick ; Mezini, Mira (2020):
The Buschfunk Project : Offline Communication for Everyone.
10th IEEE Global Humanitarian Technology Conference, virtual Conference, 29.10.-01.11.2020, [Conference or Workshop Item]
Beilschmidt, Christian ; Drönner, Johannes ; Glombiewski, Nikolaus ; Körber, Michael ; Mattig, Michael ; Morgen, Andreas ; Seeger, Bernhard (2019):
VAT to the Future: Extrapolating Visual Complex Event Processing.
In: EPiC Series in Computing, 67, In: Proceedings of the 7th OpenSky Workshop 2019, pp. 25-36,
EasyChair Publications, 7th OpenSky Workshop, Zurich, Switzerland, 21.-22.11.2019, DOI: 10.29007/wz4w,
[Conference or Workshop Item]
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]
Bein, Nicole S. ; Machado, Pamela ; Coll, Mariona ; Chen, Feng ; Makarovic, Maja ; Rojac, Tadej ; Klein, Andreas (2019):
Electrochemical Reduction of Undoped and Cobalt-Doped BiFeO3 Induced by Water Exposure: Quantitative Determination of Reduction Potentials and Defect Energy Levels Using Photoelectron Spectroscopy.
In: The Journal of Physical Chemistry Letters, 10, pp. 7071-7076. American Chemical Society (ACS), ISSN 1948-7185,
DOI: 10.1021/acs.jpclett.9b02706,
[Article]
Baumgärtner, Lars ; Höchst, Jonas ; Lampe, Patrick ; Mogk, Ragnar ; Sterz, Artur ; Weisenburger, Pascal ; Mezini, Mira ; Freisleben, Bernd (2019):
Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City.
2019 IEEE Global Humanitarian Technology Conference (GHTC 2019), Seattle, USA, 17.-20.10., [Conference or Workshop Item]
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]
Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: GI-Edition: Lecture Notes in Informatics, 287, In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, pp. 25-30,
Gesellschaft für Informatik e.V., 39. GIL-Jahrestagung 2019: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria, 18.-19.02.2019, ISBN 978-3-88579-681-7,
[Conference or Workshop Item]
Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]
Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), pp. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]
Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar (2018):
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
In: Lecture Notes in Computer Science, 11050, In: Research in Attacks, Intrusions, and Defenses, pp. 511-531,
Springer International Publishing, International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, DOI: 10.1007/978-3-030-00470-5_24,
[Conference or Workshop Item]
Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]
Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]
Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]
Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]
Baumgärtner, Lars ; Kohlbrecher, Stefan ; Euler, Juliane ; Ritter, Tobias ; Stute, Milan ; Meurisch, Christian ; Mühlhäuser, Max ; Hollick, Matthias ; Stryk, Oskar von ; Freisleben, Bernd (2017):
Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles. (Postprint)
In: GHTC 2017: IEEE Global Humanitarian Technology Conference,
IEEE, 2017 IEEE Global Humanitarian Technology Conference, San Jose, CA, USA, 19.-22.10.2017, ISBN 978-1-5090-6046-7,
DOI: 10.25534/tuprints-00013328,
[Conference or Workshop Item]
Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]
Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]
Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]
Baumgärtner, L. ; Graubner, P. ; Höchst, J. ; Klein, A. ; Freisleben, B. (2017):
Speak Less Hear Enough: On Dynamic Announcement Intervals in Wireless On-demand Networks.
In: 2017 13th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS): Conference Proceedings,
IEEE, 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson, USA, 21.-24.02.2017, ISBN 978-3-901882-88-3,
DOI: 10.1109/WONS.2017.7888768,
[Conference or Workshop Item]
Borges, Fábio ; Lara, Pedro ; Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292, pp. 406--416. DOI: 10.1016/j.amc.2016.07.036,
[Article]
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
pp. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]
Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelor Thesis]
Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]
Binder, P. ; Muma, M. ; Zoubir, A. M. (2016):
Robust and Adaptive Diffusion-based Classification in Distributed Networks.
In: EURASIP Journal on Advances in Signal Processing: Advances in adaptive filtering theory and applications to acoustic and speech signal processing, [Article]
Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]
Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Master Thesis]
Baumgärtner, Lars ; Gardner-Stephen, Paul ; Graubner, Pablo ; Lakeman, Jeremy ; Höchst, Jonas ; Lampe, Patrick ; Schmidt, Nils ; Schulz, Stefan ; Sterz, Artur ; Freisleben, Bernd (2016):
An Experimental Evaluation of Delay-Tolerant Networking with Serval.
In: IEEE Global Humanitarian Technology Conference (GHTC),
IEEE, [Conference or Workshop Item]
Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]
Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, pp. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]
Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
pp. 16-19, ACM, 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), Bergamo, Italy, August 2015, ISBN 978-1-4503-3813-4,
[Conference or Workshop Item]
Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]
Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor Thesis]
Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]
Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]
Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p. 20,
Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]
Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20. [Article]
Baumgärtner, Lars ; Graubner, Pablo ; Schmidt, Nils ; Freisleben, Bernd (2015):
AndroLyze: A Distributed Framework for Efficient Android App Analysis.
In: IEEE International Conference on Mobile Services (MS),
IEEE, [Conference or Workshop Item]
Butin, Denis ; Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015),
IEEE, Florence, Italy, [Conference or Workshop Item]
Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015),
Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6), pp. 913-959. IOS Press, ISSN 0926-227X,
DOI: 10.3233/JCS-140509,
[Article]
Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Conference or Workshop Item]
Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Conference or Workshop Item]
Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]
Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: GI-Edition: Lecture Notes in Informatics, P-232, In: INFORMATIK 2014: Big Data - Komplexität meistern, pp. 1415-1426,
Gesellschaft für Informatik e.V., 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26.09.2014, ISSN 1617-5468, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]
Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, pp. 67-80,
Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]
Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, pp. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]
Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
Peterson, Gilbert ; Shenoi, Sujeet (eds.) (2014):
Using Approximate Matching to Reduce the Volume of Digital Data.
In: IFIP Advances in Information and Communication Technology, 433, In: Advances in Digital Forensics X, 10th IFIP WG 11.9 International Conference on Digital Forensics, Vienna, Austria, January 8–10, 2014, pp. 149–163,
Springer, Vienna, Austria, [Conference or Workshop Item]
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3), pp. 459-478. DOI: 10.1007/s10623-012-9747-6,
[Article]
Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pp. 187-198,
ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]
Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, pp. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference or Workshop Item]
Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, pp. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]
Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), pp. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]
Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop,
[Conference or Workshop Item]
Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
SPIE, IS&T (ed.) (2014):
Robust Hashing for 3D Models.
In: Proceeding of Electronic Imaging 2014 - Media Watermarking, Security, and Forensics 2014 , Feb. 2014, Februar 2014,
[Conference or Workshop Item]
Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]
Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, pp. 168-171,
Bremen, [Conference or Workshop Item]
Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 183-188,
DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]
Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (eds.) (2014):
Towards a Process Model for Hash Functions in Digital Forensics.
In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 132, In: Digital Forensics & Cyber Crime (ICDF2C 2013), 5th ICST International Conference, September 26–27, 2013, Moscow, Russia, pp. 170–186,
Springer, Moscow, Russia, ISBN 978-3-319-14288-3 (print) and 978-3-319-14289-0 (e-book),
DOI: 10.1007/978-3-319-14289-0_12,
[Conference or Workshop Item]
Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2014):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4), pp. 267-297. [Article]
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]
Bansarkhani, Rachid El ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, pp. 336-355,
Springer, Marrakesh, Morocco, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]
Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]
Bansarkhani, Rachid El ; Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334,
[Conference or Workshop Item]
Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014):
Scalable Offline Monitoring.
pp. 31-47, Heidelberg, Germany, Springer, Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]
Buchmann, Johannes ; Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2), pp. 98-102. Springer Gabler Verlag, [Article]
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]
Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37, pp. 720 - 725. ISSN 11,
DOI: 10.1007/s11623-013-0300-1,
[Article]
Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013):
Reducing human factors in software security architectures.
Future Security Conference 2013, [Conference or Workshop Item]
Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil (2013):
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]
Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013):
Security considerations on extending PACE to a biometric-based connection establishment.
In: 1, In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the, pp. 5-6,
[Conference or Workshop Item]
Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, pp. 31-46,
Springer Berlin Heidelberg, RHUL, Egham, UK, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hildebrandt, Mireille (ed.) (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013, pp. 139-164, Amsterdam, Iso Press, ISBN 978-1-61499-294-3 (print) ; 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book Section]
Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, pp. 1971-1984,
Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]
Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013):
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13, [Article]
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
24, In: Applicable Algebra in Engineering, Communication and Computing, pp. 157 - 158, Springer, DOI: 10.1007/s00200-013-0199-7,
[Book Section]
Bansarkhani, Rachid El ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 48-67,
Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]
Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor Thesis]
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13),
USENIX, [Conference or Workshop Item]
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1), [Article]
Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]
Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), pp. 198-207,
IEEE, University of Regensburg, Germany, [Conference or Workshop Item]
Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]
Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), pp. 291 - 296,
IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]
Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 752 - 766,
Koblenz, [Conference or Workshop Item]
Beckerle, Matthias ; Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, pp. 1-11,
[Conference or Workshop Item]
Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference or Workshop Item]
Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), pp. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]
Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013),
[Conference or Workshop Item]
Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France,
[Conference or Workshop Item]
Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013),
[Conference or Workshop Item]
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, pp. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]
Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 347-359,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]
Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013):
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF), [Article]
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science, 7779, In: RSA Conference Cryptographer's Track (CT-RSA 2013), pp. 189–206,
Springer, [Conference or Workshop Item]
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4), pp. 468-480. [Article]
Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233-242,
ACM Press, San Antonio, Texas, USA, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]
Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas (2013):
Video Game Watermarking.
In: Proceeding of Electronic Imaging 2013 - Media Watermarking, Security, and Forensics 2013,
[Conference or Workshop Item]
Breitinger, Frank ; Petrov, Kaloyan (2013):
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9), [Article]
Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), pp. 4966-4976,
IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014). DOI: 10.1007/s10623-013-9840-5,
[Article]
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1), pp. 84-96. [Article]
Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. (2013):
Multi-Biometrische Gesichtserkennung.
In: the 13. Deutscher IT-Sicherheitskongress, pp. 361-373,
Bonn, Germany, [Conference or Workshop Item]
Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), pp. 402-417,
Springer, Simon Fraser University, Burnaby, British Columbia, Canada, [Conference or Workshop Item]
Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science, In: Advances in Cryptology - ASIACRYPT 2013, pp. 154-173,
Springer, [Conference or Workshop Item]
Braun, Johannes ; Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, pp. 600-605,
Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]
Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2), pp. 22 -- 44. DOI: 10.4230/DagRep.3.2.22,
[Article]
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53, pp. 81-102. [Article]
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]
Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012):
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Report]
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]
Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012):
Delta-oriented Monitor Specification.
Springer, 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]
Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012):
Challenges in defining a programming language for provably correct dynamic analyses.
Springer, 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]
Breitinger, Frank ; Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), [Article]
Breitinger, Frank ; Baier, Harald (2012):
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4, [Article]
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: LNCS, In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), pp. 259-276,
Springer, Hangzhou, China, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, pp. 53-68,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]
Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012,
Birmingham, UK, [Conference or Workshop Item]
Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012):
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo), [Article]
Breitinger, Frank ; Baier, Harald (2012):
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA), [Article]
Baier, Harald ; Brand, Achim (2012):
On the Investigation of Application Specific Data within Digital Forensics.
In: Proceedings of the 7th Workshop on Digital Forensics and Information Assurance (WDFIA 2012), pp. 38-54,
ISBN 978-1-84102-316-8,
[Conference or Workshop Item]
Breitinger, Frank ; Baier, Harald (2012):
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL), pp. 89-101. [Article]
Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, pp. 1-5,
IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]
Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]
Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]
Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet (2012):
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, 11 (1), pp. 1-28. ISSN 1660-1769,
[Article]
Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]
Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
Petcu, Dana ; Vazquez-Poletti, Jose Luis (eds.) (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing, pp. 151-177, New Castle upon Tyne, Cambridge Scholars Publishing, ISBN 978-1-44383-550-3,
[Book Section]
Bulygin, Stanislav ; Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]
Bodden, Eric (2012):
Identifying meaningless parameterized linear-temporal-logic formulas.
[Report]
Bodden, Eric (2012):
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
[Report]
Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012):
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS), [Article]
Bauer, C. ; Behrens, T. ; Bildstein, V. ; Blazhev, A. ; Bruyneel, B. ; Butterworth, J. ; Clément, E. ; Coquard, L. ; Egido, J. ; Ekström, A. ; Fitzpatrick, C. ; Fransen, C. ; Gernhäuser, R. ; Habs, D. ; Hess, H. ; Leske, J. ; Kröll, T. ; Krücken, R. ; Lutter, R. ; Marley, P. ; Möller, T. ; Otsuka, T. ; Patronis, N. ; Petts, A. ; Pietralla, N. ; Rodríguez, T. ; Shimizu, N. ; Stahl, C. ; Stefanescu, I. ; Stora, T. ; Thirolf, P. ; Voulot, D. ; Walle, J. van de ; Warr, N. ; Wenander, F. ; Wiens, A. (2012):
Prolate shape of ^{140}Ba from a first combined Doppler-shift and Coulomb-excitation measurement at the REX-ISOLDE facility.
In: Physical Review C, 86 (3), ISSN 0556-2813,
[Article]
Bockisch, Christoph ; Sewe, Andreas (2012):
The ALIA4J Approach to Efficient Language Implementation.
In: Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, pp. 19-20,
Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA, [Conference or Workshop Item]
Bodden, Eric (2012):
MOPBox: A Library Approach to Runtime Verification.
In: Lecture notes in computer science , 7186, pp. 365-369, Springer, RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30, [Conference or Workshop Item]
Baier, Harald ; Dichtelmüller, Christian (2012):
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
In: DACH Security 2012,
[Conference or Workshop Item]
Bansarkhani, Rachid El ; Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS, In: WISTP - Workshop in Information Security Theory and Practice 2012,
Springer, London, UK, [Conference or Workshop Item]
Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science, In: Financial Cryptography, pp. 344-358,
Springer-Verlag, [Conference or Workshop Item]
Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. (2012):
Towards a more Secure Border Control with 3D Face Recognition.
In: the 5th Norsk Informasjons Sikkerhets Konferanse (NISK), pp. 49-60,
ISBN 978-82-321-0012-5,
[Conference or Workshop Item]
Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]
Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen,
[Ph.D. Thesis]
Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013),
London, UK, [Conference or Workshop Item]
Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin (2012):
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
[Norm, patent, standard]
Berchtold, Waldemar ; Schäfer, Marcel (2012):
Rebound on Symmetric Tardos Codes.
In: Proceeding of The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012),
[Conference or Workshop Item]
Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1502-1507,
ACM, Trento, Italy, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]
Bodden, Eric ; Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012),
[Conference or Workshop Item]
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012):
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
(TUD-CS-2012-0106), [Report]
Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science, 7092, In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), pp. 54-75,
Springer, Sanya, China, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]
Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security,
[Conference or Workshop Item]
Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS, In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, pp. 117-129,
Springer Berlin / Heidelberg, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]
Breitinger, Frank ; Baier, Harald (2011):
Performance Issues about Context-Triggered Piecewise Hashing.
In: 3rd International ICST Conference on Digital Forensics & Cyber Crime,
Dublin, [Conference or Workshop Item]
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]
Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC),
ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM),
ACM Press, [Conference or Workshop Item]
Bodden, Eric (2011):
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
pp. 492-495, ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Conference or Workshop Item]
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
Schartner, Peter ; Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, pp. 32-43,
syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]
Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]
Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS '11: Proceedings of the 5th International Conference on Network and System Security,
IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference or Workshop Item]
Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011):
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
In: DACH Security 2011, pp. 399-410,
ISBN 978-3-00-034960-7,
[Conference or Workshop Item]
Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, pp. 479 - 484,
IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference or Workshop Item]
Bodden, Eric (2011):
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
pp. 24-28, ACM, WODA '11: International Workshop on Dynamic Analysis, [Conference or Workshop Item]
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS), In: Progress in Cryptology - AFRICACRYPT 2011, pp. 363-378,
Springer Berlin / Heidelberg, Dakar, Senegal, ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]
Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (eds.) (2011):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: LNCS, 6522, In: Distributed Computing and Networking, pp. 77-82,
Springer, 12th International Conference on Distributed Computing and Networking (ICDCN 2011), Bangalore, India, 02.-05.01.2011, ISBN 978-3-642-17678-4,
DOI: 10.1007/978-3-642-17679-1_7,
[Conference or Workshop Item]
Bodden, Eric (2011):
Defining Access Control Policies as Tracematches.
(TUD-CS-2011-0149), [Report]
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (eds.) (2011):
Interactive Access Rule Learning for Access Control: Concepts and Design.
4, In: International Journal On Advances in Intelligent Systems, pp. 234-244,
[Conference or Workshop Item]
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]
Bodden, Eric (2011):
Closure Joinpoints: Block joinpoints without surprises.
pp. 117-128, ACM, AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development, [Conference or Workshop Item]
Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing (2011):
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD), [Article]
Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011,
Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference or Workshop Item]
Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin (2011):
Collusion-secure patchwork embedding for transaction watermarking.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII,
[Conference or Workshop Item]
Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011):
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
In: Proceedings of the 33rd International Conference on Software Engineering, pp. 241-250,
New York, NY, USA, International Conference on Software Engineering, Waikiki, Honolulu, HI, USA, 21-28 May 2011, [Conference or Workshop Item]
Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
Bishop, Judith ; Vallecillo, Antonio (eds.) (2011):
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
6705, In: Objects, Models, Components, Patterns, pp. 131-146, Springer, ISBN 978-3-642-21951-1,
DOI: 10.1007/978-3-642-21952-8_11,
[Book Section]
Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin (2011):
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
In: SPLASH '11 Workshops, In: Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11 & VMIL'11, pp. 309-316,
New York, NY, USA, ACM, 5th workshop on Virtual Machines and Intermediate Languages, Portland, OR, USA, 24 Oct 2011, [Conference or Workshop Item]
Baier, Harald ; Breitinger, Frank (2011):
Security Aspects of Piecewise Hashing in Computer Forensics.
In: 6th International Conference on IT Security Incident Management & IT Forensics (IMF 2011),
[Conference or Workshop Item]
Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin (2011):
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
In: The 7th International Symposium on Applied Reconfigurable Computing, Belfast, UK,
[Conference or Workshop Item]
Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), pp. 51-70,
Springer, [Conference or Workshop Item]
Biedermann, Sebastian ; Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), pp. 43-54,
Springer, [Conference or Workshop Item]
Bodden, Eric ; Hendren, Laurie (2011):
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer), [Article]
Berjani, Betim ; Strufe, Thorsten (2011):
A Recommendation System for Spots in Location-Based Online Social Networks.
In: Proceedings of the Eurosys Workshop on Social Network Systems,
[Conference or Workshop Item]
Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
7,412,724,
[Norm, patent, standard]
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian (2011):
Interactive Rule Learning for Access Control: Concepts and Design.
4, In: International Journal on Advances in Intelligent Systems, pp. 234-244, IARIA, [Book Section]
Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science, 6498, In: Proceedings of IndoCrypt 2010, pp. 17–-32,
Springer, [Conference or Workshop Item]
Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
TruWalletM: Secure Web Authentication on Mobile Platforms.
In: Proceedings of INTRUST 2010 The Second International Conference on Trusted Systems,
[Conference or Workshop Item]
Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010):
IDE 2.0: Collective Intelligence in Software Development.
pp. 53-58, ACM, FSE/SDP Workshop on the Future of Software Engineering, DOI: 10.1145/1882362.1882374?,
[Conference or Workshop Item]
Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian (2010):
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
In: ComputationWorld 2010, In: In Proceedings of the Second International Conference on Adaptive and Self-adaptive Systems and Applications (ADAPTIVE 2010), pp. 104 - 110,
Lisbon, Portugal, ISBN 978-1-61208-109-0,
[Conference or Workshop Item]
Bugiel, Sven ; Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010),
[Conference or Workshop Item]
Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique (2010):
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Lecture Notes in Informatics, In: Sicherheit 2010,
Gesellschaft fuer Informatik (GI), [Conference or Workshop Item]
Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max (2010):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: Lecture Notes in Computer Science, 6522, In: Distributed Computing and Networking, pp. 77-82,
Springer, 12th International Conference on Distributed Computing and Networking, Bangalore, India, 02.-05.01.2011, ISBN 978-3-642-17678-4,
DOI: 10.1007/978-3-642-17679-1_7,
[Conference or Workshop Item]
Bartsch, Steffen (2010):
A calculus for the qualitative risk assessment of policy override authorization.
In: SIN: Proceedings of the 3rd international conference on Security of information and networks, pp. 62--70,
ACM, Taganrog, Rostov-on-Don, Russian Federation, ISBN 978-1-4503-0234-0,
DOI: 10.1145/1854099.1854115,
[Conference or Workshop Item]
Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato (2010):
The uncertainty principle in the presence of quantum memory.
In: Nature Physics, [Article]
Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. (2010):
The PUF Promise.
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 290-297,
Springer, [Conference or Workshop Item]
Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
Bernstein, Daniel ; Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS, In: AFRICACRYPT, pp. 69-81,
Springer, Stellenbosch, South Africa, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]
Bedner, Mark (2010):
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR), pp. 339-345. [Article]
Buchmann, Johannes ; Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17), pp. 21-23. [Article]
Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2010):
Unlinkability of Sanitizable Signatures.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), pp. 444-461,
Springer-Verlag, [Conference or Workshop Item]
Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan (2010):
Attribute-based Encryption with Break-Glass.
In: Lecture Notes in Computer Science, 6033, In: Workshop In Information Security Theory And Practice (WISTP'10), pp. 237-244,
Springer, ISBN 978-3-642-12367-2,
[Conference or Workshop Item]
Bulygin, Stanislav ; Brickenstein, Michael (2010):
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3), pp. 185-200. DOI: 10.1007/s11786-009-0020-y,
[Article]
Bulygin, Stanislav ; Pellikaan, Ruud
Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (eds.) (2010):
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory, pp. 585-622, World Scientific, ISBN 978-981-283-716-5,
[Book Section]
Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira (2010):
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
(TUD-CS-2010-0066), [Report]
Bartsch, Steffen (2010):
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
In: SecSE: Fourth International Workshop on Secure Software Engineering,
IEEE Computer Society, Krakow, Poland, DOI: 10.1109/ARES.2010.19,
[Conference or Workshop Item]
Baier, Harald ; Busch, Christoph
Hochschule Darmstadt (3094) (ed.) (2010):
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
2010, In: Querschnitt - Beiträge aus Forschung und Entwicklung, [Book Section]
Backs, Christian (2010):
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Darmstadt, Technische Universität, [Bachelor Thesis]
Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas (2010):
Optimizing the evaluation of patterns in pointcuts.
In: Proceedings of the 4th workshop on Virtual Machines and Intermediate Languages, pp. 1-10,
New York, NY, USA, ACM, Workshop on Virtual Machines and Intermediate Languages, Reno, Nevada, USA, 17 Oct 2010, [Conference or Workshop Item]
Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010):
Quasi-dyadic CFS signatures.
In: LNCS, In: Inscrypt 2010,
Springer, [Conference or Workshop Item]
Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]
Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter (2010):
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2), pp. 23--32. [Article]
Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, p. 4,
Darmstadt, [Conference or Workshop Item]
Busch, Christoph ; Hartung, Daniel (2010):
Biometrische Nachrichten-Authentisierung.
[Conference or Workshop Item]
Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing (2010):
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
[Conference or Workshop Item]
Breitinger, Frank ; Nickel, Claudia (2010):
User Survey on Phone Security and Usage.
In: BIOSIG 2010 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures,
[Conference or Workshop Item]
Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne (2010):
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
In: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010,
[Conference or Workshop Item]
Bedner, Mark ; Ackermann, Tobias (2010):
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5), pp. 323-328. DOI: 10.1007/s11623-010-0096-1,
[Article]
Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul (2009):
PUF-Based Authentication Protocols, Revisited.
In: International Workshop on Information Security Applications (WISA'09), pp. 296-308,
[Conference or Workshop Item]
Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan (2009):
Foundations of Non-Malleable Hash and One-Way Functions.
In: Lecture Notes in Computer Science, 5912, In: Asiacrypt 2009, pp. 524-541,
Springer, [Conference or Workshop Item]
Bras-Amoros, Maria ; Bulygin, Stanislav (2009):
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3), pp. 561-574. DOI: 10.1007/s00233-009-9175-8,
[Article]
Bulygin, Stanislav ; Pellikaan, Ruud (2009):
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12), pp. 1626-1643. DOI: 10.1016/j.jsc.2007.12.003,
[Article]
Braun, Johannes (2009):
Nutzung des elektronischen Personalausweises im eCommerce.
Darmstadt, Technische Universität, [Diploma Thesis or Magisterarbeit]
Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian (2009):
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
[Conference or Workshop Item]
Bedner, Mark (2009):
Rechtmäßigkeit der "Deep Packet Inspection".
[Other]
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (eds.) (2009):
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
In: BIOSIG 2009,
ISBN ISBN 978-3-88579-249-1,
[Conference or Workshop Item]
Baier, Harald ; Straub, Tobias (2009):
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
In: Tagungsband Informatik 2009,
LNI, [Conference or Workshop Item]
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009):
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6), pp. 831-844. [Article]
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2009):
PSP : private and secure payment with RFID WPES 2009.
In: WPES 2009, Workshop on Privacy in the Electronic Society,
[Conference or Workshop Item]
Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2009):
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Lecture Notes in Informatics, In: Biometrics and Electronic Signatures - Research and Applications (BIOSIG) 2009,
Gesellschaft fuer Informatik (GI), [Conference or Workshop Item]
Busch, Christoph ; Reimer, Helmut (2009):
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5), [Article]
Busch, Christoph (2009):
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]
Busch, Christoph (2009):
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung, pp. 132-141. [Article]
Busch, Christoph (2009):
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
In: BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications,
ISBN 978-3-88579-249-1,
[Conference or Workshop Item]
Buchmann, Johannes ; Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9, pp. 543-548. [Article]
Baier, Harald ; Karatsiolis, Vangelis (2009):
Validity Models of Electronic Signatures and their Enforcement in Practice.
In: EuroPKI,
Springer, [Conference or Workshop Item]
Baier, Harald ; Straub, Tobias (2009):
A Note on the Protection Level of Biometric Data in Electronic Passports.
In: BIOSIG2009,
LNI, [Conference or Workshop Item]
Bulygin, Stanislav (2009):
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Saarbrücken, Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-0948-0,
[Book]
Bender, Jens ; Fischlin, Marc ; Kügler, Dennis (2009):
Security Analysis of the PACE Key-Agreement Protocol.
In: Lecture Notes in Computer Science, 5735, In: Information Security Conference (ISC) 2009, pp. 33-48,
Springer, [Conference or Workshop Item]
Buchmann, Johannes ; Karatsiolis, Vangelis (2009):
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5), pp. 378-384. DOI: 10.4236/ijcns.2009.25042,
[Article]
Bulygin, Stanislav (2009):
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern,
[Ph.D. Thesis]
Biere, Thomas ; Schindler, Werner
Horster, P. ; Schartner, P. (eds.) (2009):
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
In: D-A-CH Security 2009, pp. 462--469,
syssec, Klagenfurt, [Conference or Workshop Item]
Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi (2009):
Demonstration of first response communication sandbox.
In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 1-2,
IEEE, 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, USA, 11.-13.01.2009, ISBN 978-1-4244-2308-8,
[Conference or Workshop Item]
Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009):
Supporting Agile Development of Authorization Rules for SME Applications.
In: TrustCol: 3rd International Workshop on Trusted Collaboration, pp. 461-471,
Springer, Orlando, FL, USA, DOI: 10.1007/978-3-642-03354-4_35,
[Conference or Workshop Item]
Bodden, Eric ; Chen, Feng ; Rosu, Grigore (2009):
Dependent advice: A general approach to optimizing history-based aspects.
In: Proceedings of the ACM 2009, [Report]
Bulygin, Stanislav ; Pellikaan, Ruud
Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (eds.) (2009):
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography, pp. 361-365, Springer, ISBN 978-3-540-93805-7,
[Book Section]
Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin (2009):
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
In: 18th Intl. World Wide Web Conference (WWW'09), pp. 551 -- 560,
[Conference or Workshop Item]
Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten (2009):
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1), [Article]
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009):
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99, [Article]
Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]
Bedner, Mark (2009):
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009, p. 372. [Article]
Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut (2009):
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
In: Proc. of International Conference on Formal Engineering Methods (ICFEM),
[Conference or Workshop Item]
Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian (2009):
Security of Sanitizable Signatures Revisited.
In: Public Key Cryptography (PKC 2009), pp. 317-336,
[Conference or Workshop Item]
Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph (2009):
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]
Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max (2008):
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
In: Telecooperation report, 09, Darmstadt, Technische Universität, TUD-CS-2008-1206, ISSN 1864-0516,
[Report]
Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely (2008):
Incremental Pattern Matching in the VIATRA Model Transformation System.
In: Proc. of the 3rd International Workshop on Graph and Model Transformation,
[Conference or Workshop Item]
Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max (2008):
First Response Communication Sandbox.
In: Proceedings of the 11th communications and networking simulation symposium, pp. 115-122,
ACM, 11th communications and networking simulation symposium (CNS '08), Ottawa, Canada, 14.-17.04.2008, ISBN 978-1-56555-318-7,
DOI: 10.1145/1400713.1400733,
[Conference or Workshop Item]
Brickenstein, Michael ; Bulygin, Stanislav
Faugere, J.-C. ; Wang, D. (eds.) (2008):
Attacking AES via Solving Systems in the Key Variables Only.
In: First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30, pp. 118-123,
[Conference or Workshop Item]
Bartsch, Steffen ; Bormann, Carsten
Horster, Patrick (ed.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference or Workshop Item]
Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair (2008):
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008, [Article]
Bodden, Eric ; Havelund, Klaus (2008):
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008), pp. pages 155–165. [Article]
Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
Buchmann, Johannes ; Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: LNCS, In: PQCrypto 2008, pp. 63-78,
Springer, [Conference or Workshop Item]
Bulygin, Stanislav ; Pellikaan, Ruud (2007):
Decoding error-correcting codes with Groebner bases.
In: Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25, pp. 3-10,
[Conference or Workshop Item]
Backes, Michael ; Basin, David ; Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, 15 (6), p. 561. [Article]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12), pp. 1685--1720. [Article]
Bulygin, Stanislav (2006):
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10), pp. 4664-4669. DOI: 10.1109/TIT.2006.881831,
[Article]
Bulygin, Stanislav (2006):
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern, [Master Thesis]
Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
1,675,047,
[Norm, patent, standard]
Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer
Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor
Networks (held in conjunction with ESORICS 2006),
[Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security),
Springer-Verlag, Berlin, [Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]
Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
1,617,587,
[Norm, patent, standard]
Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
11/317,396,
[Norm, patent, standard]
Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security
Analysis and Design (FOSAD),
Springer-Verlag, Berlin, [Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3), pp. 135--154. [Article]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4), pp. 242--252. [Article]
Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
11/178,722,
[Norm, patent, standard]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC),
[Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), pp. 336--354,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4), pp. 589--617. [Article]
Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
7,617,393,
[Norm, patent, standard]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security,
[Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), pp. 84--95,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), pp. 168--183,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Bulygin, Stanislav (2003):
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2), pp. 24-28. [Article]
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), pp. 160--174,
IEEE Computer Society Press, [Conference or Workshop Item]
Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00),
CA, Internet Society, [Conference or Workshop Item]
Baum-Waidner, Birgit ; Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming
(ICALP' 2000), pp. 524--535,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic
Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4), pp. 611--627. [Article]
Baum-Waidner, Birgit ; Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX
Workshop on Electronic Commerce, pp. 89--106,
[Conference or Workshop Item]
Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, p. 217,
Berlin, Springer-Verlag, [Conference or Workshop Item]
Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, pp. 441--445,
Springer-Verlag, Berlin, [Conference or Workshop Item]
Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, pp. 285--295,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]
C
Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022):
Hypergraphon mean field games.
In: Chaos: An Interdisciplinary Journal of Nonlinear Science, 32 (11), AIP Publishing, ISSN 1054-1500,
DOI: 10.1063/5.0093758,
[Article]
Cui, K. ; Koeppl, H. (2022):
Learning Graphon Mean Field Games and Approximate Nash Equilibria.
10th International Conference on Learning Representations (ICLR 2022), virtual Conference, 25.-29.04.2022, [Conference or Workshop Item]
Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022):
Motif-based mean-field approximation of interacting particles on clustered networks.
In: Phys. Rev. E, 105, pp. L042301. American Physical Society, DOI: 10.1103/PhysRevE.105.L042301,
[Article]
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2022):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community. (Publisher's Version)
In: International reports on socio-informatics, 14 (3), pp. 41-47. IISI, ISSN 1861-4280,
DOI: 10.26083/tuprints-00022319,
[Article]
Cui, K. ; Yilmaz, M. B. ; Tahir, A. ; Klein, A. ; Koeppl, H. (2022):
Optimal Offloading Strategies for Edge-Computing via Mean-Field Games and Control.
In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp. 976-981,
Rio de Janeiro, Brazil, DOI: 10.1109/GLOBECOM48099.2022.10001412,
[Conference or Workshop Item]
Cui, Kai ; Koeppl, Heinz (2021):
Approximately Solving Mean Field Games via Entropy-Regularized Deep Reinforcement Learning.
24th International Conference on Artificial Intelligence and Statistics, Virtual Conference, 13.-15.04.2021, [Conference or Workshop Item]
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]
Cui, K. ; Tahir, A. ; Sinzger, M. ; Koeppl, H. (2021):
Discrete-Time Mean Field Control with Environment States.
60th Conference on Decision and Control (CDC2021), virtual Conference, 13.-15.12.2021, [Conference or Workshop Item]
Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: Cryptography and Security, (Preprint), Version 1, arXiv, 2008.04449, [Report]
Classen, Jiska ; Spörk, Michael ; Boano, Carlo Alberto ; Römer, Kay ; Hollick, Matthias (2020):
Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
In: EWSN'20 : Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, pp. 184-185,
ACM, International Conference on Embedded Wireless Systems and Networks (EWSN 2020), Lyon, France, 17.02.-19.02.2020, ISBN 978-0-9949886-4-5,
[Conference or Workshop Item]
Classen, Jiska ; Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19), Miami, FL, USA, May 15.-17., 2019, DOI: 10.1145/3317549.3319727,
[Conference or Workshop Item]
Carrasco Subieta, Alvaro German (2019):
Entwicklung neuartiger wimpernbasierter piezoelektrischer Antriebe.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Other]
Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Conference or Workshop Item]
Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pp. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3), pp. 41-47. IISI, ISSN 1861-4280,
[Article]
Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]
Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), pp. 749-762. [Article]
Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]
Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]
Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference or Workshop Item]
Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Conference or Workshop Item]
Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
Darmstadt, Technische Universität, [Bachelor Thesis]
Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference or Workshop Item]
Conrad, Bernd ; Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014),
Glasgow, UK, [Conference or Workshop Item]
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, pp. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference or Workshop Item]
Conrad, Bernd ; Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014),
Paris, France, [Conference or Workshop Item]
Carmo, Rodrigo do ; Hollick, Matthias (2014):
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
In: Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014),
IEEE/IFIP, 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014), Obergurgl, Austria, 2-4 April 2014, [Conference or Workshop Item]
Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1-6, [Book Section]
Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]
Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
Darmstadt, Technische Universität, [Master Thesis]
Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), pp. 92-107. [Article]
Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
38, In: J. Network and Computer Applications, pp. 65-75,
[Conference or Workshop Item]
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias (2013):
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5), pp. 695-707. [Article]
Carmo, Rodrigo do ; Hollick, Matthias (2013):
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, DOI: 10.1145/2463183.2463187,
[Article]
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164), pp. 1-20. International Association for Cryptologic Research (IACR), [Article]
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2013):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3), pp. 353-371. [Article]
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela (2013):
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3), pp. 105–116. [Article]
Christin, Delphine ; Büchner, C. ; Leibecke, N. (2013):
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
In: Accepted for publication in Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop),
[Conference or Workshop Item]
Christin, Delphine ; Hollick, Matthias
Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (eds.) (2013):
European Data Protection: Coming of Age.
pp. 203–222, Springer Netherlands, [Book Section]
Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, pp. 359-368,
ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference or Workshop Item]
Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias (2013):
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
In: Accepted for publication in Proceedings of 38th Annual IEEE Conference on Local Computer Networks (LCN),
[Conference or Workshop Item]
Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. (2012):
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
In: Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), pp. 14:1–14:10,
[Conference or Workshop Item]
Carmo, R. do ; Werner, M. ; Hollick, Matthias (2012):
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
In: Proceedings of the 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet),
[Conference or Workshop Item]
Christin, Delphine ; Büttner, C. ; Repp, Nicolas (2012):
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
In: Proceedings of the 7th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), pp. 977-985,
[Conference or Workshop Item]
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
In: Arithmetic of Finite Fields : 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings, pp. 45 - 63,
[Conference or Workshop Item]
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (eds.) (2012):
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: LNCS, 7322, In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP), pp. 71-86, Springer, ISBN 978-3-642-30954-0,
[Book Section]
Christin, Delphine ; Bentolila, A. ; Hollick, Matthias (2012):
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
In: Proceedings of the 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU),
[Conference or Workshop Item]
Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York (2012):
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
(SIT-TR-2012-002), [Report]
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2012):
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 135-143,
[Conference or Workshop Item]
Cooper, N. ; Reichel, F. ; Werner, V. ; Bettermann, L. ; Alikhani, B. ; Aslanidou, S. ; Bauer, C. ; Coquard, L. ; Fritzsche, M. ; Fritzsche, Y. ; Glorius, J. ; Goddard, P. ; Möller, T. ; Pietralla, N. ; Reese, M. ; Romig, C. ; Savran, D. ; Schnorrenberger, L. ; Siebenhühner, F. ; Simon, V. ; Sonnabend, K. ; Smith, M. ; Walz, C. ; Yates, S. ; Yevetska, O. ; Zweidinger, M. (2012):
Photoresponse of ^{76}Se below 9 MeV.
In: Physical Review C, 86 (3), ISSN 0556-2813,
[Article]
Cuong, N. ; Katzenbeisser, Stefan (2012):
Robust Resampling Detection in Digital Images.
In: Conference on Communications and Multimedia Security (CMS 2012), pp. 3-15,
Springer, [Conference or Workshop Item]
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2011):
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11), pp. 1928-1946. DOI: 10.1016/j.jss.2011.06.073,
[Article]
Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil (2011):
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
In: Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), pp. 341--350,
[Conference or Workshop Item]
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
Recent Progress in Code-Based Cryptography.
In: LNCS, In: The 5th International Conference on Information Security and Assurance - ISA-2011, pp. 21-32,
Springer, Brno University, Czech Republic, [Conference or Workshop Item]
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011):
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011, [Article]
Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias (2011):
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
In: Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU),
[Conference or Workshop Item]
Coquard, L. ; Rainovski, G. ; Pietralla, N. ; Ahn, T. ; Bettermann, L. ; Carpenter, M. ; Janssens, R. ; Leske, J. ; Lister, C. ; Möller, O. ; Möller, T. ; Rother, W. ; Werner, V. ; Zhu, S. (2011):
O(6)-symmetry breaking in the γ-soft nucleus ^{126}Xe and its evolution in the light stable xenon isotopes.
In: Physical Review C, 83 (4), ISSN 0556-2813,
[Article]
Canova, Gamze (2011):
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
Darmstadt, Technische Universität, [Bachelor Thesis]
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance,
Brno University, Czech Republic, [Conference or Workshop Item]
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: The 5th International Conference on Information Security and Assurance - ISA 2011,
Brno University, Czech Republic, [Conference or Workshop Item]
Cuong, N. ; Katzenbeisser, Stefan (2011):
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
In: International Workshop on Digital Forensics and Watermarking (IWDW 2011), pp. 387-397,
Springer, [Conference or Workshop Item]
Cuong, N. ; Katzenbeisser, Stefan (2011):
Security of Copy-Move Forgery Detection Techniques.
In: International Conference on Acoustics, Speech and Signal Processing (ICASSP'11), pp. 1864-1867,
IEEE Press, [Conference or Workshop Item]
Christin, Delphine ; Hollick, Matthias (2011):
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
In: Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11),
[Conference or Workshop Item]
Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011):
Reducing access to sensitive information.
7,941,859,
[Norm, patent, standard]
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010):
Improved Zero-knowledge Identification with Lattices.
In: Lecture notes in computer science, 6402, In: The Fourth International Conference on Provable Security (ProvSec 2010), pp. 1-17,
Berlin, Springer, Malacca, Malaysia, October 13 - 15, 2010, ISBN 978-3-642-16279-4,
[Conference or Workshop Item]
Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010):
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
In: LNCS, 6531, In: Information Security Conference (ISC), pp. 84-98,
Springer, [Conference or Workshop Item]
Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns.
In: CCS '10, In: Proceedings of the 17th ACM conference on Computer and communications security, pp. 559--572,
ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0245-6,
DOI: 10.1145/1866307.1866370,
[Conference or Workshop Item]
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2010):
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
In: Proceedings of 9th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Würzburg, Germany,
[Conference or Workshop Item]
Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010):
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
In: Proceedings of the 19th International Conference on Computer Communication Networks (ICCCN 2010),
[Conference or Workshop Item]
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010):
A Lattice-Based Threshold Ring Signature Scheme.
In: Lecture notes in computer science, 6212, In: The first international conference on cryptology and information security, LatinCrypt 2010, pp. 255-272,
Berlin, Springer, Puebla, Mexico, August 8-11, 2010, ISBN 978-3-642-14711-1,
[Conference or Workshop Item]
Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010):
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
In: Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010),
SAC2010, [Conference or Workshop Item]
Cayrel, Pierre-Louis ; Meziani, Mohammed (2010):
Post-Quantum Cryptography: Code-based Signatures.
Lecture Notes in Computer, In: 4th International Conference on Information Security and Assurance ISA 2010, pp. 82 - 99,,
[Conference or Workshop Item]
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010):
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5, pp. 289-298. [Article]
Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias (2010):
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2, pp. 96-125. DOI: 10.3390/fi2020096,
[Article]
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010):
Dual Construction of Stern-based Signature Schemes.
63 March 2010, In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", pp. 369-374,
[Conference or Workshop Item]
Cayrel, Pierre-Louis ; Strenzke, Falko (2010):
Side channels attacks in code-based cryptography.
In: First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), pp. 24-28,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2010):
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
In: Proceedings of the 6th International IFIP AICT 320 Summer School, pp. 86 -- 101,
[Conference or Workshop Item]
Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009):
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
In: International Conference on Trusted Systems (INTRUST),
Springer, [Conference or Workshop Item]
Charnes, Christopher
Atallah, Mikhail ; Blanton, Marina (eds.) (2009):
Algorithms and Theory of Computation Handbook.
In: Chapman & Hall/CRC Applied Algorithms and Data Structures series, 2, ISBN 978-1-58488-820-8,
[Book Section]
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Transparent Mobile Storage Protection in Trusted Virtual Domains.
In: 23rd Large Installation System Administration Conference (LISA '09), pp. 159-172,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
In: 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Leveraging social links for trust and privacy in networks.
In: INetSec 2009 Open Research Problems in Network Security,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Privacy preserving social networking through decentralization.
In: WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, pp. 145-152,
[Conference or Workshop Item]
Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira (2009):
A Plugin-Architecture for Self-Adaptive WS Compositions.
In: Proceedings of the IEEE 7th International Conference on Web Services (ICWS 2009), pp. 35-42,
IEEE, Los Angeles, CA, USA, ISBN 978-0-7695-3709-2,
DOI: 10.1109/ICWS.2009.125,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Leveraging Social Links for Trust and Privacy in Networks.
In: INetSec, Open Research Problems in Network Security,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Privacy Preserving Social Networking Through Decentralization.
In: 6th International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 145 -- 152,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
In: 3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications,
[Conference or Workshop Item]
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009):
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12), pp. 94 -- 101. [Article]
Camenisch, Jan ; Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
10/874,431,
[Norm, patent, standard]
Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003):
Anonymous Access to a Service.
10/432,266,
[Norm, patent, standard]
Camenisch, Jan ; Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für
den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]
Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a
Multi-Currency Electronic Wallet.
[Report]
D
Doula, Achref ; Schmidt, Lennart ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022):
Visualization of Machine Learning Uncertainty in AR-Based See-Through Applications.
In: Proceedings: 2022 IEEE International Conference on Artificial Intelligence and Virtual Reality - AIVR 2022, pp. 109-113,
California, USA, IEEE, 2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR), virtual Conference, 12.-14.12.2022, ISBN 978-1-6654-5725-5,
DOI: 10.1109/AIVR56993.2022.00022,
[Conference or Workshop Item]
Dongare, Sumedh ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2022):
Deep Reinforcement Learning for Task Allocation in Energy Harvesting Mobile Crowdsensing.
In: 2022 IEEE Global Communications Conference (GLOBECOM): Proceedings,
IEEE, GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 04.-08.12.2022, ISBN 978-1-6654-3540-6,
DOI: 10.1109/GLOBECOM48099.2022.10001204,
[Conference or Workshop Item]
Doula, Achref ; Güdelhöfer, Tobias ; Matviienko, Andrii ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022):
Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality.
In: Proceedings SIGGRAPH 2022: Posters,
ACM, SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference, Vancouver, Canada, 08.-11.08.2022, ISBN 978-1-4503-9361-4,
DOI: 10.1145/3532719.3543249,
[Conference or Workshop Item]
Doula, Achref ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022):
VR-Surv: A VR-Based Privacy Preserving Surveillance System.
In: CHI EA '22: Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems,
ACM, 2022 CHI Conference on Human Factors in Computing Systems, New Orleans, USA, 29.04.-05.05.2022, ISBN 978-1-4503-9156-6,
DOI: 10.1145/3491101.3519645,
[Conference or Workshop Item]
Doula, Achref ; Kaufmann, Philipp ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022):
Effects of the Level of Detail on the Recognition of City Landmarks in Virtual Environments.
In: Proceedings: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, pp. 860-861,
IEEE, 2022 IEEE Conference on Virtual Reality and 3D User Interfaces, virtual Conference, 12.-16.03.2022, ISBN 978-1-6654-8402-2,
DOI: 10.1109/VRW55335.2022.00281,
[Conference or Workshop Item]
Deninger, Anselm J. ; Roggenbuck, Alex ; Schindler, S. ; Preu, Sascha (2022):
2.75 THz tuning with a triple-DFB laser system at 1550 nm and InGaAs photomixers. (Publisher's Version)
In: Journal of Infrared, Millimeter, and Terahertz Waves, 36 (3), pp. 269-277. Springer, ISSN 1866-6892, e-ISSN 1866-6906,
DOI: 10.26083/tuprints-00020609,
[Article]
Ding, Hui ; Zhang, Mao-Hua ; Koruza, Jurij ; Molina-Luna, Leopoldo ; Kleebe, Hans-Joachim (2021):
Domain morphology of newly designed lead-free antiferroelectric NaNbO3-SrSnO3 ceramics.
In: Journal of the American Ceramic Society, 104 (7), pp. 3715-3725. ISSN 0002-7820,
DOI: 10.1111/jace.17738,
[Article]
Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Conference or Workshop Item]
Duznovic, Ivana (2021):
Ion-conducting Nanopores in Polymer Membranes for (Bio)Molecular Sensory Applications. (Publisher's Version)
Darmstadt, Technische Universität Darmstadt,
DOI: 10.26083/tuprints-00014070,
[Ph.D. Thesis]
Daun, Kevin ; Schnaubelt, Marius ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021):
HectorGrapher: Continuous-time Lidar SLAM with Multi-resolution Signed Distance Function Registration for Challenging Terrain.
2021 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR), New York, USA, 25.-27.10.2021, [Conference or Workshop Item]
Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]
Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]
Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference or Workshop Item]
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Conference or Workshop Item]
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
pp. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Conference or Workshop Item]
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Conference or Workshop Item]
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]
Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]
Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]
Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]
Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Conference or Workshop Item]
Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), pp. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]
Dwarakanath, R. ; Koldehofe, B. ; Bharadwaj, Y. ; Nguyen, T. A. B. ; Steinmetz, R. (2017):
TrustCEP: Adopting a Trust-based Approach for Distributed Complex Event Processing.
In: IEEE International Conference on Mobile Data Management (MDM),
IEEE, [Conference or Workshop Item]
Dwarakanath, Rahul ; Koldehofe, Boris ; Bharadwaj, Yashas ; Nguyen, The An Binh ; Eyers, David ; Steinmetz, Ralf (2017):
TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing.
In: IEEE International Conference on Mobile Data Management (MDM),
IEEE, [Conference or Workshop Item]
Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]
Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]
Deckwerth, Frederik (2017):
Static Verification Techniques for Attributed Graph Transformations.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
pp. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]
Drachenfels, Magdalena von ; Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de,
[Other]
Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]
Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Bachelor Thesis]
Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76, pp. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]
Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]
Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Conference or Workshop Item]
Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), pp. 2665-2670,
IEEE, First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]
Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]
Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
Darmstadt, Technische Universität, [Diploma Thesis or Magisterarbeit]
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Conference or Workshop Item]
Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]
Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]
Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max (2014):
Twitterize: Anonymous Micro-Blogging.
In: Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), pp. 817-823,
IEEE Computer Society, International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA), DOI: 10.1109/AICCSA.2014.7073285,
[Conference or Workshop Item]
Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]
Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, pp. 76-87,
Springer, Waterloo, Canada, [Conference or Workshop Item]
Dagdelen, Özgür ; Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS, In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, pp. 161-172,
Springer, Istanbul, Turkey, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]
Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Conference or Workshop Item]
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA,
[Conference or Workshop Item]
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
pp. 893-908, USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4), [Article]
Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing,
[Conference or Workshop Item]
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]
Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference,
[Conference or Workshop Item]
Dagdelen, Özgür ; Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014,
Marrakech, Morocco, [Conference or Workshop Item]
Dagdelen, Özgür ; Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory,
Honolulu HI USA, [Conference or Workshop Item]
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: LNCS, In: Asiacrypt 2013,
Springer, [Conference or Workshop Item]
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]
Demmler, Daniel (2013):
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt, [Master Thesis]
Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (eds.) (2013):
Distributed and Anonymous Publish-Subscribe.
In: LNCS, 7873, In: Network and System Security : 7th International Conference, NSS 2013, pp. 685-691,
Springer, 7th International Conference on Network and System Security, Madrid, Spain, ISBN 978-3-642-38630-5,
DOI: 10.1007/978-3-642-38631-2_57,
[Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013),
[Conference or Workshop Item]
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234), pp. 1-46. International Association for Cryptologic Research (IACR), [Article]
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]
Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: LNCS, In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, pp. 156-175,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013,
Bangalore, India, [Conference or Workshop Item]
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: LNCS, In: ESORICS 2013,
Springer, [Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi,
[Conference or Workshop Item]
Demirel, Denise ; Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Article]
Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012,
Bellevue, WA, [Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012),
[Conference or Workshop Item]
Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS), 7344, In: International Conference on Trust & Trustworthy Computing (TRUST), pp. 219-238,
Springer, [Conference or Workshop Item]
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012):
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18, pp. 1-14. DOI: 10.1007/s11276-012-0505-5,
[Article]
Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: 19th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011):
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing (STC),
ACM Press, [Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
POSTER: Control-Flow Integrity for Smartphones.
In: 18th ACM Conference on Computer and Communications Security (CCS'11),
ACM, [Conference or Workshop Item]
Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
7187 2012, In: 3rd international conference on e-voting and identity (VoteID 2011), pp. 158-173,
Springer, Tallinn, Estonia, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]
Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011):
Readiness of various eVoting systems for complex elections.
[Report]
Demmler, Daniel (2011):
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt, [Bachelor Thesis]
Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11: Proceedings of the International Conference for E-Democracy and Open Government, pp. 287-300,
Donau-Universität Krems, Conference for E-Democracy and Open Government (CeDEM11), Krems, Austria, 05.-06.05.2011, ISBN 978-3-902505-20-0,
[Conference or Workshop Item]
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
In: 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
[Conference or Workshop Item]
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
A Security Architecture for Accessing Health Records on Mobile Phones.
In: HEALTHINF'2011: Proceedings of the 4th International Conference on Health Informatics,
Rome, Italy, [Conference or Workshop Item]
Danchev, M. ; Rainovski, G. ; Pietralla, N. ; Gargano, A. ; Covello, A. ; Baktash, C. ; Beene, J. ; Bingham, C. ; Galindo-Uribarri, A. ; Gladnishki, K. ; Gross, C. ; Ponomarev, V. ; Radford, D. ; Riedinger, L. ; Scheck, M. ; Stuchbery, A. ; Wambach, J. ; Yu, C.-H. ; Zamfir, N. (2011):
One-phonon isovector 2_{1,MS}^{+} state in the neutron-rich nucleus ^{132}Te.
In: Physical Review C, 84 (6), ISSN 0556-2813,
[Article]
Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, pp. 126-129,
[Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011):
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED), [Book Section]
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2011):
Trust-based Content Distribution for Mobile Ad Hoc Networks.
In: 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 2011) [to appear],
[Conference or Workshop Item]
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Securing the Access to Electronic Health Records on Mobile Phones.
In: Biomedical Engineering Systems and Technologies,
[Conference or Workshop Item]
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10),
IEEE Press, [Conference or Workshop Item]
Dagdelen, Özgür ; Fischlin, Marc (2010):
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science, In: 13th Information Security Conference,
Springer, Boca Raton, USA, [Conference or Workshop Item]
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Privilege Escalation Attacks on Android.
In: ISC 2010: Proceedings of the 13th Information Security Conference,
Boca Raton, Florida, USA, [Conference or Workshop Item]
Demirel, Denise (2010):
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Darmstadt, Technische Universität, [Bachelor Thesis]
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
Return-Oriented Programming without Returns on ARM.
(HGI-TR-2010-002), [Report]
Dagdelen, Özgür ; Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS, 6272, In: Euro-Par 2010, pp. 211-222,
Springer, [Conference or Workshop Item]
Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science, 6056, In: Public-Key Cryptography (PKC), pp. 462-279,
Springer-Verlag, [Conference or Workshop Item]
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010):
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
(HGI-TR-2010-001), [Report]
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011),
[Conference or Workshop Item]
Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
Furht, Borko (ed.) (2010):
Handbook of Social Network Technologies and Applications.
Springer, [Book Section]
Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph (2010):
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,
[Conference or Workshop Item]
Dahmen, Erik ; Krauß, Christoph
Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (eds.) (2009):
Short Hash-Based Signatures for Wireless Sensor Networks.
In: LNCS, In: CANS 2009, pp. 463-476,
Springer, Kanazawa, Japan, ISBN 978-3-540-89640-1,
[Conference or Workshop Item]
Deußer, Clemens ; Reubold, Jan (2009):
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt, [Master Thesis]
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
In: STC '09, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 49--54,
ACM, Chicago, Illinois, USA, ISBN 978-1-60558-788-2,
DOI: 10.1145/1655108.1655117,
[Conference or Workshop Item]
Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj (2009):
Efficient Robust Storage Using Secret Tokens.
In: 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS),
[Conference or Workshop Item]
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Buchmann, Johannes ; Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS, In: PQCrypto 2008, pp. 109-123,
Springer, Cincinnati, USA, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]
Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
Horster, Patrick (ed.) (2008):
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference or Workshop Item]
E
Eskandani, Nafise ; Salvaneschi, Guido (2023):
The Uphill Journey of FaaS in the Open-Source Community.
In: Journal of Systems and Software, 198, Elsevier, ISSN 0164-1212,
DOI: 10.1016/j.jss.2022.111589,
[Article]
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021):
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2), pp. 161-175. de Gruyter Oldenbourg, ISSN 2196-6826,
DOI: 10.1515/icom-2021-0021,
[Article]
Engels, Jens Ivo (2021):
Resiliente Infrastrukturen – gibt es das überhaupt?
In: ABI Technik, 41 (1), p. 56. De Gruyter, ISSN 0720-6763,
DOI: 10.1515/abitech-2021-0010,
[Article]
Engels, Jens Ivo ; Frank, Sybille ; Gurevych, Iryna ; Heßler, Martina ; Knodt, Michèle ; Monstadt, Jochen ; Nordmann, Alfred ; Oetting, Andreas ; Rudolph-Cleff, Annette ; Rüppel, Uwe ; Schenk, Gerrit Jasper ; Steinke, Florian (2021):
Transformation, Zirkulation, System of Systems : Für ein dynamisches Verständnis netzgebundener Infrastrukturen. (Publisher's Version)
Darmstadt, DOI: 10.26083/tuprints-00017923,
[Report]
Eskandani, Nafise ; Salvaneschi, Guido (2021):
The Wonderless Dataset for Serverless Computing.
In: Proceedings: 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), pp. 565-569,
IEEE, 18th International Conference on Mining Software Repositories (MSR), virtual Conference, 22.-30.05.2021, ISBN 978-1-7281-8710-5,
DOI: 10.1109/MSR52588.2021.00075,
[Conference or Workshop Item]
Eskandani, Nafise ; Köhler, Mirko ; Margara, Alessandro ; Salvaneschi, Guido (2020):
ConSysT: Tunable, Safe Consistency Meets Object-Oriented Programming.
In: FTfJP 2020: Proceedings of the 22nd ACM SIGPLAN International Workshop on Formal Techniques for Java-Like Programs, pp. 15-17,
ACM, SPLASH '20: Conference on Systems, Programming, Languages, and Applications, Software for Humanity, virtual Conference, 23.07.2020, ISBN 978-1-4503-8186-4,
DOI: 10.1145/3427761.3428346,
[Conference or Workshop Item]
Egert, Sonja ; Zhang, Mao-Hua ; Koruza, Jurij ; Groszewicz, Pedro B. ; Buntkowsky, Gerd (2020):
23Na NMR Spectroscopic Quantification of the Antiferroelectric−
Ferroelectric Phase Coexistence in Sodium Niobate.
In: Journal of Physical Chemistry B, 124 (43), pp. 23852-23858. ISSN 1520-6106,
DOI: 10.1021/acs.jpcc.0c07202,
[Article]
Engels, Jens Ivo (2020):
Infrastrukturen als Produkte und Produzenten von Zeit.
In: NTM-Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin, 28 (1), pp. 69-90. Springer Nature, ISSN 0036-6978,
DOI: 10.1007/s00048-019-00234-7,
[Article]
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
pp. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Conference or Workshop Item]
Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Conference or Workshop Item]
El Khoury, Mario ; Duznovic, Ivana ; Ali, Mubarak ; Ensinger, Wolfgang ; Schlaak, Helmut F. (2017):
Integration konischer Nanoporen in Lab-on-Chip-Systeme für die
Histamin-Analyse.
In: Proceedings - Mikrosystemtechnik Kongress 2017, pp. 175-178,
Mikrosystemtechnikkongress 2017, München, Unterschleißheim, Deutschland, 23.-25. Oktober 2017, [Conference or Workshop Item]
Euler, J. ; Stryk, Oskar von (2017):
Optimized Vehicle-Specific Trajectories for Cooperative Process Estimation by Sensor-Equipped UAVs.
In: 2017 IEEE International Conference on Robotics and Automation, pp. 3397-3403,
IEEE, International Conference on Robotics and Automation (ICRA), Singapore, 29.05.-03.06.2017, ISBN 978-1-5090-4633-1,
DOI: 10.1109/ICRA.2017.7989386,
[Conference or Workshop Item]
Euler, Juliane ; Stryk, Oskar von (2017):
Decentralized Data-Driven Control of Cooperating Sensor-Carrying UAVs in a Multi-Objective Monitoring Scenario.
In: IFAC-PapersOnLine, 50 (1), pp. 15828-15834. Elsevier, ISSN 2405-8963,
DOI: 10.1016/j.ifacol.2017.08.2316,
[Article]
El Khoury, Mario ; Quednau, Sebastian ; Duznovic, Ivana ; Ensinger, Wolfgang ; Schlaak, Helmut F. (2016):
Integration of Nanochannels for Lab-on-Chip-Systems.
GMM-Fachbericht 86: Mikro-Nano-Integration, Duisburg, 05.- 06. Oktober 2016, [Conference or Workshop Item]
Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]
Engel, Andreas (2016):
A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-Intensive Distributed Applications.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]
Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]
Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]
Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]
Enders, J.
Oberstedt, S. (ed.) (2012):
Reactions induced by real photons for nuclear structure and nuclear astrophysics.
31, pp. 110-117, Amsterdam, Elsevier Science BV, Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011), [Conference or Workshop Item]
Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Göök, A. ; Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S.
Oberstedt, S. (ed.) (2012):
Development of an active ²³⁸UF₆ gas target.
31, pp. 141-146, Amsterdam, Elsevier Science BV, Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011), [Conference or Workshop Item]
Endres, J. ; Savran, D. ; Butler, P. ; Harakeh, M. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Litvinova, E. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Schlüter, F. ; Sonnabend, K. ; Stoica, V. ; Wörtche, H. ; Zilges, A. (2012):
Structure of the pygmy dipole resonance in ^{124}Sn.
In: Physical Review C, 85 (6), ISSN 0556-2813,
[Article]
Eichberg, Michael ; Sewe, Andreas (2011):
Encoding the Java Virtual Machine's Instruction Set.
In: Electronic Notes in Theoretical Computer Science, 264, In: Proceedings of the Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation, pp. 35-50,
Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010), Paphos, Cyprus, 27 Mar 2010, ISSN 15710661,
[Conference or Workshop Item]
Enders, J. ; Litvinova, E. ; Savran, D. ; Butler, P. A. ; Harakeh, M. N. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Sonnabend, K. ; Stoica, V. I. ; Wörtche, H. J. ; Zilges, A. (2010):
Isospin Character of the Pygmy Dipole Resonance in 124Sn.
In: Physical Review Letters, 105 (21), p. 212503. ISSN 0031-9007,
[Article]
Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel (2010):
History-Free Aggregate Message Authentication Codes.
In: Lecture Notes in Computer Science, In: Security and Cryptography for Networks (SCN) 2010,
Springer, [Conference or Workshop Item]
Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (eds.) (2010):
A Task-based Messaging Approach To Facilitate Staff Work.
In: Proceedings of the 7th International Conference on Information Systems for Crisis Response and Management. International Conference on Information Systems for Crisis Response and Management (ISCRAM-2010), pp. digital publication,
[Conference or Workshop Item]
Ekberg, Jan-Erik ; Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009),
[Conference or Workshop Item]
Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas (2009):
Privacy-Preserving Face Recognition.
In: Privacy Enhancing Technologies Symposium (PETS 2009),
[Conference or Workshop Item]
Eu, Joy Boy Joy (2001):
Specification of Dependable Trusted Third Parties.
[Report]
F
Fabian, C. ; Cui, K. ; Koeppl, H. (2023):
Mean Field Games on Weighted and Directed Graphs via Colored Digraphons.
7, In: IEEE Control Systems Letters, pp. 877-882. ISSN 2475-1456,
DOI: 10.1109/LCSYS.2022.3227453,
[Article]
Friesen, John ; Pietsch, Martin (2022):
Slums in Smart Cities - Rethink the Standard.
In: 2022 IEEE Global Humanitarian Technology Conference,
IEEE, 12th IEEE Global Humanitarian Technology Conference (GHTC 2022), Santa Clara, USA, 08.-11.09.2022, ISBN 978-1-6654-5097-3,
DOI: 10.1109/GHTC55712.2022.9911052,
[Conference or Workshop Item]
Fraune, Cornelia ; Engel, Alice ; Knodt, Michèle (2021):
Local governance of critical infrastructure resilience: A survey of leadership, planning, and positive coordination in German cities.
In: Journal of Contingencies and Crisis Management (JCCM), (Early Access), Wiley, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12386,
[Article]
Fabian, Stefan ; Stryk, Oskar von (2021):
Open-Source Tools for Efficient ROS and ROS2-based 2D Human-Robot Interface Development.
In: 2021 European Conference on Mobile Robots (ECMR): Proceedings,
IEEE, 5th European Conference on Mobile Robots, virtual Conference, 31.08.-03.09.2021, ISBN 978-1-6654-1213-1,
DOI: 10.1109/ECMR50962.2021.9568801,
[Conference or Workshop Item]
Fulanovic, Lovro ; Zhang, Mao-Hua ; Fu, Yuping ; Koruza, Jurij ; Rödel, Jürgen (2021):
NaNbO3-based antiferroelectric multilayer ceramic capacitors for energy storage applications.
In: Journal of the European Ceramic Society, 41 (11), pp. 5519-5525. Elsevier, ISSN 0955-2219,
DOI: 10.1016/j.jeurceramsoc.2021.04.052,
[Article]
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Conference or Workshop Item]
Fabian, Stefan ; Kohlbrecher, Stefan ; Stryk, Oskar von (2020):
Pose Prediction for Mobile Ground Robots in Uneven Terrain Based on Difference of Heightmaps.
In: SSRR 2020 - Pandemic Safety Protocols, Compliance Monitoring and Assistance, pp. 49-56,
IEEE, 2020 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR), virtual Conference, 04.-06.11.2020, ISBN 978-0-7381-1123-0,
DOI: 10.1109/SSRR50563.2020.9292574,
[Conference or Workshop Item]
Fraune, Cornelia ; Knodt, Michèle (2020):
Crisis Informatics Challenges from a Political Science Perpsective.
In: MobileHCI 2020: Extended Abstracts,
ACM, 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020), virtual Conference, 05.-09.10.2020, ISBN 978-1-4503-8052-2,
DOI: 10.1145/3406324.3424585,
[Conference or Workshop Item]
Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]
Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Master Thesis]
Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]
Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]
Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]
Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]
Funke, Sebastian
Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]
Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016):
Consumer oriented privacy preserving access control for electronic health records in the cloud.
In: IEEE cloud,
[Conference or Workshop Item]
Falzon, Kevin ; Bodden, Eric
Lopez, Javier ; Mitchell, Chris J. (eds.) (2015):
Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Lecture Notes in Computer Science, 9290, In: Information Security, pp. 83-101,
Information Security Conference, Trondheim, [Conference or Workshop Item]
Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28.-30. Sept. 2015, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]
Follner, Andreas ; Bodden, Eric (2015):
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
[Report]
Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, pp. 191-205,
Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]
Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: GI-Edition: Lecture Notes in Informatics, 232, In: INFORMATIK 2014: Big Data - Komplexität meistern, pp. 1401-1414,
Gesellschaft für Informatik e.V., 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26.09.2014, ISSN 1617-5468, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]
Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]
Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
8409, In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, pp. 244-249,
[Conference or Workshop Item]
Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
27, In: J. Cryptology, pp. 397-428,
DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]
Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013):
Distributed Finite-State Runtime Monitoring with Aggregated Events.
pp. 94-111, Springer, 4th International Conference on Runtime Verification (RV'13), Rennes, France, 24.-27.09., ISBN 978-3-642-40786-4,
DOI: 10.1007/978-3-642-40787-1_6,
[Conference or Workshop Item]
Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013):
Highly Precise Taint Analysis for Android Applications.
[Report]
Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]
Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj (2013):
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS),
[Conference or Workshop Item]
Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013,
Bergen (Norway), [Conference or Workshop Item]
Fischlin, Marc ; Onete, Cristina (2013):
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: LNCS, In: ACNS,
Springer, [Conference or Workshop Item]
Falzon, Kevin ; Pace, Gordon J.
Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (eds.) (2012):
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, Essen, Germany, September 04, 2012, [Conference or Workshop Item]
Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2012):
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1--9,
DOI: 10.1109/WoWMoM.2012.6263689,
[Conference or Workshop Item]
Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]
Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]
Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]
Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2011):
Curve-based Planar Graph Routing in Multihop Wireless Networks.
In: 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), pp. 149-151,
DOI: 10.1109/MASS.2011.127,
[Conference or Workshop Item]
Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), pp. 37-46,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]
Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011):
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
In: 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011),
Hong Kong, [Conference or Workshop Item]
Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14. [Article]
Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin (2011):
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2011),
[Conference or Workshop Item]
Franz, M. ; Katzenbeisser, Stefan (2011):
Processing Encrypted Floating Point Signals.
In: Workshop on Multimedia and Security (MMSEC'11), pp. 103-108,
ACM Press, [Conference or Workshop Item]
Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas (2011):
Oblivious Outsourced Storage with Delegation.
In: Financial Cryptography and Data Security (FC 2011), pp. 127-140,
Springer, [Conference or Workshop Item]
Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1), pp. 5--7. [Article]
Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061,
Dagstuhl Reports, [Conference or Workshop Item]
Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet
(Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2), pp. 1--15. [Article]
Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano (2010):
Random Oracles With(out) Programmability.
In: Lecture Notes in Computer Science, In: Asiacrypt 2010,
Springer, [Conference or Workshop Item]
Feller, Thomas ; Demirezen, Aziz (2010):
Hardware Trojans: Data Leakage Using General Purpose LEDs.
[Report]
Fischlin, Marc ; Schröder, Dominique (2010):
On the Impossibility of Three-Move Blind Signature Schemes.
In: Lecture Notes in Computer Science, 6110, In: Advances in Cryptology - Eurocrypt,
Springer-Verlag, [Conference or Workshop Item]
Fischlin, Marc ; Lehmann, Anja (2010):
Hash Function Combiners in SSL and TLS.
In: Lecture Notes in Computer Science, In: CT-RSA,
Springer-Verlag, [Conference or Workshop Item]
Fischlin, Marc ; Lehmann, Anja (2010):
Delayed-Key Message Authentication for Streams.
In: Lecture Notes in Computer Science, In: Theory of Cryptography Conference (TCC),
Springer-Verlag, [Conference or Workshop Item]
Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto (2010):
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
In: Proceeding of the Seventh IASTED International Conference on Signal Processing, Pattern Recognition and Applications (SPPRA 2010), Innsbruck, Austria,
ACTA Press, [Conference or Workshop Item]
Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
Clavier, C. ; Gaj, K. (eds.) (2009):
A New Side-Channel Attack on RSA Prime Generation.
In: LNCS, pp. 141--155, Springer, Berlin, [Conference or Workshop Item]
Freiling, Felix ; Heinson, Dennis (2009):
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9), pp. 547-552. [Article]
Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
A Pattern for Secure Graphical User Interface Systems.
In: 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09), Proceedings of the 20th International Workshop on Database and Expert Systems Applications, pp. 186-190,
IEEE, [Conference or Workshop Item]
Fischlin, Marc ; Schröder, Dominique (2009):
Security of Blind Signatures under Aborts.
In: Public Key Cryptography (PKC 2009), pp. 297-316,
[Conference or Workshop Item]
Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia (2008):
Measuring Unlinkability Revisited.
In: WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, pp. 105-110,
ACM, Alexandria, Virginia, USA, ISBN 978-1-60558-289-4,
DOI: 10.1145/1456403.1456421,
[Conference or Workshop Item]
Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas (2008):
Designing Context-Aware HCI for Collaborative Emergency Management.
In: Int'l Workshop on HCI for Emergencies in conjunction with CHI 2008 (electronic proceedings),
[Conference or Workshop Item]
Field, Simon ; Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, 32 (6), pp. 667--668. [Article]
G
Götte, Jan Sebastian ; Katzir, Liran ; Scheuermann, Björn (2022):
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation.
In: ACSAC '22: Proceedings of the 38th Annual Computer Security Applications Conference, pp. 455-466,
ACM, 38th Annual Computer Security Applications Conference, Austin, USA, 05.-09.12.2022, ISBN 978-1-4503-9759-9,
DOI: 10.1145/3564625.3564640,
[Conference or Workshop Item]
Gebhard, Tobias ; Steinke, Florian ; Brucherseifer, Eva (2022):
Monitoring Electricity Demand Synchronization Using Copulas.
In: Proceedings of 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe),
IEEE, IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022), Novi Sad, Serbia, 10.-12.10.2022, ISBN 978-1-6654-8032-1,
DOI: 10.1109/ISGT-Europe54678.2022.9960369,
[Conference or Workshop Item]
Ghorbani, Elaheh ; Villa, Lorenzo ; Erhart, Paul ; Klein, Andreas ; Albe, Karsten (2022):
Self-consistent calculations of charge self-trapping energies: A comparative study of polaron formation and migration in PbTiO3.
In: Physical Review Materials, 6 (7), pp. 074410. American Physical Society, ISSN 2475-9953,
DOI: 10.1103/PhysRevMaterials.6.074410,
[Article]
Geigle, Gregor ; Pfeiffer, Jonas ; Reimers, Nils ; Vulić, Ivan ; Gurevych, Iryna (2022):
Retrieve Fast, Rerank Smart: Cooperative and Joint Approaches for Improved Cross-Modal Retrieval.
In: Transactions of the Association for Computational Linguistics, 10, pp. 503-521. MIT Press, e-ISSN 2307-387X,
DOI: 10.1162/tacl_a_00473,
[Article]
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2022):
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack. (Postprint)
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4), ACM, e-ISSN 2474-9567,
DOI: 10.26083/tuprints-00020660,
[Article]
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2021):
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4), ACM, e-ISSN 2474-9567,
DOI: 10.1145/3494986,
[Article]
Günther, Jonas ; Oehler, Martin ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021):
Industrial Manometer Detection and Reading for Autonomous Inspection Robots.
In: 2021 European Conference on Mobile Robots (ECMR): Proceedings,
IEEE, 5th European Conference on Mobile Robots, virtual Conference, 31.08.-03.09.2021, ISBN 978-1-6654-1213-1,
DOI: 10.1109/ECMR50962.2021.9568833,
[Conference or Workshop Item]
Groher, Ann-Christin (2021):
Optimierung und Analyse von synthetischen Tetrazyklin-Tandem-Riboswitchen durch machine learning. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00017891,
[Ph.D. Thesis]
Grube, Tim ; Heinrich, Alexander ; Stroscher, Jan-Philipp ; Schomberg, Sabrina (2020):
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8), pp. 501-505. Springer Nature, ISSN 1862-2607,
DOI: 10.1007/s11623-020-1314-0,
[Article]
Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]
Gringoli, Francesco ; Schulz, Matthias ; Link, Jakob ; Hollick, Matthias (2019):
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
In: WiNTECH '19: Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, pp. 21-28,
ACM, 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH ’19), Los Cabos, Mexico, 25.10.2019, ISBN 978-1-4503-6931-2,
DOI: 10.1145/3349623.3355477,
[Conference or Workshop Item]
Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
In: MuC'19: Proceedings of Mensch und Computer 2019,
MuC'19 - Mensch und Computer, Hamburg, Germany, 8. bis 11. September 2019, ISBN 978-1-4503-7198-8,
DOI: 10.1145/3340764.3340782,
[Conference or Workshop Item]
Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]
Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]
Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, pp. 117-118, Gesellschaft für Informatik, [Book Section]
Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]
Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]
Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]
Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, pp. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Conference or Workshop Item]
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, United Kingdom, 04.-07.12.2017, [Conference or Workshop Item]
Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]
Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) (2017):
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 640-655,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_44,
[Conference or Workshop Item]
Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]
Gedeon, Julien ; Meurisch, Christian ; Bhat, Disha ; Stein, Michael ; Wang, Lin ; Mühlhäuser, Max (2017):
Router-based Brokering for Surrogate Discovery in Edge Computing.
pp. 1-6, The 9th International Workshop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking (HotPOST'17), Atlanta, GA, USA, June 5, 2017, [Conference or Workshop Item]
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]
Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelor Thesis]
Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]
Graubner, Pablo ; Sommer, Markus ; Hollick, Matthias ; Freisleben, Bernd (2017):
Dynamic Role Assignment in Software-Defined Wireless Networks.
2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 03.-06. July, DOI: 10.1109/ISCC.2017.8024619,
[Conference or Workshop Item]
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
pp. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
pp. 18-34, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]
Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]
Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 317 - 324,
IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]
Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, pp. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]
Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]
Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]
Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max (2015):
ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems.
pp. 739 - 740, IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy, 28.-30. Sept., ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346912,
[Conference or Workshop Item]
Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal,
[Conference or Workshop Item]
Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil (2015):
A Survey of Technologies for the Internet of Things.
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, pp. 1090 - 1095,
IEEE, Dubrovnik, Croatia, ISBN 978-1-4799-5343-1,
DOI: 10.1109/IWCMC.2015.7289234,
[Conference or Workshop Item]
Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]
Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]
Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]
Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]
Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2), pp. 108 - 113. DOI: 10.1007/s11623-015-0375-y,
[Article]
Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,
[Article]
Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC,
Las Vegas, NV, [Conference or Workshop Item]
Graubner, Pablo ; Baumgärtner, Lars ; Heckmann, Patrick ; Müller, Marcel ; Freisleben, Bernd (2015):
Dynalize: Dynamic Analysis of Mobile Apps in a Platform-as-a-Service Cloud.
In: IEEE International Conference on Cloud Computing (CLOUD),
IEEE, [Conference or Workshop Item]
Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Conference or Workshop Item]
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Community-based Collaborative Intrusion Detection.
164, In: International Workshop on Applications and Techniques in Cyber Security (ATCS) , International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 665-681,
Springer International Publishing, ISBN 978-3-319-28865-9,
DOI: 10.1007/978-3-319-28865-9_44,
[Conference or Workshop Item]
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]
Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien,
[Conference or Workshop Item]
Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS, In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, pp. 48-63,
Springer, Florianópolis, Brazil, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]
Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]
Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy, San Jose, California, 18.5.2014, [Conference or Workshop Item]
Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]
Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]
Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]
Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
In: Computer Security Symposium 2013, pp. 518-525,
Tokyo, Jōhō Shori Gakkai, Computer Security Symposium 2013, Kagawa, Japan, 21-23 October, 2013, [Conference or Workshop Item]
Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor Thesis]
Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
Darmstadt, Technische Universität, [Bachelor Thesis]
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]
Grimm, Marco ; Anderl, Reiner (2013):
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
In: Procedia Computer Science, In: Proceedings of the 11th Annual Conference on Systems Engineering Research (CSER 2013), pp. 571-580,
Elsevier, [Conference or Workshop Item]
Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]
Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012):
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5), pp. 631-645. [Article]
Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), pp. 512-529,
Springer, Leuven, Belgium, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012):
Energy-efficient fair channel access for IEEE 802.11 WLANs.
In: In Proceedings of 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM),
Lucca, Italy, [Conference or Workshop Item]
Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]
Göök, A. ; Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S. ; Richter, A.
Oberstedt, S. (ed.) (2012):
Fragment properties from fission of actinide nuclei induced by 6-10 MeV bremsstrahlung.
31, pp. 165-170, Amsterdam, Elsevier Science BV, Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011), [Conference or Workshop Item]
Grieser, M. ; Litvinov, Yu. A. ; Raabe, R. ; Blaum, K. ; Blumenfeld, Y. ; Butler, P. A. ; Wenander, F. ; Woods, P. J. ; Aliotta, M. ; Andreyev, A. ; Artemyev, A. ; Atanasov, D. ; Aumann, T. ; Balabanski, D. ; Barzakh, A. ; Batist, L. ; Bernardes, A.-P. ; Bernhardt, D. ; Billowes, J. ; Bishop, S. ; Borge, M. ; Borzov, I. ; Bosch, F. ; Boston, A. J. ; Brandau, C. ; Catford, W. ; Catherall, R. ; Cederkäll, J. ; Cullen, D. ; Davinson, T. ; Dillmann, I. ; Dimopoulou, C. ; Dracoulis, G. ; Düllmann, Ch. E. ; Egelhof, P. ; Estrade, A. ; Fischer, D. ; Flanagan, K. ; Fraile, L. ; Fraser, M. A. ; Freeman, S. J. ; Geissel, H. ; Gerl, J. ; Greenlees, P. ; Grisenti, R. E. ; Habs, D. ; Hahn, R. von ; Hagmann, S. ; Hausmann, M. ; He, J. J. ; Heil, M. ; Huyse, M. ; Jenkins, D. ; Jokinen, A. ; Jonson, B. ; Joss, D. T. ; Kadi, Y. ; Kalantar-Nayestanaki, N. ; Kay, B. P. ; Kiselev, O. ; Kluge, H.-J. ; Kowalska, M. ; Kozhuharov, C. ; Kreim, S. ; Kröll, T. ; Kurcewicz, J. ; Labiche, M. ; Lemmon, R. C. ; Lestinsky, M. ; Lotay, G. ; Ma, X. W. ; Marta, M. ; Meng, J. ; Mücher, D. ; Mukha, I. ; Müller, A. ; Murphy, A. St. J. ; Neyens, G. ; Nilsson, T. ; Nociforo, C. ; Nörtershäuser, W. ; Page, R. D. ; Pasini, M. ; Petridis, N. ; Pietralla, N. ; Pfützner, M. ; Podolyák, Z. ; Regan, P. ; Reed, M. W. ; Reifarth, R. ; Reiter, P. ; Repnow, R. ; Riisager, K. ; Rubio, B. ; Sanjari, M. S. ; Savin, D. W. ; Scheidenberger, C. ; Schippers, S. ; Schneider, D. ; Schuch, R. ; Schwalm, D. ; Schweikhard, L. ; Shubina, D. ; Siesling, E. ; Simon, H. ; Simpson, J. ; Smith, J. ; Sonnabend, K. ; Steck, M. ; Stora, T. ; Stöhlker, T. ; Sun, B. ; Surzhykov, A. ; Suzaki, F. ; Tarasov, O. ; Trotsenko, S. ; Tu, X. L. ; Duppen, P. van ; Volpe, C. ; Voulot, D. ; Walker, P. M. ; Wildner, E. ; Winckler, N. ; Winters, D. F. A. ; Wolf, A. ; Xu, H. S. ; Yakushev, A. ; Yamaguchi, T. ; Yuan, Y. J. ; Zhang, Y. H. ; Zuber, K. (2012):
Storage ring at HIE-ISOLDE.
In: The European Physical Journal Special Topics, 207 (1), p. 1. ISSN 1951-6355,
[Article]
Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Darmstadt, Technische Universität, [Bachelor Thesis]
Glorius, J. ; Knörzer, M. ; Müller, S. ; Pietralla, N. ; Sauerwein, A. ; Sonnabend, K. ; Wälzlein, C. ; Wiescher, M. (2011):
p-process nucleosynthesis: Activation experiments.
In: Progress in Particle and Nuclear Physics, 66 (2), pp. 379-384. Elsevier, ISSN 0146-6410,
[Article]
Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011):
Cryptographic Treatment of Private User Profiles.
In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS,
[Conference or Workshop Item]
Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011):
Key Management in Distributed Online Social Networks.
In: Proceedings of WoWMoM/DSPAN,
[Conference or Workshop Item]
Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010):
Service Automata for Secure Distributed Systems.
[Other]
Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. (2010):
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
In: Proceedings of IEEE LCN 2010,
Denver, Colorado, USA, [Conference or Workshop Item]
Geibig, Joanna ; Bradler, Dirk (2010):
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10), [Article]
Gladnishki, K. A. ; Rainovski, G. ; Petkov, P. ; Jolie, J. ; Pietralla, N. ; Blazhev, A. ; Damyanova, A. ; Danchev, M. ; Dewald, A. ; Fransen, C. ; Hackstein, M. ; Karagyozov, D. ; Möller, O. ; Pissulla, T. ; Reese, M. ; Rother, W. ; Topchiyska, R. (2010):
Search for one-phonon mixed-symmetry states in the radioactive nucleus 140Nd.
In: Physical Review C, 82 (3), pp. 037302. ISSN 0556-2813,
[Article]
Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science, 6055, In: Africacrypt 2010, pp. 333-350,
Springer, [Conference or Workshop Item]
Gharadaghy, Rojan (2010):
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Darmstadt, Technische Universität, [Bachelor Thesis]
Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj (2010):
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
In: Proc. International Symposium on Architecting Critical Systems (ISARCS),
[Conference or Workshop Item]
Gharadaghy, Rojan ; Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 151-162,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]
Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 89-107,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]
Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf (2009):
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
In: Proceedings of IFIP Wireless Days 2009,
[Conference or Workshop Item]
Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009):
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
In: 4th ACM Workshop on Scalable Trusted Computing,
[Conference or Workshop Item]
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2009):
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
In: Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI, pp. 489--503,
SecuMedia, Ingelheim, [Conference or Workshop Item]
Ghiglieri, Marco ; Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]
Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj (2009):
Threat Modeling and Dynamic Profiling.
In: Annals of Emerging Research in Information Assurance, Security and Privacy Services, Elsevier, [Book Section]
Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008):
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
In: LNI, 1, In: INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI),
[Conference or Workshop Item]
Grimm, Rüdiger ; Volkamer, Melanie
Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Band 1, In: GI Jahrestagung, pp. 429-436,
München, [Conference or Workshop Item]
Grimm, Rüdiger ; Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI, 131, In: Electronic Voting - 3rd International Conference, pp. 185-196,
Gesellschaft für Informatik, [Conference or Workshop Item]
Gebhardt, Max ; Illies, Georg ; Schindler, Werner
Alkassar, A. ; Siekmann, J. (eds.) (2008):
On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
In: Lecture Notes in Informatics, In: Sicherheit 2008, Gesellschaft für Informatik, pp. 111-125,
Köllen, Bonn, [Conference or Workshop Item]
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2008):
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
In: Cryptology ePrint Archive, 2008 (022), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]
Grimm, Rüdiger ; Volkamer, Melanie
Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (eds.) (2008):
Trust Models for Remote Electronic Voting.
27, In: Electronic Government 7th International Conference EGOV 2008, pp. 197-204,
Koblenz, [Conference or Workshop Item]
Grimm, Rüdiger ; Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil
'Zentrale Auforderungen für Online-Wahlen'.
[Report]
Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI, 86, In: Electronic Voting 2006 - $2^{nd}$ International Conference, pp. 97-106,
[Conference or Workshop Item]
Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
Krimmer, Robert LNI, GI (eds.) (2006):
Security Requirements for Non-political Internet Voting.
86, In: Electronic Voting (EVOTE) 2006, pp. 203-212, Bonn, Gesellschaft für Informatik, ISBN 978-3-88579-180-5,
[Book Section]
H
Hekmati, Björn ; Rudolph-Cleff, Annette (2023):
Mobilität als Schlüssel zur lebenswerten Stadt.
In: Offenbacher Schriftenreihe zur Mobilitätsgestaltung, In: Mobility Design: Die Zukunft der Mobilität gestalten Band 2: Forschung, 1. Auflage, pp. 82-96, Berlin, jovis Verlag GmbH, ISBN 978-3-86859-742-4,
DOI: 10.1515/9783868597936,
[Book Section]
Hünemohr, David ; Bauer, Maximilian ; Kleikemper, Jan ; Peukert, Markus (2022):
Analysis of Helicopter Flights in Urban Environments for UAV Traffic Management.
In: Engineering Proceedings, 28, MDPI, e-ISSN 2673-4591,
DOI: 10.3390/engproc2022028010,
[Article]
Heise, Michael ; Pietsch, Martin ; Steinke, Florian ; Bauer, Maximilian ; Yilmaz, Burak (2022):
Optimized UAV Placement for Resilient Crisis Communication and Power Grid Restoration.
In: Proceedings of 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe),
IEEE, IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022), Novi Sad, Serbia, 10.-12.10.2022, ISBN 978-1-6654-8032-1,
DOI: 10.1109/ISGT-Europe54678.2022.9960494,
[Conference or Workshop Item]
Hessel, Frank ; Almon, Lars ; Hollick, Matthias (2022):
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation.
In: ACM Transactions on Sensor Networks, ACM, ISSN 1550-4859, e-ISSN 1550-4867,
DOI: 10.1145/3561973,
[Article]
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2022):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany. (Publisher's Version)
In: Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Entwicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks,
Darmstadt, GITO mbH Verlag für Industrielle Informationstechnik und Organisation, WI 2020: 15. Internationale Tagung Wirtschaftsinformatik - Zentrale Tracks, Potsdam, Germany, 08.-11.03.2020, ISBN 978-3-95545-335-0,
DOI: 10.26083/tuprints-00020743,
[Conference or Workshop Item]
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2022):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. (Publisher's Version)
In: Proceedings of the 30th USENIX Security Symposium, pp. 3577-3594,
Darmstadt, USENIX Association, 30th USENIX Security Symposium (USENIX Security 21), Virtual event, 11.-13.08.2021, ISBN 978-1-939133-24-3,
DOI: 10.26083/tuprints-00020599,
[Conference or Workshop Item]
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2022):
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System. (Publisher's Version)
Darmstadt, The 21st Privacy Enhancing Technologies Symposium, Online, 12.-16.07.2021, DOI: 10.26083/tuprints-00020598,
[Conference or Workshop Item]
Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2022):
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities. (Publisher's Version)
In: HMD Praxis der Wirtschaftsinformatik, 58 (5), pp. 1129-1147. Springer, ISSN 1436-3011,
DOI: 10.26083/tuprints-00022163,
[Article]
Haselhorst, Arno ; Germies, Jürgen ; Wright-Contreras, Lucía ; Camara, Luiza ; Rudolph-Cleff, Annette ; Schulze, Joachim (2022):
Spezialbericht - Smart-City-Ranking 2022 - Ressourcenschonend und CO₂-neutral - Die smarte Transformation unserer Städte im Hinblick auf die Energiekrise. (Publisher's Version)
Darmstadt, DOI: 10.26083/tuprints-00022871,
[Report]
Haunschild, Jasmin ; Reuter, Christian (2022):
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population. (Publisher's Version)
In: Mensch und Computer 2021 - Workshopband,
Darmstadt, Gesellschaft für Informatik e.V., MuC'21: Mensch und Computer 2021, Ingolstadt, Germany, 05.-08.09.2021, DOI: 10.26083/tuprints-00022173,
[Conference or Workshop Item]
Hartwig, Katrin ; Reuter, Christian (2022):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter. (Publisher's Version)
In: Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., pp. 1844-1855,
Darmstadt, Association for Information Systems AIS, 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), Siegen, Germany, 23.-27.2.2019, ISBN 978-3-96182-063-4,
DOI: 10.26083/tuprints-00020747,
[Conference or Workshop Item]
Haesler, Steffen ; Mogk, Ragnar ; Putz, Florentin ; Logan, Kevin ; Thiessen, Nadja ; Kleinschnitger, Katharina ; Baumgärtner, Lars ; Stroscher, Jan-Philipp ; Reuter, Christian ; Knodt, Michèle ; Hollick, Matthias (2021):
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods.
In: CSCW '21: Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing, pp. 62-66,
ACM, 2021 Conference on Computer Supported Cooperative Work and Social Computing, virtual Conference, 23.-27.10.2021, ISBN 978-1-4503-8479-7,
DOI: 10.1145/3462204.3481749,
[Conference or Workshop Item]
Haesler, Steffen ; Schmid, Stefka ; Vierneisel, Annemike Sophia ; Reuter, Christian (2021):
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic.
In: Proceedings of the ACM on Human Computer Interaction, 5 (CSCW2), ACM, e-ISSN 2573-0142,
DOI: 10.1145/3476045,
[Article]
Haunschild, Jasmin ; Reuter, Christian
ACM (ed.) (2021):
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas.
In: CSCW '21: Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing, pp. 72-78,
ACM, 24th ACM Conference on Computer-Supported Cooperative Work and Social Computing, virtual Conference, 23.-27.10.2021, ISBN 978-1-4503-8479-7,
DOI: 10.1145/3462204.3481745,
[Conference or Workshop Item]
Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian
ACM (ed.) (2021):
Citizens' Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic.
In: GoodIT '21: Proceedings of the 2021 Conference on Information Technology for Social Good, pp. 151-156,
ACM, Conference on Information Technology for Social Good, Roma, Italy, 09.-11.09.2021, ISBN 978-1-4503-8478-0,
DOI: 10.1145/3462203.3475886,
[Conference or Workshop Item]
Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2021):
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD : Praxis der Wirtschaftsinformatik, 58 (5), pp. 1129-1147. Springer, ISSN 1436-3011,
DOI: 10.1365/s40702-021-00770-8,
[Article]
Hornung, Gerrit ; Stroscher, Jan-Philipp (2021):
Datenschutz in der Katastrophe.
In: Zeitschrift für das gesamte Sicherheitsrecht (GSZ), 4 (4), pp. 149-154. C.H.Beck, ISSN 2567-3823,
[Article]
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium, virtual Conference, 11.-13.08.2021, [Conference or Workshop Item]
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021):
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
In: WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 374-376,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468251,
[Conference or Workshop Item]
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
In: WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 371-373,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468252,
[Conference or Workshop Item]
Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, pp. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Conference or Workshop Item]
Hassan, Sohaib S. ; Reuter, Christian ; Bzhalava, Levan (2021):
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs.
In: International Journal of Innovation Management, 25 (1), World Scientific, ISSN 1363-9196,
DOI: 10.1142/S136391962150002X,
[Article]
Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021):
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3), pp. 227-245. Sciendo, e-ISSN 2299-0984,
DOI: 10.2478/popets-2021-0045,
[Article]
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy. (Postprint)
In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20),
New York, NY, Association for Computing Machinery (ACM), WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Österreich, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.26083/tuprints-00017839,
[Conference or Workshop Item]
Hartwig, Katrin ; Reuter, Christian
Klimczak, Peter ; Zoglauer, Thomas (eds.) (2021):
Fake News technisch begegnen - Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen.
In: ars digitalis, In: Wahrheit und Fake im postfaktisch-digitalen Zeitalter: Distinktionen in den Geistes- und IT-Wissenschaften, 1.Auflage, pp. 133-149, Wiesbaden, Springer, ISBN 978-3-658-32956-3,
DOI: 10.1007/978-3-658-32957-0_7,
[Book Section]
Haselhorst, Arno ; Germies, Jürgen ; Wright-Contreras, Lucía ; Rudolph-Cleff, Annette ; Schulze, Joachim ; Dighe, Chaitali (2021):
Digitales Deutschland - Smart-City-Ranking 2021- Smart und Nachhaltig - Die digitale Transformation unserer Städte im Angesicht der Herausforderungen und Ziele einer nachhaltigen Entwicklung. (Publisher's Version)
Darmstadt, DOI: 10.26083/tuprints-00019716,
[Report]
Haunschild, Jasmin ; Reuter, Christian (2021):
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population.
In: Mensch und Computer 2021 - Workshopband,
Gesellschaft für Informatik e.V., MuC'21: Mensch und Computer 2021, Ingolstadt, Germany, 05.-08.09.2021, DOI: 10.18420/muc2021-mci-ws08-255,
[Conference or Workshop Item]
Haunschild, Jasmin ; Reuter, Christian ; Kaufhold, Marc-André (2020):
Crisis informatics insights for peace operations.
In: Enhancing situational awareness and mission protection through digital technologies, TECHPOPS-Blog, Center for International Peace Operations, [Report]
Höchst, Jonas ; Penning, Alvar ; Lampe, Patrick ; Freisleben, Bernd (2020):
PIMOD: A Tool for Configuring Single-Board Computer Operating System Images.
In: 2020 IEEE Global Humanitarian Technology Conference (GHTC) Proceedings,
IEEE, 10th IEEE Global Humanitarian Technology Conference (GHTC 2020), virtual Conference, 29.10.-01.11.2020, ISBN 978-1-7281-7388-7,
DOI: 10.1109/GHTC46280.2020.9342928,
[Conference or Workshop Item]
Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
pp. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Conference or Workshop Item]
Hollick, Matthias ; Freisleben, Bernd ; Knodt, Michèle ; Hornung, Gerrit ; Mühlhäuser, Max ; Fraune, Cornelia ; Engels, Jens Ivo (2020):
Resiliente Informations- und Kommunikationstechnologie
für ein krisenfestes Deutschland.
Darmstadt, emergenCITY Policy Paper No. 1, DOI: 10.5281/zenodo.4066319,
[Report]
Haesler, Steffen ; Schmid, Stefka ; Reuter, Christian (2020):
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon #WirVsVirus.
In: MobileHCI '20 Extended Abstracts: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services,
ACM, MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, Oldenburg, Germany, Oktober 2020, ISBN 978-1-4503-8052-2,
DOI: 10.1145/3406324.3424584,
[Conference or Workshop Item]
Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Conference or Workshop Item]
Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020):
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
In: WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 306-316,
ACM, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006,
DOI: 10.1145/3395351.3399423,
[Conference or Workshop Item]
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and MobileNetworks, pp. 331-333,
ACM, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3401796,
[Conference or Workshop Item]
Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
pp. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Conference or Workshop Item]
Himmelmann, Nicolás ; Yuan, Dingwen ; Almon, Lars ; Hollick, Matthias (2020):
Concurrent Wireless Cut-Through Forwarding: Ultra Low-Latency Multi-Hop Communication for the IoT.
IEEE DCOSS 2020: International Conference on Distributed Computing in Sensor Systems, Virtual Conference, June 15.-17., [Conference or Workshop Item]
Höchst, Jonas ; Baumgärtner, Lars ; Kuntke, Franz ; Penning, Alvar ; Sterz, Artur ; Freisleben, Bernd (2020):
LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios.
17th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2020), Blacksburg, Virginia, USA, 24.5.-27.5.2020, [Conference or Workshop Item]
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
In: Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Entwicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Community Tracks, pp. 1545-1560,
GITO mbH Verlag für Industrielle Informationstechnik und Organisation, 15. Internationale Tagung Wirtschaftsinformatik - Community Tracks, Potsdam, Germany, 08.-11.03.2020, ISBN 978-3-95545-335-0,
DOI: 10.30844/wi_2020_o2-haunschild,
[Conference or Workshop Item]
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]
Hohmann, Fabian ; Ortiz, Andrea ; Klein, Anja (2019):
Optimal Resource Allocation Policy for Multi-Rate Opportunistic Forwarding.
In: 2019 IEEE Wireless Communications and Networking Conference (WCNC),
IEEE, IEEE Wireless Communications and Networking, Marrakesch, Marokko, 15.-18.04.2019, ISBN 978-1-5386-7646-2,
DOI: 10.1109/WCNC.2019.8885462,
[Conference or Workshop Item]
Hollick, Matthias ; Hofmeister, Anne ; Engels, Jens Ivo ; Freisleben, Bernd ; Hornung, Gerrit ; Klein, Anja ; Knodt, Michèle ; Lorenz, Imke ; Mühlhäuser, Max ; Pelz, Peter F. ; Rudolph-Cleff, Annette ; Steinmetz, Ralf ; Steinke, Florian ; Stryk, Oskar von (2019):
The Emergency Responsive Digital City.
2019 World Congress on Resilience, Reliability and Asset Management (WCRRAM), Singapore, 28.-31.07.2019, [Conference or Workshop Item]
Hollick, Matthias ; Bloessl, Bastian ; Müller, Marcus (2019):
Benchmarking and Profiling the GNU Radio Scheduler.
Huntsville, Alabama, 17.09. - 21.09.2019, [Conference or Workshop Item]
Hartwig, Katrin ; Reuter, Christian
Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
pp. 67-69, Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]
Hartwig, Katrin ; Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Wirtschaftsinformatik Proceedings 2019, pp. 1844-1855,
Siegen, Germany, Association for Information Systems AIS, 14th Interantional Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.02.2019, ISBN 978-3-96182-063-4,
[Conference or Workshop Item]
Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Conference or Workshop Item]
Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]
Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]
Heuss, Oliver (2018):
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken
im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
Darmstadt, Technische Universität,
[Ph.D. Thesis]
Hohmann, Fabian ; Klein, Anja (2017):
Cooperative Forwarding using Distributed MISO in OFDMA Multihop Networks.
In: 2017 IEEE 86th Vehicular Technology Conference (VTCFall): Proceedings,
IEEE, 86th Vehicular Technology Conference, Toronto, Canada, 24.-27.09.2017, ISBN 978-1-5090-5935-5,
DOI: 10.1109/VTCFall.2017.8288248,
[Conference or Workshop Item]
Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]
Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich (2017):
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
[Report]
Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelor Thesis]
Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy,
Melbourne, Australia, [Conference or Workshop Item]
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]
Heuser, Stephan (2016):
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]
Halvani, Oren ; Winter, Christian ; Pflug, Anika (2016):
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement), pp. S33–S43. DOI: 10.1016/j.diin.2016.01.006,
[Article]
Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO,
[Conference or Workshop Item]
Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES),
Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]
Halvani, Oren ; Winter, Christian
Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (eds.) (2015):
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
In: CEUR Workshop Proceedings, Vol-1391, In: CLEF2015 Working Notes, Working Notes of CLEF 2015 – Conference and Labs of the Evaluation forum, Toulouse, France, September 8–11, 2015,
Sun SITE Central Europe, Toulouse, France, [Conference or Workshop Item]
Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, pp. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]
Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), pp. 1-10,
ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]
Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj (2014):
Event pattern discovery on IDS traces of Cloud Services.
In: IEEE International Conference on Big Data and Cloud Computing (BDCloud),
[Conference or Workshop Item]
Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11), pp. 2185-2200. Wiley & Sons Ltd., ISSN 1939-0122,
DOI: 10.1002/sec.748,
[Article]
Halvani, Oren ; Steinebach, Martin (2014):
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014), pp. 33-43. [Article]
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium,
[Conference or Workshop Item]
Hiemenz, Benedikt (2014):
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt, [Bachelor Thesis]
Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (eds.) (2014):
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Lecture Notes in Informatics, In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 229-241, ISBN 978-3-88579-622-0,
[Book Section]
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]
Halvani, Oren ; Steinebach, Martin
Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (eds.) (2014):
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
In: Working Notes for CLEF 2014 Conference, Sheffield, UK, September 15-18, 2014., pp. 1049-1062,
Sheffield, UK, [Conference or Workshop Item]
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158. [Article]
Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (eds.) (2013):
Authorship Verification via k-Nearest Neighbor Estimation.
In: CEUR - Workshop Proceedings, In: Working Notes for CLEF 2013 Conference , Valencia, Spain, September 23-26, 2013.,
CEUR-WS.org, [Conference or Workshop Item]
Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik (2013):
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
In: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2013, pp. 525 - 534,
IEEE, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16.-18.07.2013, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.5,
[Conference or Workshop Item]
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 459-468,
IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference or Workshop Item]
Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]
Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf (2013):
Natural Language Watermarking for German Texts.
In: IH&MMSec '13, In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, pp. 193-202,
Montpellier, France, ISBN 978-1-4503-2081-8,
DOI: 10.1145/2482513.2482522,
[Conference or Workshop Item]
Henecka, Wilko ; Schneider, Thomas (2013):
Faster Secure Two-Party Computation with Less Memory.
In: ASIA CCS '13 : Proceedings, pp. 437-446,
New York, ACM, 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), Hangzhou, China, May 08 - 10, 2013, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484369,
[Conference or Workshop Item]
Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 565-576,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]
Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 391-403,
SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]
Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference or Workshop Item]
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: LNCS, In: MoCrySEn 2013, pp. 194-208, Springer, [Book Section]
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
pp. 1963-1965, ACM, Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13), Coimbra, Portugal, March 2013, ISBN 978-1-4503-1656-9,
DOI: 10.1145/2480362.2480727,
[Conference or Workshop Item]
Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, pp. 151-165,
[Conference or Workshop Item]
Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
Darmstadt, Technische Universität, [Bachelor Thesis]
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]
Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), pp. 772-783,
ACM Press, DOI: 10.1145/2382196.2382278,
[Conference or Workshop Item]
Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]
Halvani, Oren (2012):
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Darmstadt, Technische Universität, [Bachelor Thesis]
Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: LNCS, In: SAC2012 - Conference on Selected Areas in Cryptography, pp. 66-80,
Springer Berlin Heidelberg, Windsor, Canada, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]
Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
pp. 109-118, IEEE, 11th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012), Liverpool, UK, 25.-27.06., ISBN 978-1-4673-2172-3,
DOI: 10.1109/TrustCom.2012.165,
[Conference or Workshop Item]
Heuser, Annelie ; Zohner, Michael (2012):
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
pp. 249-264, Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph (2012):
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1), pp. 25-36. DOI: 10.1049/iet-bmt.2011.0013,
[Article]
Hartung, Daniel ; Pflug, Anika ; Busch, Christoph (2012):
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
In: LNI, In: Sicherheit 2012 - Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI),
Gesellschaft für Informatik e.V., [Conference or Workshop Item]
Henriques, Joselito ; Lukas, Uwe Freiherr von ; Mesing, Benjamin (2012):
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2, pp. 84-86. Göller, ISSN 1866-5004,
[Article]
Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012):
Fusion of Opinions under Uncertainty and Conflict — Trust Assessment for Cloud Marketplaces (Full version).
In: Technical Report / CASED, Darmstadt, Technische Universität Darmstadt, TUD-CS-2012-0027, [Report]
Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]
Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS), 7397, In: Financial Cryptography (FC) 2012, pp. 374-389,
Springer, [Conference or Workshop Item]
Halvani, Oren ; Steinebach, Martin
Schartner, Peter ; Taeger, Jürgen (eds.) (2012):
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, pp. 174-185, Prof. Dr. Patrick Horster, ISBN 978-3000392214,
[Book Section]
Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit,
Darmstadt, [Conference or Workshop Item]
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September,
[Conference or Workshop Item]
Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner (2012):
Data Exchange Processes based on Trust and Rights Management.
In: TMCE 2012: Tools and Methods of Competitive Engineering,
Karlsruhe, ISBN 978-90-5155-082-5,
[Conference or Workshop Item]
Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten (2012):
Friendship in German Online Social Networks.
In: SOUPS,
[Conference or Workshop Item]
Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Darmstadt, Technische Universität, [Master Thesis]
Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), pp. 213-220,
Salzburg, Austria, [Conference or Workshop Item]
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011):
Towards a Trust Management System for Cloud Computing.
In: Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933-939,
IEEE, 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16.-18.11.2011, ISBN 978-1-4577-2135-9,
DOI: 10.1109/TrustCom.2011.129,
[Conference or Workshop Item]
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2011):
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011), [Article]
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011):
Mobile eID application for the German identity card.
[Report]
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011):
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
In: Technical Report, TUD-CS-2011-0104, [Report]
Hoffmann, Gerhard (2011):
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt, [Master Thesis]
Horsch, Moritz ; Stopczynski, Martin (2011):
The German eCard-Strategy.
[Report]
Horsch, Moritz (2011):
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Darmstadt, Technische Universität, [Bachelor Thesis]
Hamacher, Kay ; Katzenbeisser, Stefan (2011):
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011), pp. 115-124, ACM Press, [Book Section]
Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2011):
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
In: 14th EUROMICRO Conference on Digital System Design (DSD2011),
[Conference or Workshop Item]
Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco (2010):
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
In: Proceeding of ASME 2010 International Mechanical Engineering Congress & Exposition,
Vancouver, British Columbia, Canada, ISBN 978-0-7918-3891-4,
[Conference or Workshop Item]
Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro (2010):
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2), pp. 56-59. [Article]
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2010):
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 410-415,
IEEE Computer Society, Xi'an, China, ISBN 978-0-7695-4272-0,
DOI: 10.1109/UIC-ATC.2010.48,
[Conference or Workshop Item]
Heinson, Dennis ; Schmidt, Bernd (2010):
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8), pp. 540-547. [Article]
Halvani, Oren ; Steinebach, Martin (2010):
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 61 (5), pp. 285-291. [Article]
Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS, 6055, In: Africacrypt 2010, pp. 52-68,
Springer, Stellenbpsch, South Africa, [Conference or Workshop Item]
Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus (2010):
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2), pp. 75–79. DOI: 10.1007/s11623-010-0039-x,
[Article]
Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
Freiling, Felix (ed.) (2010):
Quantifying the Attack Surface of a Web Application.
In: Lecture Notes in Informatics (LNI), P-170, In: Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit., pp. 305-316,
Bonner Köllen Verlag, Bonn, ISBN 978-3-88579-264-2,
[Conference or Workshop Item]
Hartmann, Frank (2010):
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Darmstadt, Technische Universität, [Bachelor Thesis]
Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph (2010):
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
[Conference or Workshop Item]
Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009):
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5,
IEEE Press, DOI: 10.1109/NTMS.2009.5384830,
[Conference or Workshop Item]
Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas (2009):
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10), pp. 968-975. DOI: 10.4304/jnw.4.10.968-975,
[Article]
Horsch, Moritz (2009):
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Darmstadt, Technische Universität, [Bachelor Thesis]
Hornung, Gerrit ; Schnabel, Christoph (2009):
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2), pp. 115-122. [Article]
Hornung, Gerrit ; Schnabel, Christoph (2009):
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1), pp. 84-88. [Article]
Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max (2009):
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1), pp. 90-111. IARIA, ISSN 1942-2636,
[Article]
Hartung, Daniel (2009):
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5, [Article]
Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
12/393,242,
[Norm, patent, standard]
Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
12/393,242,
[Norm, patent, standard]
Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel (2008):
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR, pp. 723-728. [Article]
Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf (2007):
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
In: Proceedings of the 15th IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA, pp. 126--134,
[Conference or Workshop Item]
Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6), pp. 434-440. [Article]
Hutter, Dieter ; Volkamer, Melanie
Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (eds.) (2006):
Information Flow Control to Secure Dynamic Web Service Composition.
In: Security in Pervasive Computing, pp. 196-210,
York, UK, [Conference or Workshop Item]
Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (eds.) (2006):
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
91, In: Proceedings of the ECEH'06, pp. 59-70,
Freiburg (Schweiz), [Conference or Workshop Item]
Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf (2005):
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
In: Proceedings of 30th Annual IEEE Conference on Local Computer Networks (LCN2005), Sydney, Australia, pp. 366--373,
[Conference or Workshop Item]
Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. (2004):
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
In: Proceedings of the 30th EUROMICRO Conference (EUROMICRO 2004), Rennes, France, pp. 495--502,
IEEE Computer Society Press, Los Alamitos, [Conference or Workshop Item]
Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1), pp. 35--44. [Article]
Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf (2004):
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
In: Proceedings of Second International Conference on Wired/Wireless Internet Communications (WWIC 2004), Frankfurt (Oder), Germany, pp. 201--212,
Springer-Verlag Berlin/Heidelberg/New York, [Conference or Workshop Item]
Hollick, Matthias ; Krop, T. ; Schmitt, J. (2003):
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.
(TR-KOM-2003-02), [Report]
Hollick, Matthias ; Steinmetz, Ralf (2002):
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
In: Enterprise Security, pp. 163--176,
IT Verlag fr Informationstechnik GmbH, Höhenkirchen, [Conference or Workshop Item]
Hollick, Matthias ; Schmitt, J. (2002):
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
(TR-KOM-2002-11), [Report]
Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf (2001):
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
In: Innovative Anwendungen in Kommunikationsnetzen, Proceedings der 15. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Germany, pp. 101--111,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]
Hollick, Matthias ; Steinmetz, Ralf (2001):
Security Goals for Service Discovery in Ad-hoc Environments.
In: Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2001), Split, Croatia, pp. 1025--1032,
FESB-Split, [Conference or Workshop Item]
Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf (2001):
A Security Model for Multicast Group Integrity Management.
In: Poster Session of Third International Workshop on Networked Group Communication, UCL, London, UK, Organised by UCL and COST 264 in cooperation with ACM SIGCOMM,
London, Third International Workshop on Networked Group Communication, London, UK, November 7–9, 2001, [Conference or Workshop Item]
Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on
Computer and Communications Security and Protection, pp. 67--82,
[Conference or Workshop Item]
I
István, Zsolt ; Rosero, Paul ; Bonnet, Philippe (2022):
Always-trusted IoT - Making IoT Devices Trusted with Minimal Overhead.
5th Workshop on System Software for Trusted Execution (SysTEX'22), Lausanne, Switzerland, 28.02.-04.03.2022, [Conference or Workshop Item]
Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]
Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
Darmstadt, Technische Universität, [Master Thesis]
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]
Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor Thesis]
Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011):
Modular Reasoning with Join Point Interfaces.
[Report]
Isaak, J. ; Savran, D. ; Fritzsche, M. ; Galaviz, D. ; Hartmann, T. ; Kamerdzhiev, S. ; Kelley, J. ;