TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Á
Number of items at this level (without sub-levels): 2517.

A

Audrito, Giorgio ; Casadei, Roberto ; Damiani, Ferruccio ; Salvaneschi, Guido ; Viroli, Mirko
eds.: Ali, Karim ; Vitek, Jan (2022)
Functional Programming for Distributed Systems with XC.
36th European Conference on Object-Oriented Programming. Berlin, Germany (06.-10.06.2022)
doi: 10.4230/LIPIcs.ECOOP.2022.20
Conference or Workshop Item, Bibliographie

Almon, Lars ; Krause, Arno ; Fietze, Oliver ; Hollick, Matthias (2021)
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
19th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’21). virtual Conference (22.-26.11.2021)
doi: 10.1145/3479241.3486689
Conference or Workshop Item, Bibliographie

Ansell, Alan ; Edoardo, Maria Ponti ; Pfeiffer, Jonas ; Ruder, Sebastian ; Glavaš, Goran ; Vulić, Ivan ; Korhonen, Anna (2021)
MAD-G: Multilingual Adapter Generation for Efficient Cross-Lingual Transfer.
Conference on Empirical Methods in Natural Language Processing (EMNLP 2021). Punta Cana, Dominican Republic (07.-11.11.2021)
Conference or Workshop Item, Bibliographie

Alhamwy, Yasin (2021)
Information Management for Multi-Agent Systems.
NetSys 2021. Lübeck (13.-16.09.2021)
Conference or Workshop Item, Bibliographie

Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021)
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21). virtual conference (Mon 11 - Fri 15 October 2021)
doi: 10.1145/3475716.3475783
Conference or Workshop Item, Bibliographie

Alhamwy, Yasin ; Watson, Simon ; Carrasco, Joaquin ; Cooper, Glen ; Geihs, Kurt (2021)
A Feasibility Analysis of Tether Localisation for Mobile Robots.
1st European Workshop on Maritime Systems Resilience and Security (MARESEC 2021). virtual Conference (14.06.2021)
Conference or Workshop Item, Bibliographie

Araslanov, Nikita ; Roth, Stefan (2021)
Self-supervised Augmentation Consistency for Adapting Semantic Segmentation.
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2021). virtual Conference (19.-25.06.2021)
doi: 10.1109/CVPR46437.2021.01513
Conference or Workshop Item, Bibliographie

Araslanov, Nikita ; Schaub-Meyer, Simone ; Roth, Stefan
eds.: Ranzato, Marc'Aurelio ; Beygelzimer, Alina ; Dauphin, Yann N. ; Liang, Percy ; Vaughan, Jennifer Wortman (2021)
Dense Unsupervised Learning for Video Segmentation.
(6.12. - 14.12.2021)
Conference or Workshop Item, Bibliographie

Abanto-Leon, Luis F. ; Bäuml, Andreas ; Sim, Gek Hong ; Hollick, Matthias ; Asadi, Arash (2020)
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints.
In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4 (3)
doi: 10.1145/3428329
Article, Bibliographie

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020)
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1)
doi: 10.1145/3406112
Article, Bibliographie

Araslanov, N. ; Roth, S. (2020)
Single-stage semantic segmentation from image labels.
2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition. virtual Conference (13.-19.06.2020)
doi: 10.1109/CVPR42600.2020.00431
Conference or Workshop Item, Bibliographie

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Article, Bibliographie

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020)
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20). virtual Conference (30.03.-03.04.)
doi: 10.1145/3341105.3374020
Conference or Workshop Item, Bibliographie

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19-22.10.2020)
Conference or Workshop Item, Bibliographie

Alexopoulos, Nikolaos ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max
eds.: Cavallaro, Lorenzo ; Kinder, Johannes ; Wang, XiaoFeng ; Katz, Jonathan (2019)
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
ACM SIGSAC Conference on Computer and Communications Security, CCS 2019. London, UK (November 11-15, 2019)
doi: 10.1145/3319535.3363285
Conference or Workshop Item, Bibliographie

Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019)
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (May 19 to 22, 2019)
Conference or Workshop Item, Bibliographie

Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019)
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN). Osnabrück (14-17 Oktober 2019)
Conference or Workshop Item, Bibliographie

Almon, Lars ; Álvarez, Flor ; Lieser, Patrick ; Meuser, Tobias ; Schaller, Fabian (2018)
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt.
In: Die Fortentwicklung des Datenschutzes
doi: 10.1007/978-3-658-23727-1_5
Book Section, Bibliographie

Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Asadi, Arash ; Sim, Gek Hong ; Hollick, Matthias ; Klein, Anja ; Müller, Sabrina (2018)
FML: Fast Machine Learning for 5G mmWave Vehicular Communications.
37th IEEE Conference on Computer Communications. Honolulu, USA (15.-19.4.2018)
doi: 10.1109/INFOCOM.2018.8485876
Conference or Workshop Item, Bibliographie

Alhassan, Masaud Y. (2018)
Improving scalability of universal circuits for large-scale private function evaluation.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Ay, Serafettin (2017)
Detecting WiFi Covert Channels.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017)
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Lucca, Italy (08.-13.10 2017)
doi: 10.1007/978-3-319-99843-5_10
Conference or Workshop Item, Bibliographie

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017)
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
26th USENIX Security Symposium. Vancouver, Canada (16.-18.08.2017)
Conference or Workshop Item, Bibliographie

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Article, Bibliographie

Asadi, Arash ; Mancuso, Vincenzo ; Gupta, Rohit (2017)
DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks.
In: IEEE/ACM Transactions on Networking, 25 (5)
doi: 10.1109/TNET.2017.2712285
Article, Bibliographie

Arzt, Steven (2017)
Static Data Flow Analysis for Android Applications.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Asadi, Arash ; Mancuso, Vincenzo (2016)
Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice.
In: IEEE Transactions on mobile computing, 16 (8)
doi: 10.1109/TMC.2016.2621041
Article, Bibliographie

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Conference or Workshop Item, Bibliographie

Ali, Azmzt ; Othmane, Lotfi Ben (2016)
Towards effective security assurance for incremental software development - the case of zen cart application,.
Conference or Workshop Item, Bibliographie

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Conference or Workshop Item, Bibliographie

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Conference or Workshop Item, Bibliographie

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016)
Computational Security of Quantum Encryption.
In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016
Book Section, Bibliographie

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015)
Conference or Workshop Item, Bibliographie

Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben (2015)
Incremental Development of RBAC-controlled E-marking System Using the B Method.
Conference or Workshop Item, Bibliographie

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015)
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. Portland, USA (14.06.2015)
Conference or Workshop Item, Bibliographie

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Conference or Workshop Item, Bibliographie

Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
doi: 10.1007/978-3-662-46800-5_17
Conference or Workshop Item, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
doi: 10.1007/978-3-662-46800-5_26
Conference or Workshop Item, Bibliographie

Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés (2015)
Blended Identity: Pervasive IdM for Continuous Authentication.
Conference or Workshop Item, Bibliographie

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
eds.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Book Section, Bibliographie

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Article, Bibliographie

Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
doi: 10.1145/2568225.2568243
Conference or Workshop Item, Bibliographie

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014)
Constructing Call Graphs of Scala Programs.
Proceedings of the 28th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014)
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. Edinburgh
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014)
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. Scottsdale
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
ICSE. Hyderabad
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014)
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Conference or Workshop Item, Bibliographie

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Book, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
Berlin (November 04 - 08, 2013)
doi: 10.1145/2508859.2516738
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Conference or Workshop Item, Bibliographie

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Article, Bibliographie

Arzt, Steven ; Bodden, Eric (2013)
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
Report, Bibliographie

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13).
doi: 10.1007/978-3-642-38980-1_27
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
Report, Bibliographie

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Article, Bibliographie

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013)
How useful are existing monitoring languages for securing Android apps?
6. Arbeitstagung Programmiersprachen (ATPS 2013).
Conference or Workshop Item, Bibliographie

Ali, Karim ; Lhoták, Ondřej (2013)
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the 27th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012)
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
15th International Conference on Information Security. Passau, Germany (19-21 Sep 2012)
doi: 10.1007/978-3-642-33383-5_11
Conference or Workshop Item, Bibliographie

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012)
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012).
Conference or Workshop Item, Bibliographie

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Article, Bibliographie

Ahn, T. ; Rainovski, G. ; Pietralla, N. ; Coquard, L. ; Möller, T. ; Costin, A. ; Janssens, R. V. ; Lister, C. ; Carpenter, M. ; Zhu, S. (2012)
Identification of the 2_{1,ms}^{+} mixed-symmetry state in ^{136}Ce.
In: Physical Review C, 86 (1)
doi: 10.1103/PhysRevC.86.014303
Article, Bibliographie

Ali, Karim ; Lhoták, Ondřej (2012)
Application-Only Call Graph Construction.
Proceedings of the 26th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Conference or Workshop Item, Bibliographie

Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef (2012)
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7)
Article, Bibliographie

Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf (2011)
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
Helsinki, Finland
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011)
A Formal Foundation for the Security Features of Physical Functions.
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Strufe, Thorsten (2011)
An Efficient Distributed Privacy-preserving Recommendation System.
Conference or Workshop Item, Bibliographie

Ahmed, Sarah (2011)
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010)
Impossibility Results for RFID Privacy Notions.
Conference or Workshop Item, Bibliographie

Ackermann, Tobias ; Buxmann, Peter (2010)
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
Conference or Workshop Item, Bibliographie

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk (2010)
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, 5 (Special Issue)
Article, Bibliographie

Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph (2010)
Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
Workshop on Program Semantics, Specification and Verification: Theory and Applications (PSSV 2010). Kazan, Russia (June 14-15, 2010)
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
On RFID Privacy with Mutual Authentication and Tag Corruption.
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Anonymous Authentication for RFID Systems.
Conference or Workshop Item, Bibliographie

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
eds.: Acquisti, A. ; Sadeghi, Ahmad-Reza (2010)
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Conference or Workshop Item, Bibliographie

Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David (2010)
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
3rd International Conference on Cryptology in Africa. Stellenbosch, South Africa (03.-06.05.2010)
doi: 10.1007/978-3-642-12678-9_21
Conference or Workshop Item, Bibliographie

Anderl, Reiner ; Henriques, Joselito Rodrigues (2010)
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2)
Article, Bibliographie

Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj (2010)
Data-based Agreement for Inter-Vehicle Coordination.
Conference or Workshop Item, Bibliographie

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
Conference or Workshop Item, Bibliographie

Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia (2010)
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
Conference or Workshop Item, Bibliographie

Acker, Robin ; Massoth, Michael (2010)
Secure Ubiquitous House and Facility Control Solution.
Conference or Workshop Item, Bibliographie

Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael (2010)
Ubiquitous Home Control based on SIP and Presence Service.
Conference or Workshop Item, Bibliographie

Anderl, Reiner ; Henriques, Joselito (2009)
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
International Congress of Mechanical Engineering. Gramado, Brazil
Conference or Workshop Item, Bibliographie

Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009)
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
Global Information Infrastructure Symposium.
Conference or Workshop Item, Bibliographie

Ali, Karim ; Boutaba, Raouf (2009)
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
Global Information Infrastructure Symposium.
Conference or Workshop Item, Bibliographie

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max (2009)
Shaping the Future Internet.
3rd International CompanionAble Workshop IoPTS. Brussels, Belgium (02.12.2009)
Conference or Workshop Item, Bibliographie

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina (2008)
Smart Products: Integration Challenges.
Conference or Workshop Item, Bibliographie

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008)
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Conference or Workshop Item, Bibliographie

Aciicmez, Onur ; Schindler, Werner
ed.: Malkin, T. (2008)
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
Berlin
Conference or Workshop Item, Bibliographie

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008)
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6)
Article, Bibliographie

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina (2008)
Smart Products: Integration Challenges.
Conference or Workshop Item, Bibliographie

Alkassar, Ammar ; Volkamer, Melanie (2007)
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
Article, Bibliographie

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006)
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
Norm, patent, standard, Bibliographie

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005)
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8
Article, Bibliographie

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004)
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
Conference or Workshop Item, Bibliographie

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001)
Using a Rules Model to Improve Handling of Personally Identifiable Information.
Norm, patent, standard, Bibliographie

Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias (2001)
Using an Object Model to Improve Handling of Personally Identifiable Information.
Norm, patent, standard, Bibliographie

B

Böck, Leon ; Levin, Dave ; Padmanabhan, Ramakrishna ; Doerr, Christian ; Mühlhäuser, Max (2023)
How to Count Bots in Longitudinal Datasets of IP Addresses.
Conference or Workshop Item, Bibliographie

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2023)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung. Wien, Austria (18.-19.2.2019)
doi: 10.26083/tuprints-00022202
Conference or Workshop Item, Secondary publication, Publisher's Version

Becker, Katrin ; Oehler, Martin ; Stryk, Oskar von (2022)
3D Coverage Path Planning for Efficient Construction Progress Monitoring.
25th IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR 2021). Sevilla, Spain (08.-10.11.2022)
doi: 10.1109/SSRR56537.2022.10018726
Conference or Workshop Item, Bibliographie

Bugliarello, Emanuele ; Liu, Fangyu ; Pfeiffer, Jonas ; Reddy, Siva ; Elliott, Desmond ; Ponti, Edoardo M. ; Vulić, Ivan
eds.: Chaudhuri, Kamalika ; Jegelka, Stefanie ; Song, Le ; Szepesvari, Csaba ; Niu, Gang ; Sabato, Sivan ; University of Copenhagen, Mila – Quebec Artificial Intelligence Institute, University of Cambridge, TU Darmstadt, New York University, McGill University (2022)
IGLUE: A Benchmark for Transfer Learning across Modalities, Tasks, and Languages.
The 39th International Conference on Machine Learning. Baltimore, Maryland USA (17.-23.07.2022)
Conference or Workshop Item, Bibliographie

Bein, Nicole S. ; Kmet, Brigita ; Rojac, Tadej ; Golob, Andreja Benčan ; Malič, Barbara ; Moxter, Julian ; Schneider, Thorsten ; Fulanovic, Lovro ; Azadeh, Maryam ; Frömling, Till ; Egert, Sonja ; Wang, Hongguang ; Aken, Peter van ; Schwarzkopf, Jutta ; Klein, Andreas (2022)
Fermi energy, electrical conductivity, and the energy gap of NaNbO3.
In: Physical Review Materials, 6 (8)
doi: 10.1103/PhysRevMaterials.6.084404
Article, Bibliographie

Bock, Carolin ; Kurz, Konstantin (2022)
Flip the Tweet - The Two-Sided Coin of Entrepreneurial Empathy.
In: Academy of Management Proceedings, 2022 (1)
doi: 10.5465/AMBPP.2022.14076abstract
Article, Bibliographie

Böck, Leon ; Fejrskov, Martin ; Demetzou, Katerina ; Karuppayah, Shankar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2022)
Processing of botnet tracking data under the GDPR.
In: Computer law & security review, 45
doi: 10.1016/j.clsr.2021.105652
Article, Bibliographie

Baumgärtner, Tim ; Wang, Kexin ; Sachdeva, Rachneet ; Geigle, Gregor ; Eichler, Max ; Poth, Clifton ; Sterz, Hannah ; Puerto, Haritz ; Ribeiro, Leonardo F. R. ; Pfeiffer, Jonas ; Reimers, Nils ; Şahin, Gözde Gül ; Gurevych, Iryna (2022)
UKP-SQUARE: An Online Platform for Question Answering Research.
60th Annual Meeting of the Association for Computational Linguistics. Dublin, Ireland (22.-27.05.2022)
Conference or Workshop Item, Bibliographie

Beck, Tilman ; Bohlender, Bela ; Viehmann, Christina ; Hane, Vincent ; Adamson, Yanik ; Khuri, Jaber ; Brossmann, Jonas ; Pfeiffer, Jonas ; Gurevych, Iryna (2022)
AdapterHub Playground: Simple and Flexible Few-Shot Learning with Adapters.
60th Annual Meeting of the Association for Computational Linguistics. Dublin, Ireland (22.-27.05.2022)
Conference or Workshop Item, Bibliographie

Baumgärtner, Lars ; Meuser, Tobias ; Bloessl, Bastian (2021)
coreemu-lab: An Automated Network Emulation and Evaluation Environment.
11th IEEE Global Humanitarian Technology Conference (GHTC 2021). virtual Conference (19.-23.10.2021)
doi: 10.1109/GHTC53159.2021.9612475
Conference or Workshop Item, Bibliographie

Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2021)
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes.
17th International Conference on distributed Computing in sensor systems (DCOSS 2021). virtual Conference (14.-16.07.2021)
doi: 10.1109/DCOSS52077.2021.00014
Conference or Workshop Item, Bibliographie

Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.-11.06.2021)
Conference or Workshop Item, Bibliographie

Bock, Carolin ; Kurz, Konstantin ; Madina, Iliyana ; Bejan, Julia ; Bürger, Robin ; Rockel, Jens (2021)
Crowdfunding in Zeiten von COVID-19: Ein geeignetes Finanzinstrument in der Krise?
doi: 10.24406/publica-fhg-301034
Book, Bibliographie

Börner, Johannes ; Steinke, Florian (2021)
Measuring LTI System Resilience against Adversarial Disturbances based on Efficient Generalized Eigenvalue Computations.
60th IEEE Conference on Decision and Control (CDC 2021). virtual Conference (13.-15.12.2021)
Conference or Workshop Item, Bibliographie

Becker, Benjamin ; Oberli, Christian ; Lieser, Patrick ; Steinmetz, Ralf
eds.: Hölscher, Christoph ; Comes, Tina (2020)
A Survey about Resilience in Communication Networks.
2020 Joint International Resilience Conference. virtual Conference (23.-27.11.)
Conference or Workshop Item, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop. Orlando, USA (09.-13.11.)
Conference or Workshop Item, Bibliographie

Baumgärtner, Lars ; Lieser, Patrick ; Zobel, Julian ; Bloessl, Bastian ; Steinmetz, Ralf ; Mezini, Mira (2020)
LoRAgent: A DTN-based Location-aware Communication System using LoRa.
10th IEEE Global Humanitarian Technology Conference. virtual Conference (29.10.-01.11.2020)
doi: 10.1109/GHTC46280.2020.9342886
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (June 1-5, 2020)
Conference or Workshop Item, Bibliographie

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.-22.10.2020)
Conference or Workshop Item, Bibliographie

Bach, Rebecca ; Götzinger, Robert ; Kiziltoprak, Nihat ; Pfeiffer, Marcus ; Schabel, Samuel ; Schneider, Jens ; Knaack, Ulrich ; Kolling, Stefan (2020)
Warum … und nicht … ? Fragen, Gedanken und Diskussionen zum Bauen mit Papier.
In: Wochenblatt für Papierfabrikation, 2020 (9)
Article, Bibliographie

Bloessl, Bastian ; Baumgärtner, Lars ; Hollick, Matthias (2020)
Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio.
Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization. London, United Kingdom (September 2020)
doi: 10.1145/3411276.3412184
Conference or Workshop Item, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.-28.08)
Conference or Workshop Item, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop. virtual Conference (16.08.2020)
Conference or Workshop Item, Bibliographie

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09. – 13. March 2020)
Conference or Workshop Item, Bibliographie

Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2020)
Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices.
International Conference on Embedded Wireless Systems and Networks (EWSN 2020). Lyon, France (17.02.-19.02.2020)
Conference or Workshop Item, Bibliographie

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.-11.12.)
Conference or Workshop Item, Bibliographie

Baumgärtner, Lars ; Lieser, Patrick ; Mezini, Mira (2020)
The Buschfunk Project : Offline Communication for Everyone.
10th IEEE Global Humanitarian Technology Conference. virtual Conference (29.10.-01.11.2020)
Conference or Workshop Item, Bibliographie

Beilschmidt, Christian ; Drönner, Johannes ; Glombiewski, Nikolaus ; Körber, Michael ; Mattig, Michael ; Morgen, Andreas ; Seeger, Bernhard (2019)
VAT to the Future: Extrapolating Visual Complex Event Processing.
7th OpenSky Workshop. Zurich, Switzerland (21.-22.11.2019)
doi: 10.29007/wz4w
Conference or Workshop Item, Bibliographie

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop. London (15. November 2019)
Conference or Workshop Item, Bibliographie

Bein, Nicole S. ; Machado, Pamela ; Coll, Mariona ; Chen, Feng ; Makarovic, Maja ; Rojac, Tadej ; Klein, Andreas (2019)
Electrochemical Reduction of Undoped and Cobalt-Doped BiFeO3 Induced by Water Exposure: Quantitative Determination of Reduction Potentials and Defect Energy Levels Using Photoelectron Spectroscopy.
In: The Journal of Physical Chemistry Letters, 10
doi: 10.1021/acs.jpclett.9b02706
Article, Bibliographie

Baumgärtner, Lars ; Höchst, Jonas ; Lampe, Patrick ; Mogk, Ragnar ; Sterz, Artur ; Weisenburger, Pascal ; Mezini, Mira ; Freisleben, Bernd (2019)
Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City.
2019 IEEE Global Humanitarian Technology Conference (GHTC 2019). Seattle, USA (17.-20.10.)
Conference or Workshop Item, Bibliographie

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
eds.: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A. (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
24th European Symposium on Research in Computer Security. Luxembourg (23.-27.09.2019)
doi: 10.1007/978-3-030-29962-0_25
Conference or Workshop Item, Bibliographie

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas
eds.: Ding, Jintai ; Steinwandt, Rainer (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
10th International Conference on Post-Quantum Cryptography. Chongqing, People's Republic China (08.-10.05.2019)
doi: 10.1007/978-3-030-25510-7_12
Conference or Workshop Item, Bibliographie

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (June 02 - 06, 2019)
Conference or Workshop Item, Bibliographie

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung 2019: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.-19.02.2019)
Conference or Workshop Item, Bibliographie

Bloessl, Bastian ; Müller, Marcus ; Hollick, Matthias (2019)
Benchmarking and Profiling the GNU Radio Scheduler.
Proceedings of the GNU Radio Conference. Huntsville, Alabama (17.09. - 21.09.2019)
Conference or Workshop Item, Bibliographie

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018)
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018. Toronto, Canada (15.-19.10. 2018)
Conference or Workshop Item, Bibliographie

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
doi: 10.1145/3243734.3243786
Conference or Workshop Item, Bibliographie

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar (2018)
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Heraklion, Crete, Greece
doi: 10.1007/978-3-030-00470-5_24
Conference or Workshop Item, Bibliographie

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
doi: 10.21437/Interspeech.2018-2032
Conference or Workshop Item, Bibliographie

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018)
Towards Practical RAM based Secure Computation.
ESORICS 2018. Barcelona, Spain (3.9.-7.9. 2018)
Conference or Workshop Item, Bibliographie

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018)
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM). Honolulu, Hawaii, USA (15-19 April 2018)
Conference or Workshop Item, Bibliographie

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018)
Internet As a Source of Randomness.
HotNets '18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (November 2018)
doi: 10.1145/3286062.3286072
Conference or Workshop Item, Bibliographie

Baumgärtner, Lars ; Kohlbrecher, Stefan ; Euler, Juliane ; Ritter, Tobias ; Stute, Milan ; Meurisch, Christian ; Mühlhäuser, Max ; Hollick, Matthias ; Stryk, Oskar von ; Freisleben, Bernd (2017)
Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles.
2017 IEEE Global Humanitarian Technology Conference. San Jose, CA, USA (19.-22.10.2017)
doi: 10.25534/tuprints-00013328
Conference or Workshop Item, Secondary publication, Postprint

Böck, Leon (2017)
On P2P botnet monitoring in adverse conditions.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Conference or Workshop Item, Bibliographie

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Conference or Workshop Item, Bibliographie

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017)
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
doi: 10.1145/3098954.3098990
Conference or Workshop Item, Bibliographie

Baumgärtner, L. ; Graubner, P. ; Höchst, J. ; Klein, A. ; Freisleben, B. (2017)
Speak Less Hear Enough: On Dynamic Announcement Intervals in Wireless On-demand Networks.
13th Annual Conference on Wireless On-demand Network Systems and Services (WONS). Jackson, USA (21.-24.02.2017)
doi: 10.1109/WONS.2017.7888768
Conference or Workshop Item, Bibliographie

Borges, Fábio ; Lara, Pedro ; Portugal, Renato (2017)
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292
doi: 10.1016/j.amc.2016.07.036
Article, Bibliographie

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017)
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item, Bibliographie

Bieber, Julian (2016)
Generalizing Semi-Private Function Evaluation.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Conference or Workshop Item, Bibliographie

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report, Bibliographie

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article, Bibliographie

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article, Bibliographie

Binder, P. ; Muma, M. ; Zoubir, A. M. (2016)
Robust and Adaptive Diffusion-based Classification in Distributed Networks.
In: EURASIP Journal on Advances in Signal Processing, 2016
doi: 10.1186/s13634-016-0331-5
Article, Bibliographie

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Conference or Workshop Item, Bibliographie

Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Baumgärtner, Lars ; Gardner-Stephen, Paul ; Graubner, Pablo ; Lakeman, Jeremy ; Höchst, Jonas ; Lampe, Patrick ; Schmidt, Nils ; Schulz, Stefan ; Sterz, Artur ; Freisleben, Bernd (2016)
An Experimental Evaluation of Delay-Tolerant Networking with Serval.
Conference or Workshop Item, Bibliographie

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Conference or Workshop Item, Bibliographie

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Hide And Seek: Detecting Sensors in P2P Botnets.
Florence, Italy
doi: 10.1109/CNS.2015.7346908
Conference or Workshop Item, Bibliographie

Baluda, Mauro (2015)
EvoSE: Evolutionary Symbolic Execution.
6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015). Bergamo, Italy (August 2015)
Conference or Workshop Item, Bibliographie

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Conference or Workshop Item, Bibliographie

Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Conference or Workshop Item, Bibliographie

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article, Bibliographie

Baumgärtner, Lars ; Graubner, Pablo ; Schmidt, Nils ; Freisleben, Bernd (2015)
AndroLyze: A Distributed Framework for Efficient Android App Analysis.
Conference or Workshop Item, Bibliographie

Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Conference or Workshop Item, Bibliographie

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article, Bibliographie

Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
eds.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
eds.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
eds.: Peterson, Gilbert ; Shenoi, Sujeet (2014)
Using Approximate Matching to Reduce the Volume of Digital Data.
Vienna, Austria
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article, Bibliographie

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
Salzburg, Austria (June 11 - 13, 2014)
doi: 10.1145/2600918.2600922
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
eds.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Volkamer, Melanie
eds.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report, Bibliographie

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article, Bibliographie

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014)
Key2Share for Authentication Services.
Conference or Workshop Item, Bibliographie

Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
ed.: SPIE, IS&T (2014)
Robust Hashing for 3D Models.
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Conference or Workshop Item, Bibliographie

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article, Bibliographie

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Conference or Workshop Item, Bibliographie

Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias (2014)
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
doi: 10.1145/2627393.2627405
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
eds.: Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (2014)
Towards a Process Model for Hash Functions in Digital Forensics.
Moscow, Russia
doi: 10.1007/978-3-319-14289-0_12
Conference or Workshop Item, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2014)
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4)
Article, Bibliographie

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014)
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327
Article, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Conference or Workshop Item, Bibliographie

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014)
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Conference or Workshop Item, Bibliographie

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014)
Scalable Offline Monitoring.
Proceedings of the 14th International Conference on Runtime Verification (RV). Heidelberg, Germany
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Neumann, Stephan (2014)
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2)
Article, Bibliographie

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book, Bibliographie

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013)
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37
doi: 10.1007/s11623-013-0300-1
Article, Bibliographie

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013)
Reducing human factors in software security architectures.
Future Security Conference 2013.
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil (2013)
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article, Bibliographie

Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013)
Security considerations on extending PACE to a biometric-based connection establishment.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
eds.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section, Bibliographie

Bartsch, Steffen ; Volkamer, Melanie (2013)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Koblenz
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013)
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
Article, Bibliographie

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
eds.: Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (2013)
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing
doi: 10.1007/s00200-013-0199-7
Book Section, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie

Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013)
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1)
Article, Bibliographie

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
ed.: Horbach, Matthias (2013)
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Koblenz
Conference or Workshop Item, Bibliographie

Beckerle, Matthias ; Martucci, Leonardo (2013)
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
ed.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17. - 19. Juni 2013)
Conference or Workshop Item, Bibliographie

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Conference or Workshop Item, Bibliographie

Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin (2013)
Leakage Detection and Tracing for Databases.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
ed.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013)
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
Article, Bibliographie

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
ed.: Dawson, E. (2013)
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
Conference or Workshop Item, Bibliographie

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2013)
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4)
Article, Bibliographie

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Conference or Workshop Item, Bibliographie

Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas (2013)
Video Game Watermarking.
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Petrov, Kaloyan (2013)
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9)
Article, Bibliographie

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
ed.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013)
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3)
doi: 10.1007/s10623-013-9840-5
Article, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article, Bibliographie

Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. (2013)
Multi-Biometrische Gesichtserkennung.
Bonn, Germany
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013)
Reset Indifferentiability and its Consequences.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Conference or Workshop Item, Bibliographie

Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten (2013)
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2)
doi: 10.4230/DagRep.3.2.22
Article, Bibliographie

Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article, Bibliographie

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report, Bibliographie

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012)
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012)
Delta-oriented Monitor Specification.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012)
Challenges in defining a programming language for provably correct dynamic analyses.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article, Bibliographie

Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
Article, Bibliographie

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
eds.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Volkamer, Melanie (2012)
Towards the Systematic Development of Contextualized Security Interventions.
Birmingham, UK
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012)
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
Article, Bibliographie

Breitinger, Frank ; Baier, Harald (2012)
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
Article, Bibliographie

Baier, Harald ; Brand, Achim (2012)
On the Investigation of Application Specific Data within Digital Forensics.
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Baier, Harald (2012)
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL)
Article, Bibliographie

Braun, Johannes ; Buchmann, Johannes
eds.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article, Bibliographie

Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report, Bibliographie

Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet (2012)
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, 11 (1)
doi: 10.5381/jot.2012.11.1.a7
Article, Bibliographie

Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
eds.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Book Section, Bibliographie

Bulygin, Stanislav ; Walter, Michael (2012)
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
Report, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie

Bodden, Eric (2012)
Identifying meaningless parameterized linear-temporal-logic formulas.
Report, Bibliographie

Bodden, Eric (2012)
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
Report, Bibliographie

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012)
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
Article, Bibliographie

Bauer, C. ; Behrens, T. ; Bildstein, V. ; Blazhev, A. ; Bruyneel, B. ; Butterworth, J. ; Clément, E. ; Coquard, L. ; Egido, J. ; Ekström, A. ; Fitzpatrick, C. ; Fransen, C. ; Gernhäuser, R. ; Habs, D. ; Hess, H. ; Leske, J. ; Kröll, T. ; Krücken, R. ; Lutter, R. ; Marley, P. ; Möller, T. ; Otsuka, T. ; Patronis, N. ; Petts, A. ; Pietralla, N. ; Rodríguez, T. ; Shimizu, N. ; Stahl, C. ; Stefanescu, I. ; Stora, T. ; Thirolf, P. ; Voulot, D. ; Walle, J. van de ; Warr, N. ; Wenander, F. ; Wiens, A. (2012)
Prolate shape of ^{140}Ba from a first combined Doppler-shift and Coulomb-excitation measurement at the REX-ISOLDE facility.
In: Physical Review C, 86 (3)
doi: 10.1103/PhysRevC.86.034310
Article, Bibliographie

Bockisch, Christoph ; Sewe, Andreas (2012)
The ALIA4J Approach to Efficient Language Implementation.
Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity. Tucson, AZ, USA
doi: 10.1145/2384716.2384726
Conference or Workshop Item, Bibliographie

Bodden, Eric (2012)
MOPBox: A Library Approach to Runtime Verification.
RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30.
Conference or Workshop Item, Bibliographie

Baier, Harald ; Dichtelmüller, Christian (2012)
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Conference or Workshop Item, Bibliographie

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis (2012)
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
Conference or Workshop Item, Bibliographie

Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. (2012)
Towards a more Secure Border Control with 3D Face Recognition.
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report, Bibliographie

Bartsch, Steffen (2012)
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
Ph.D. Thesis, Bibliographie

Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Conference or Workshop Item, Bibliographie

Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin (2012)
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
Norm, patent, standard, Bibliographie

Berchtold, Waldemar ; Schäfer, Marcel (2012)
Rebound on Symmetric Tardos Codes.
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Sasse, Angela
eds.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Thies, Andreas (2012)
RefaFlex: Safer Refactorings for Reflective Java Programs.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012)
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
Report, Bibliographie

Bulygin, Stanislav ; Buchmann, Johannes
eds.: Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (2011)
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
Sanya, China
Conference or Workshop Item, Bibliographie

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011)
Random Oracles in a Quantum World.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
ed.: Yang, Bo-Yin (2011)
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
doi: 10.1007/978-3-642-25405-5_8
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Baier, Harald (2011)
Performance Issues about Context-Triggered Piecewise Hashing.
Dublin
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
eds.: Sadeghi, Ahmad-Reza ; Zhang, Xinwen (2011)
Scalable Trust Establishment with Software Reputation.
Chicago, Illinois, USA
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
Practical and Lightweight Domain Isolation on Android.
Conference or Workshop Item, Bibliographie

Bodden, Eric (2011)
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
eds.: Schartner, Peter ; Taeger, Jürgen (2011)
Mobile Authentisierung und Signatur.
Oldenburg
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011)
Der elektronische Safe als vertrauenswürdiger Cloud Service.
Report, Bibliographie

Bartsch, Steffen (2011)
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
Milan, Italy
doi: 10.1109/ICNSS.2011.6060003
Conference or Workshop Item, Bibliographie

Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011)
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2011)
Practitioners Perspectives on Security in Agile Development.
Vienna, Austria
doi: 10.1109/ARES.2011.82
Conference or Workshop Item, Bibliographie

Bodden, Eric (2011)
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
WODA '11: International Workshop on Dynamic Analysis.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
eds.: Nitaj, Abderrahmane ; Pointcheval, David (2011)
On the security of the Winternitz one-time signature scheme.
Dakar, Senegal
doi: 10.1007/978-3-642-21969-6_23
Conference or Workshop Item, Bibliographie

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
eds.: Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (2011)
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
12th International Conference on Distributed Computing and Networking (ICDCN 2011). Bangalore, India (02.-05.01.2011)
doi: 10.1007/978-3-642-17679-1_7
Conference or Workshop Item, Bibliographie

Bodden, Eric (2011)
Defining Access Control Policies as Tracematches.
Report, Bibliographie

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
eds.: Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (2011)
Interactive Access Rule Learning for Access Control: Concepts and Design.
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Report, Bibliographie

Bodden, Eric (2011)
Closure Joinpoints: Block joinpoints without surprises.
AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development.
Conference or Workshop Item, Bibliographie

Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing (2011)
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD)
Article, Bibliographie

Bartsch, Steffen (2011)
An Authorization Enforcement Usability Case Study.
Madrid, Spain
doi: 10.1007/978-3-642-19125-1_16
Conference or Workshop Item, Bibliographie

Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin (2011)
Collusion-secure patchwork embedding for transaction watermarking.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011)
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
International Conference on Software Engineering. Waikiki, Honolulu, HI, USA (21-28 May 2011)
doi: 10.1145/1985793.1985827
Conference or Workshop Item, Bibliographie

Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
eds.: Bishop, Judith ; Vallecillo, Antonio (2011)
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
In: Objects, Models, Components, Patterns
doi: 10.1007/978-3-642-21952-8_11
Book Section, Bibliographie

Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin (2011)
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
5th workshop on Virtual Machines and Intermediate Languages. Portland, OR, USA (24 Oct 2011)
doi: 10.1145/2095050.2095101
Conference or Workshop Item, Bibliographie

Baier, Harald ; Breitinger, Frank (2011)
Security Aspects of Piecewise Hashing in Computer Forensics.
Conference or Workshop Item, Bibliographie

Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin (2011)
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
Conference or Workshop Item, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan (2011)
Physically Uncloneable Functions in the Universal Composition Framework.
Conference or Workshop Item, Bibliographie

Biedermann, Sebastian ; Katzenbeisser, Stefan (2011)
Detecting Computer Worms in the Cloud.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Hendren, Laurie (2011)
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer)
Article, Bibliographie

Berjani, Betim ; Strufe, Thorsten (2011)
A Recommendation System for Spots in Location-Based Online Social Networks.
Conference or Workshop Item, Bibliographie

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011)
Data network and method for checking nodes of a data network.
Norm, patent, standard, Bibliographie

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian (2011)
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems
Book Section, Bibliographie

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Conference or Workshop Item, Bibliographie

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010)
IDE 2.0: Collective Intelligence in Software Development.
FSE/SDP Workshop on the Future of Software Engineering.
doi: 10.1145/1882362.1882374?
Conference or Workshop Item, Bibliographie

Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian (2010)
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
Lisbon, Portugal
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Ekberg, Jan-Erik (2010)
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
Conference or Workshop Item, Bibliographie

Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique (2010)
CAPTCHAs: The Good, the Bad, and the Ugly.
Conference or Workshop Item, Bibliographie

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max (2010)
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
12th International Conference on Distributed Computing and Networking. Bangalore, India (02.-05.01.2011)
doi: 10.1007/978-3-642-17679-1_7
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2010)
A calculus for the qualitative risk assessment of policy override authorization.
Taganrog, Rostov-on-Don, Russian Federation
doi: 10.1145/1854099.1854115
Conference or Workshop Item, Bibliographie

Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato (2010)
The uncertainty principle in the presence of quantum memory.
In: Nature Physics
Article, Bibliographie

Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. (2010)
The PUF Promise.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
Stellenbosch, South Africa
Conference or Workshop Item, Bibliographie

Bedner, Mark (2010)
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR)
Article, Bibliographie

Buchmann, Johannes ; Wiesmaier, Alexander (2010)
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17)
Article, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2010)
Unlinkability of Sanitizable Signatures.
Conference or Workshop Item, Bibliographie

Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan (2010)
Attribute-based Encryption with Break-Glass.
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav ; Brickenstein, Michael (2010)
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3)
doi: 10.1007/s11786-009-0020-y
Article, Bibliographie

Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (2010)
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory
Book Section, Bibliographie

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira (2010)
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
Report, Bibliographie

Bartsch, Steffen (2010)
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
Krakow, Poland
doi: 10.1109/ARES.2010.19
Conference or Workshop Item, Bibliographie

Baier, Harald ; Busch, Christoph
ed.: Hochschule Darmstadt (3094) (2010)
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung
Book Section, Bibliographie

Backs, Christian (2010)
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas (2010)
Optimizing the evaluation of patterns in pointcuts.
Workshop on Virtual Machines and Intermediate Languages. Reno, Nevada, USA (17 Oct 2010)
Conference or Workshop Item, Bibliographie

Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010)
Quasi-dyadic CFS signatures.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes (2010)
Einführung in die Kryptographie / Introduction to Cryptography.
Book, Bibliographie

Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter (2010)
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2)
Article, Bibliographie

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010)
Towards a mobile eCard Client.
Darmstadt
Conference or Workshop Item, Bibliographie

Busch, Christoph ; Hartung, Daniel (2010)
Biometrische Nachrichten-Authentisierung.
Conference or Workshop Item, Bibliographie

Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing (2010)
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
Conference or Workshop Item, Bibliographie

Breitinger, Frank ; Nickel, Claudia (2010)
User Survey on Phone Security and Usage.
Conference or Workshop Item, Bibliographie

Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne (2010)
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Conference or Workshop Item, Bibliographie

Bedner, Mark ; Ackermann, Tobias (2010)
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
doi: 10.1007/s11623-010-0096-1
Article, Bibliographie

Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul (2009)
PUF-Based Authentication Protocols, Revisited.
Conference or Workshop Item, Bibliographie

Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan (2009)
Foundations of Non-Malleable Hash and One-Way Functions.
Conference or Workshop Item, Bibliographie

Bras-Amoros, Maria ; Bulygin, Stanislav (2009)
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3)
doi: 10.1007/s00233-009-9175-8
Article, Bibliographie

Bulygin, Stanislav ; Pellikaan, Ruud (2009)
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12)
doi: 10.1016/j.jsc.2007.12.003
Article, Bibliographie

Braun, Johannes (2009)
Nutzung des elektronischen Personalausweises im eCommerce.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian (2009)
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
Conference or Workshop Item, Bibliographie

Bedner, Mark (2009)
Rechtmäßigkeit der "Deep Packet Inspection".
Other, Bibliographie

Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
eds.: Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (2009)
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
Conference or Workshop Item, Bibliographie

Baier, Harald ; Straub, Tobias (2009)
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Conference or Workshop Item, Bibliographie

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6)
Article, Bibliographie

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2009)
PSP : private and secure payment with RFID WPES 2009.
Conference or Workshop Item, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2009)
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
Conference or Workshop Item, Bibliographie

Busch, Christoph ; Reimer, Helmut (2009)
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5)
Article, Bibliographie

Busch, Christoph (2009)
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie

Busch, Christoph (2009)
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung
Article, Bibliographie

Busch, Christoph (2009)
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Roßnagel, Alexander (2009)
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9
Article, Bibliographie

Baier, Harald ; Karatsiolis, Vangelis (2009)
Validity Models of Electronic Signatures and their Enforcement in Practice.
Conference or Workshop Item, Bibliographie

Baier, Harald ; Straub, Tobias (2009)
A Note on the Protection Level of Biometric Data in Electronic Passports.
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav (2009)
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Book, Bibliographie

Bender, Jens ; Fischlin, Marc ; Kügler, Dennis (2009)
Security Analysis of the PACE Key-Agreement Protocol.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Karatsiolis, Vangelis (2009)
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5)
doi: 10.4236/ijcns.2009.25042
Article, Bibliographie

Bulygin, Stanislav (2009)
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern
Ph.D. Thesis, Bibliographie

Biere, Thomas ; Schindler, Werner
eds.: Horster, P. ; Schartner, P. (2009)
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
Klagenfurt
Conference or Workshop Item, Bibliographie

Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi (2009)
Demonstration of first response communication sandbox.
6th IEEE Conference on Consumer Communications and Networking Conference. Las Vegas, USA (11.-13.01.2009)
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009)
Supporting Agile Development of Authorization Rules for SME Applications.
Orlando, FL, USA
doi: 10.1007/978-3-642-03354-4_35
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Chen, Feng ; Rosu, Grigore (2009)
Dependent advice: A general approach to optimizing history-based aspects.
Report, Bibliographie

Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (2009)
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography
Book Section, Bibliographie

Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin (2009)
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
Conference or Workshop Item, Bibliographie

Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten (2009)
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1)
Article, Bibliographie

Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99
Article, Bibliographie

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009)
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
Article, Bibliographie

Bedner, Mark (2009)
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009
Article, Bibliographie

Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut (2009)
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
Conference or Workshop Item, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian (2009)
Security of Sanitizable Signatures Revisited.
Conference or Workshop Item, Bibliographie

Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph (2009)
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie

Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max (2008)
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
Report, Bibliographie

Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely (2008)
Incremental Pattern Matching in the VIATRA Model Transformation System.
Conference or Workshop Item, Bibliographie

Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max (2008)
First Response Communication Sandbox.
11th communications and networking simulation symposium (CNS '08). Ottawa, Canada (14.-17.04.2008)
doi: 10.1145/1400713.1400733
Conference or Workshop Item, Bibliographie

Brickenstein, Michael ; Bulygin, Stanislav
eds.: Faugere, J.-C. ; Wang, D. (2008)
Attacking AES via Solving Systems in the Key Variables Only.
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Bormann, Carsten
ed.: Horster, Patrick (2008)
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair (2008)
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008
Article, Bibliographie

Bodden, Eric ; Havelund, Klaus (2008)
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008)
Article, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Merkle Tree Traversal Revisited.
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav ; Pellikaan, Ruud (2007)
Decoding error-correcting codes with Groebner bases.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Basin, David ; Waidner, Michael (2007)
Preface.
In: Journal of Computer Security, 15 (6)
Article, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007)
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12)
Article, Bibliographie

Bulygin, Stanislav (2006)
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10)
doi: 10.1109/TIT.2006.881831
Article, Bibliographie

Bulygin, Stanislav (2006)
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern
Master Thesis, Bibliographie

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
Norm, patent, standard, Bibliographie

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006)
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Non-determinism in multi-party computation.
Report, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Formal Methods and Cryptography.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Soundness limits of Dolev-Yao models.
Report, Bibliographie

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006)
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
Norm, patent, standard, Bibliographie

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005)
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
Norm, patent, standard, Bibliographie

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005)
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
Report, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
Report, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Justifying a Dolev-Yao Model under Active Attacks.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3)
Article, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4)
Article, Bibliographie

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005)
Privacy-protecting Integrity Attestation of a Computing Platform.
Norm, patent, standard, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
Low-Level Ideal Signatures and General Integrity Idealization.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
A General Composition Theorem for Secure Reactive Systems.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004)
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4)
Article, Bibliographie

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004)
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
Norm, patent, standard, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library.
Report, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library with Nested Operations.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Reactively Secure Signature Schemes.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Conference or Workshop Item, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Security in Business Process Engineering.
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav (2003)
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2)
Article, Bibliographie

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002)
Polynomial Fairness and Liveness.
Conference or Workshop Item, Bibliographie

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000)
Secure Password-based Cipher Suite for TLS.
Conference or Workshop Item, Bibliographie

Baum-Waidner, Birgit ; Waidner, Michael (2000)
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
Conference or Workshop Item, Bibliographie

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000)
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4)
Article, Bibliographie

Baum-Waidner, Birgit ; Waidner, Michael (1998)
Optimistic Asynchronous Multi-Party Contract Signing.
Report, Bibliographie

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995)
iKP -- a family of secure electronic payment protocols.
Conference or Workshop Item, Bibliographie

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994)
The ESPRIT Project CAFE - High Security Digital Payment Systems.
Conference or Workshop Item, Bibliographie

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
A remark on a signature scheme where forgery can be proved.
Conference or Workshop Item, Bibliographie

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
Unconditional Byzantine Agreement with Good Majority.
Conference or Workshop Item, Bibliographie

C

Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022)
Hypergraphon mean field games.
In: Chaos: An Interdisciplinary Journal of Nonlinear Science, 32 (11)
doi: 10.1063/5.0093758
Article, Bibliographie

Cui, K. ; Koeppl, H. (2022)
Learning Graphon Mean Field Games and Approximate Nash Equilibria.
10th International Conference on Learning Representations (ICLR 2022). virtual Conference (25.-29.04.2022)
Conference or Workshop Item, Bibliographie

Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022)
Motif-based mean-field approximation of interacting particles on clustered networks.
In: Phys. Rev. E, 105
doi: 10.1103/PhysRevE.105.L042301
Article, Bibliographie

Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2022)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
doi: 10.26083/tuprints-00022319
Article, Secondary publication, Publisher's Version

Cui, K. ; Yilmaz, M. B. ; Tahir, A. ; Klein, A. ; Koeppl, H. (2022)
Optimal Offloading Strategies for Edge-Computing via Mean-Field Games and Control.
Rio de Janeiro, Brazil
doi: 10.1109/GLOBECOM48099.2022.10001412
Conference or Workshop Item, Bibliographie

Cui, Kai ; Koeppl, Heinz (2021)
Approximately Solving Mean Field Games via Entropy-Regularized Deep Reinforcement Learning.
24th International Conference on Artificial Intelligence and Statistics. Virtual Conference (13.-15.04.2021)
Conference or Workshop Item, Bibliographie

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.-27.05.2021)
Conference or Workshop Item, Bibliographie

Cui, K. ; Tahir, A. ; Sinzger, M. ; Koeppl, H. (2021)
Discrete-Time Mean Field Control with Environment States.
60th Conference on Decision and Control (CDC2021). virtual Conference (13.-15.12.2021)
Conference or Workshop Item, Bibliographie

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
Report, Bibliographie

Classen, Jiska ; Spörk, Michael ; Boano, Carlo Alberto ; Römer, Kay ; Hollick, Matthias (2020)
Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
International Conference on Embedded Wireless Systems and Networks (EWSN 2020). Lyon, France (17.02.-19.02.2020)
Conference or Workshop Item, Bibliographie

Classen, Jiska ; Hollick, Matthias (2019)
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19). Miami, FL, USA (May 15.-17., 2019)
doi: 10.1145/3317549.3319727
Conference or Workshop Item, Bibliographie

Carrasco Subieta, Alvaro German (2019)
Entwicklung neuartiger wimpernbasierter piezoelektrischer Antriebe.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Classen, Jiska ; Wegemer, Daniel (2018)
Fitbit Firmware Hacking.
Other, Bibliographie

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018)
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Conference or Workshop Item, Bibliographie

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
doi: 10.1145/3143361.3143362
Conference or Workshop Item, Bibliographie

Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
Article, Bibliographie

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Conference or Workshop Item, Bibliographie

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Conference or Workshop Item, Bibliographie

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article, Bibliographie

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Conference or Workshop Item, Bibliographie

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Conference or Workshop Item, Bibliographie

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Conference or Workshop Item, Bibliographie

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report, Bibliographie

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Conference or Workshop Item, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Conference or Workshop Item, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Conference or Workshop Item, Bibliographie

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Conference or Workshop Item, Bibliographie

Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (November 3-7, 2014)
doi: 10.1145/2660267.2662387
Conference or Workshop Item, Bibliographie

Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Conference or Workshop Item, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
eds.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Conference or Workshop Item, Bibliographie

Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Conference or Workshop Item, Bibliographie

Carmo, Rodrigo do ; Hollick, Matthias (2014)
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014). Obergurgl, Austria (2-4 April 2014)
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014)
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Book Section, Bibliographie

Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014)
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP)
Article, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias (2013)
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5)
Article, Bibliographie

Carmo, Rodrigo do ; Hollick, Matthias (2013)
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
doi: 10.1145/2463183.2463187
Article, Bibliographie

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article, Bibliographie

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2013)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3)
Article, Bibliographie

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela (2013)
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3)
Article, Bibliographie

Christin, Delphine ; Büchner, C. ; Leibecke, N. (2013)
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Hollick, Matthias
eds.: Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (2013)
European Data Protection: Coming of Age.
Book Section, Bibliographie

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013)
k-anonymous reputation.
Hangzhou, China
doi: 10.1145/2484313.2484361
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias (2013)
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. (2012)
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
Conference or Workshop Item, Bibliographie

Carmo, R. do ; Werner, M. ; Hollick, Matthias (2012)
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Büttner, C. ; Repp, Nicolas (2012)
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012)
An improved threshold ring signature scheme based on error correcting codes.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
eds.: Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (2012)
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP)
Book Section, Bibliographie

Christin, Delphine ; Bentolila, A. ; Hollick, Matthias (2012)
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
Conference or Workshop Item, Bibliographie

Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York (2012)
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
Report, Bibliographie

Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2012)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
Conference or Workshop Item, Bibliographie

Cooper, N. ; Reichel, F. ; Werner, V. ; Bettermann, L. ; Alikhani, B. ; Aslanidou, S. ; Bauer, C. ; Coquard, L. ; Fritzsche, M. ; Fritzsche, Y. ; Glorius, J. ; Goddard, P. ; Möller, T. ; Pietralla, N. ; Reese, M. ; Romig, C. ; Savran, D. ; Schnorrenberger, L. ; Siebenhühner, F. ; Simon, V. ; Sonnabend, K. ; Smith, M. ; Walz, C. ; Yates, S. ; Yevetska, O. ; Zweidinger, M. (2012)
Photoresponse of ^{76}Se below 9 MeV.
In: Physical Review C, 86 (3)
doi: 10.1103/PhysRevC.86.034313
Article, Bibliographie

Cuong, N. ; Katzenbeisser, Stefan (2012)
Robust Resampling Detection in Digital Images.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2011)
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11)
doi: 10.1016/j.jss.2011.06.073
Article, Bibliographie

Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil (2011)
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Recent Progress in Code-Based Cryptography.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011)
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
Article, Bibliographie

Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias (2011)
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
Conference or Workshop Item, Bibliographie

Coquard, L. ; Rainovski, G. ; Pietralla, N. ; Ahn, T. ; Bettermann, L. ; Carpenter, M. ; Janssens, R. ; Leske, J. ; Lister, C. ; Möller, O. ; Möller, T. ; Rother, W. ; Werner, V. ; Zhu, S. (2011)
O(6)-symmetry breaking in the γ-soft nucleus ^{126}Xe and its evolution in the light stable xenon isotopes.
In: Physical Review C, 83 (4)
doi: 10.1103/PhysRevC.83.044318
Article, Bibliographie

Canova, Gamze (2011)
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie

Cuong, N. ; Katzenbeisser, Stefan (2011)
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
Conference or Workshop Item, Bibliographie

Cuong, N. ; Katzenbeisser, Stefan (2011)
Security of Copy-Move Forgery Detection Techniques.
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Hollick, Matthias (2011)
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
Conference or Workshop Item, Bibliographie

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011)
Reducing access to sensitive information.
Norm, patent, standard, Bibliographie

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
Improved Zero-knowledge Identification with Lattices.
Malacca, Malaysia (October 13 - 15, 2010)
Conference or Workshop Item, Bibliographie

Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Conference or Workshop Item, Bibliographie

Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns.
Chicago, Illinois, USA
doi: 10.1145/1866307.1866370
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2010)
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
Conference or Workshop Item, Bibliographie

Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010)
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
A Lattice-Based Threshold Ring Signature Scheme.
Puebla, Mexico (August 8-11, 2010)
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010)
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
SAC2010
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Meziani, Mohammed (2010)
Post-Quantum Cryptography: Code-based Signatures.
Conference or Workshop Item, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie

Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias (2010)
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2
doi: 10.3390/fi2020096
Article, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010)
Dual Construction of Stern-based Signature Schemes.
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Strenzke, Falko (2010)
Side channels attacks in code-based cryptography.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2010)
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
Conference or Workshop Item, Bibliographie

Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009)
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Conference or Workshop Item, Bibliographie

Charnes, Christopher
eds.: Atallah, Mikhail ; Blanton, Marina (2009)
Algorithms and Theory of Computation Handbook.
Book Section, Bibliographie

Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Leveraging social links for trust and privacy in networks.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Privacy preserving social networking through decentralization.
Conference or Workshop Item, Bibliographie

Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira (2009)
A Plugin-Architecture for Self-Adaptive WS Compositions.
Los Angeles, CA, USA
doi: 10.1109/ICWS.2009.125
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Leveraging Social Links for Trust and Privacy in Networks.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Privacy Preserving Social Networking Through Decentralization.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
Conference or Workshop Item, Bibliographie

Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12)
Article, Bibliographie

Camenisch, Jan ; Waidner, Michael (2004)
Minimizing information gathered by access decision engines in access control systems.
Norm, patent, standard, Bibliographie

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003)
Anonymous Access to a Service.
Norm, patent, standard, Bibliographie

Camenisch, Jan ; Waidner, Michael (2001)
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
Article, Bibliographie

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995)
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
Report, Bibliographie

D

Degabriele, Jean Paul ; Gilcher, Jan ; Govinden, Jérôme ; Paterson, Kenneth G. (2024)
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.-23.05.2024)
doi: 10.1109/SP54263.2024.00132
Conference or Workshop Item, Bibliographie

Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme (2023)
The Indifferentiability of the Duplex and Its Practical Applications.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.-08.12.2023)
doi: 10.1007/978-981-99-8742-9_8
Conference or Workshop Item, Bibliographie

Dongare, Sumedh ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2023)
Federated Deep Reinforcement Learning for Task Participation in Mobile Crowdsensing.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.-08.12.2023)
Conference or Workshop Item, Bibliographie

De Sombre, Wanja ; Marques, Felipe ; Pyttel, Friedrich ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2023)
A Unified Approach to Learn Transmission Strategies Using Age-Based Metrics in Point-to-Point Wireless Communication.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.-08.12.2023)
Conference or Workshop Item, Bibliographie

De Sombre, Wanja ; Ortiz Jimenez, Andrea Patricia ; Aurzada, Frank ; Klein, Anja (2023)
Risk-Sensitive Optimization and Learning for Minimizing Age of Information in Point-to-Point Wireless Communications.
2023 IEEE International Conference on Communications Workshop. Rome, Italy (28.05.-01.06.2023)
doi: 10.1109/ICCWorkshops57953.2023.10283567
Conference or Workshop Item, Bibliographie

Ding, Hui ; Egert, Sonja ; Huang, Binxiang ; Jiang, Tianshu ; Carstensen, Leif ; Šić, Edina ; Liu, Yucheng ; Yang, Tongqing ; Groszewicz, Pedro Braga ; Kleebe, Hans-Joachim ; Klein, Andreas ; Molina-Luna, Leopoldo ; Buntkowsky, Gerd (2023)
Probing cation displacements in antiferroelectrics: a joint NMR and TEM approach.
In: Chemistry of Materials, 35 (23)
doi: 10.1021/acs.chemmater.3c02045
Article, Bibliographie

Doula, Achref ; Schmidt, Lennart ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Visualization of Machine Learning Uncertainty in AR-Based See-Through Applications.
2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). virtual Conference (12.-14.12.2022)
doi: 10.1109/AIVR56993.2022.00022
Conference or Workshop Item, Bibliographie

Dongare, Sumedh ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2022)
Deep Reinforcement Learning for Task Allocation in Energy Harvesting Mobile Crowdsensing.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference. Rio de Janeiro, Brazil (04.-08.12.2022)
doi: 10.1109/GLOBECOM48099.2022.10001204
Conference or Workshop Item, Bibliographie

Doula, Achref ; Güdelhöfer, Tobias ; Matviienko, Andrii ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality.
SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference. Vancouver, Canada (08.-11.08.2022)
doi: 10.1145/3532719.3543249
Conference or Workshop Item, Bibliographie

Doula, Achref ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022)
VR-Surv: A VR-Based Privacy Preserving Surveillance System.
2022 CHI Conference on Human Factors in Computing Systems. New Orleans, USA (29.04.-05.05.2022)
doi: 10.1145/3491101.3519645
Conference or Workshop Item, Bibliographie

Doula, Achref ; Kaufmann, Philipp ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022)
Effects of the Level of Detail on the Recognition of City Landmarks in Virtual Environments.
2022 IEEE Conference on Virtual Reality and 3D User Interfaces. virtual Conference (12.-16.03.2022)
doi: 10.1109/VRW55335.2022.00281
Conference or Workshop Item, Bibliographie

Deninger, Anselm J. ; Roggenbuck, Alex ; Schindler, S. ; Preu, Sascha (2022)
2.75 THz tuning with a triple-DFB laser system at 1550 nm and InGaAs photomixers.
In: Journal of Infrared, Millimeter, and Terahertz Waves, 36 (3)
doi: 10.26083/tuprints-00020609
Article, Secondary publication, Publisher's Version

Degabriele, Jean Paul ; Govinden, Jérôme ; Günther, Felix ; Paterson, Kenneth G. (2021)
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.-19.11.2021)
doi: 10.1145/3460120.3484814
Conference or Workshop Item, Bibliographie

Ding, Hui ; Zhang, Mao-Hua ; Koruza, Jurij ; Molina-Luna, Leopoldo ; Kleebe, Hans-Joachim (2021)
Domain morphology of newly designed lead-free antiferroelectric NaNbO3-SrSnO3 ceramics.
In: Journal of the American Ceramic Society, 104 (7)
doi: 10.1111/jace.17738
Article, Bibliographie

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.-08-07.2021)
Conference or Workshop Item, Bibliographie

Duznovic, Ivana (2021)
Ion-conducting Nanopores in Polymer Membranes for (Bio)Molecular Sensory Applications.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00014070
Ph.D. Thesis, Primary publication, Publisher's Version

Daun, Kevin ; Schnaubelt, Marius ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021)
HectorGrapher: Continuous-time Lidar SLAM with Multi-resolution Signed Distance Function Registration for Challenging Terrain.
2021 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). New York, USA (25.-27.10.2021)
Conference or Workshop Item, Bibliographie

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (5.-7. April, 2020)
Conference or Workshop Item, Bibliographie

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security. virtual Conference (14.-18.09)
Conference or Workshop Item, Bibliographie

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.-12.12.2019)
Conference or Workshop Item, Bibliographie

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (November, 11th -15th)
Conference or Workshop Item, Bibliographie

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Conference or Workshop Item, Bibliographie

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019)
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Conference or Workshop Item, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Conference or Workshop Item, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (MAY 21-23, 2018)
Conference or Workshop Item, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (8.12.-12.12. 2019)
Conference or Workshop Item, Bibliographie

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
The 11th International Symposium on Foundations & Practice of Security (FPS). Montreal, Canada (13, 14 and 15 November 2018)
Conference or Workshop Item, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15-19 October 2018)
Conference or Workshop Item, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15-19 October 2018)
Conference or Workshop Item, Bibliographie

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018)
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
Taipei, Taiwan
doi: 10.1109/NOMS.2018.8406315
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Article, Bibliographie

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
doi: 10.1007/978-3-319-61204-1_30
Conference or Workshop Item, Bibliographie

Dwarakanath, R. ; Koldehofe, B. ; Bharadwaj, Y. ; Nguyen, T. A. B. ; Steinmetz, R. (2017)
TrustCEP: Adopting a Trust-based Approach for Distributed Complex Event Processing.
Conference or Workshop Item, Bibliographie

Dwarakanath, Rahul ; Koldehofe, Boris ; Bharadwaj, Yashas ; Nguyen, The An Binh ; Eyers, David ; Steinmetz, Ralf (2017)
TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Conference or Workshop Item, Bibliographie

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
doi: 10.14722/ndss.2017.23097
Conference or Workshop Item, Bibliographie

Deckwerth, Frederik (2017)
Static Verification Techniques for Attributed Graph Transformations.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017)
AVR Processors as a Platform for Language-Based Security.
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
Conference or Workshop Item, Bibliographie

Drachenfels, Magdalena von ; Riebe, Thea (2017)
Normative Ordnungen des Digitalen - Konferenzbericht.
Other, Bibliographie

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Conference or Workshop Item, Bibliographie

Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016)
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76
doi: 10.1016/j.comcom.2015.11.004
Article, Bibliographie

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Book, Bibliographie

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015)
A View on Privacy & Trust in IoT.
First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC). London, UK
doi: 10.1109/ICCW.2015.7247581
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report, Bibliographie

Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, CA (8-11 February 2015)
doi: 10.14722/ndss.2015.23113
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Conference or Workshop Item, Bibliographie

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Conference or Workshop Item, Bibliographie

Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max (2014)
Twitterize: Anonymous Micro-Blogging.
International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA).
doi: 10.1109/AICCSA.2014.7073285
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (November 07 - 07, 2014)
doi: 10.1145/2664168.2664181
Conference or Workshop Item, Bibliographie

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (August 20–22, 2014 •August 20–22, 2014)
Conference or Workshop Item, Bibliographie

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Article, Bibliographie

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Conference or Workshop Item, Bibliographie

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
Conference or Workshop Item, Bibliographie

Demmler, Daniel (2013)
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
eds.: Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (2013)
Distributed and Anonymous Publish-Subscribe.
7th International Conference on Network and System Security. Madrid, Spain
doi: 10.1007/978-3-642-38631-2_57
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Conference or Workshop Item, Bibliographie

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234)
Article, Bibliographie

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Article, Bibliographie

Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
eds.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article, Bibliographie

Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Conference or Workshop Item, Bibliographie

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Conference or Workshop Item, Bibliographie

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012)
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18
doi: 10.1007/s11276-012-0505-5
Article, Bibliographie

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011)
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
POSTER: Control-Flow Integrity for Smartphones.
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011)
Feasibility Analysis of Pret a Voter for German Federal Elections.
Tallinn, Estonia
doi: 10.1007/978-3-642-32747-6_10
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011)
Readiness of various eVoting systems for complex elections.
Report, Bibliographie

Demmler, Daniel (2011)
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
eds.: Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (2011)
Voting software to support election preparation, counting, and tallying.
Conference for E-Democracy and Open Government (CeDEM11). Krems, Austria (05.-06.05.2011)
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Conference or Workshop Item, Bibliographie

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
A Security Architecture for Accessing Health Records on Mobile Phones.
Rome, Italy
Conference or Workshop Item, Bibliographie

Danchev, M. ; Rainovski, G. ; Pietralla, N. ; Gargano, A. ; Covello, A. ; Baktash, C. ; Beene, J. ; Bingham, C. ; Galindo-Uribarri, A. ; Gladnishki, K. ; Gross, C. ; Ponomarev, V. ; Radford, D. ; Riedinger, L. ; Scheck, M. ; Stuchbery, A. ; Wambach, J. ; Yu, C.-H. ; Zamfir, N. (2011)
One-phonon isovector 2_{1,MS}^{+} state in the neutron-rich nucleus ^{132}Te.
In: Physical Review C, 84 (6)
doi: 10.1103/PhysRevC.84.061306
Article, Bibliographie

Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011)
Vertrauensbildung bei Internetwahlen.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Book Section, Bibliographie

Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2011)
Trust-based Content Distribution for Mobile Ad Hoc Networks.
Conference or Workshop Item, Bibliographie

Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Securing the Access to Electronic Health Records on Mobile Phones.
Conference or Workshop Item, Bibliographie

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010)
Secure Computations on Real-Valued Signals.
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc (2010)
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Boca Raton, USA
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Privilege Escalation Attacks on Android.
Boca Raton, Florida, USA
Conference or Workshop Item, Bibliographie

Demirel, Denise (2010)
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns on ARM.
Report, Bibliographie

Dagdelen, Özgür ; Schneider, Michael (2010)
Parallel Enumeration of Shortest Lattice Vectors.
Conference or Workshop Item, Bibliographie

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010)
Confidential Signatures and Deterministic Signcryption.
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Report, Bibliographie

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010)
Towards Secure Bioinformatics Services.
Conference or Workshop Item, Bibliographie

Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie

Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph (2010)
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
Conference or Workshop Item, Bibliographie

Dahmen, Erik ; Krauß, Christoph
eds.: Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (2009)
Short Hash-Based Signatures for Wireless Sensor Networks.
Kanazawa, Japan
Conference or Workshop Item, Bibliographie

Deußer, Clemens ; Reubold, Jan (2009)
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Chicago, Illinois, USA
doi: 10.1145/1655108.1655117
Conference or Workshop Item, Bibliographie

Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj (2009)
Efficient Robust Storage Using Secret Tokens.
Conference or Workshop Item, Bibliographie

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Digital Signatures out of Second-Preimage Resistant Hash Functions.
Cincinnati, USA
Conference or Workshop Item, Bibliographie

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
ed.: Horster, Patrick (2008)
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
Conference or Workshop Item, Bibliographie

E

Eckrich, Christian ; Schroth, Christian A. ; Jamali, Vahid ; Zoubir, Abdelhak M. (2023)
Radar Based Humans Localization with Compressed Sensing and Sparse Reconstruction.
24th International Conference on Digital Signal Processing. Rhodes, Greece (11.-13.06.2023)
doi: 10.1109/DSP58604.2023.10167990
Conference or Workshop Item, Bibliographie

Eskandani, Nafise ; Salvaneschi, Guido (2023)
The Uphill Journey of FaaS in the Open-Source Community.
In: Journal of Systems and Software, 198
doi: 10.1016/j.jss.2022.111589
Article, Bibliographie

Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2)
doi: 10.1515/icom-2021-0021
Article, Bibliographie

Engels, Jens Ivo (2021)
Resiliente Infrastrukturen – gibt es das überhaupt?
In: ABI Technik, 41 (1)
doi: 10.1515/abitech-2021-0010
Article, Bibliographie

Engels, Jens Ivo ; Frank, Sybille ; Gurevych, Iryna ; Heßler, Martina ; Knodt, Michèle ; Monstadt, Jochen ; Nordmann, Alfred ; Oetting, Andreas ; Rudolph-Cleff, Annette ; Rüppel, Uwe ; Schenk, Gerrit Jasper ; Steinke, Florian (2021)
Transformation, Zirkulation, System of Systems : Für ein dynamisches Verständnis netzgebundener Infrastrukturen.
doi: 10.26083/tuprints-00017923
Report, Primary publication, Publisher's Version

Eskandani, Nafise ; Salvaneschi, Guido (2021)
The Wonderless Dataset for Serverless Computing.
18th International Conference on Mining Software Repositories (MSR). virtual Conference (22.-30.05.2021)
doi: 10.1109/MSR52588.2021.00075
Conference or Workshop Item, Bibliographie

Egert, Sonja ; Zhang, Mao-Hua ; Koruza, Jurij ; Groszewicz, Pedro B. ; Buntkowsky, Gerd (2020)
23Na NMR Spectroscopic Quantification of the Antiferroelectric− Ferroelectric Phase Coexistence in Sodium Niobate.
In: Journal of Physical Chemistry B, 124 (43)
doi: 10.1021/acs.jpcc.0c07202
Article, Bibliographie

Engels, Jens Ivo (2020)
Infrastrukturen als Produkte und Produzenten von Zeit.
In: NTM-Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin, 28 (1)
doi: 10.1007/s00048-019-00234-7
Article, Bibliographie

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.-11.12.)
Conference or Workshop Item, Bibliographie

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.-09.10.)
doi: 10.1145/3320269.3384749
Conference or Workshop Item, Bibliographie

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018)
Lattice Based Modularization of Static Analyses.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236509
Conference or Workshop Item, Bibliographie

El Khoury, Mario ; Duznovic, Ivana ; Ali, Mubarak ; Ensinger, Wolfgang ; Schlaak, Helmut F. (2017)
Integration konischer Nanoporen in Lab-on-Chip-Systeme für die Histamin-Analyse.
Mikrosystemtechnikkongress 2017. München, Unterschleißheim, Deutschland (23.-25. Oktober 2017)
Conference or Workshop Item, Bibliographie

Euler, J. ; Stryk, Oskar von (2017)
Optimized Vehicle-Specific Trajectories for Cooperative Process Estimation by Sensor-Equipped UAVs.
International Conference on Robotics and Automation (ICRA). Singapore (29.05.-03.06.2017)
doi: 10.1109/ICRA.2017.7989386
Conference or Workshop Item, Bibliographie

Euler, Juliane ; Stryk, Oskar von (2017)
Decentralized Data-Driven Control of Cooperating Sensor-Carrying UAVs in a Multi-Objective Monitoring Scenario.
In: IFAC-PapersOnLine, 50 (1)
doi: 10.1016/j.ifacol.2017.08.2316
Article, Bibliographie

El Khoury, Mario ; Quednau, Sebastian ; Duznovic, Ivana ; Ensinger, Wolfgang ; Schlaak, Helmut F. (2016)
Integration of Nanochannels for Lab-on-Chip-Systems.
GMM-Fachbericht 86: Mikro-Nano-Integration. Duisburg (05.- 06. Oktober 2016)
Conference or Workshop Item, Bibliographie

Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Engel, Andreas (2016)
A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-Intensive Distributed Applications.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013)
Ethical Considerations When Employing Fake Identities for Research in OSN.
Article, Bibliographie

Egert, Rolf (2013)
Lattice-based Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Engels, Heinrich-Alexander (2012)
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Enders, J.
ed.: Oberstedt, S. (2012)
Reactions induced by real photons for nuclear structure and nuclear astrophysics.
Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011).
Conference or Workshop Item, Bibliographie

Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Göök, A. ; Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S.
ed.: Oberstedt, S. (2012)
Development of an active ²³⁸UF₆ gas target.
Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011).
Conference or Workshop Item, Bibliographie

Endres, J. ; Savran, D. ; Butler, P. ; Harakeh, M. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Litvinova, E. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Schlüter, F. ; Sonnabend, K. ; Stoica, V. ; Wörtche, H. ; Zilges, A. (2012)
Structure of the pygmy dipole resonance in ^{124}Sn.
In: Physical Review C, 85 (6)
doi: 10.1103/PhysRevC.85.064331
Article, Bibliographie

Eichberg, Michael ; Sewe, Andreas (2011)
Encoding the Java Virtual Machine's Instruction Set.
Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010). Paphos, Cyprus (27 Mar 2010)
doi: 10.1016/j.entcs.2011.02.004
Conference or Workshop Item, Bibliographie

Enders, J. ; Litvinova, E. ; Savran, D. ; Butler, P. A. ; Harakeh, M. N. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Sonnabend, K. ; Stoica, V. I. ; Wörtche, H. J. ; Zilges, A. (2010)
Isospin Character of the Pygmy Dipole Resonance in 124Sn.
In: Physical Review Letters, 105 (21)
doi: 10.1103/PhysRevLett.105.212503
Article, Bibliographie

Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel (2010)
History-Free Aggregate Message Authentication Codes.
Conference or Workshop Item, Bibliographie

Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
eds.: French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (2010)
A Task-based Messaging Approach To Facilitate Staff Work.
Conference or Workshop Item, Bibliographie

Ekberg, Jan-Erik ; Bugiel, Sven (2009)
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
Conference or Workshop Item, Bibliographie

Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas (2009)
Privacy-Preserving Face Recognition.
Conference or Workshop Item, Bibliographie

Eu, Joy Boy Joy (2001)
Specification of Dependable Trusted Third Parties.
Report, Bibliographie

F

Fabian, C. ; Cui, K. ; Koeppl, H. (2023)
Mean Field Games on Weighted and Directed Graphs via Colored Digraphons.
In: IEEE Control Systems Letters, 7
doi: 10.1109/LCSYS.2022.3227453
Article, Bibliographie

Friesen, John ; Pietsch, Martin (2022)
Slums in Smart Cities - Rethink the Standard.
12th IEEE Global Humanitarian Technology Conference (GHTC 2022). Santa Clara, USA (08.-11.09.2022)
doi: 10.1109/GHTC55712.2022.9911052
Conference or Workshop Item, Bibliographie

Fraune, Cornelia ; Engel, Alice ; Knodt, Michèle (2021)
Local governance of critical infrastructure resilience: A survey of leadership, planning, and positive coordination in German cities.
In: Journal of Contingencies and Crisis Management (JCCM), (Early Access)
doi: 10.1111/1468-5973.12386
Article, Bibliographie

Fabian, Stefan ; Stryk, Oskar von (2021)
Open-Source Tools for Efficient ROS and ROS2-based 2D Human-Robot Interface Development.
5th European Conference on Mobile Robots. virtual Conference (31.08.-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568801
Conference or Workshop Item, Bibliographie

Fejrskov, Martin ; Pedersen, Jens Myrup ; Böck, Leon ; Vasilomanolakis, Emmanouil (2021)
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
Tempe, AZ, USA (2021)
doi: 10.1109/CNS53000.2021.9705029
Conference or Workshop Item, Bibliographie

Fulanovic, Lovro ; Zhang, Mao-Hua ; Fu, Yuping ; Koruza, Jurij ; Rödel, Jürgen (2021)
NaNbO3-based antiferroelectric multilayer ceramic capacitors for energy storage applications.
In: Journal of the European Ceramic Society, 41 (11)
doi: 10.1016/j.jeurceramsoc.2021.04.052
Article, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.-21.10.2021)
Conference or Workshop Item, Bibliographie

Fabian, Stefan ; Kohlbrecher, Stefan ; Stryk, Oskar von (2020)
Pose Prediction for Mobile Ground Robots in Uneven Terrain Based on Difference of Heightmaps.
2020 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). virtual Conference (04.-06.11.2020)
doi: 10.1109/SSRR50563.2020.9292574
Conference or Workshop Item, Bibliographie

Fraune, Cornelia ; Knodt, Michèle (2020)
Crisis Informatics Challenges from a Political Science Perpsective.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020). virtual Conference (05.-09.10.2020)
doi: 10.1145/3406324.3424585
Conference or Workshop Item, Bibliographie

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (November, 11th, 2019)
Conference or Workshop Item, Bibliographie

Felsen, Susanne (2019)
Secure Two-Party Computation: ABY versus Intel SGX.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Franke, Fabian (2018)
Learning the Beams.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017)
Constrained PET Composition for Measuring Enforced Privacy.
doi: 10.1145/3098954.3098968
Conference or Workshop Item, Bibliographie

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017)
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1)
doi: 10.1109/COMST.2017.2748278
Article, Bibliographie

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Conference or Workshop Item, Bibliographie

Funke, Sebastian
ed.: Daubert, Jörg (2017)
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Conference or Workshop Item, Bibliographie

Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016)
Consumer oriented privacy preserving access control for electronic health records in the cloud.
Conference or Workshop Item, Bibliographie

Falzon, Kevin ; Bodden, Eric
eds.: Lopez, Javier ; Mitchell, Chris J. (2015)
Dynamically Provisioning Isolation in Hierarchical Architectures.
Information Security Conference. Trondheim
Conference or Workshop Item, Bibliographie

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015)
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS). Florence, Italy (28.-30. Sept. 2015)
doi: 10.1109/CNS.2015.7346895
Conference or Workshop Item, Bibliographie

Follner, Andreas ; Bodden, Eric (2015)
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
Report, Bibliographie

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
eds.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Conference or Workshop Item, Bibliographie

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Coercion-Resistant Internet Voting in Practice.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie

Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014)
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014)
Robust Multi-Property Combiners for Hash Functions.
doi: 10.1007/s00145-013-9148-7
Conference or Workshop Item, Bibliographie

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013)
Distributed Finite-State Runtime Monitoring with Aggregated Events.
4th International Conference on Runtime Verification (RV'13). Rennes, France (24.-27.09.)
doi: 10.1007/978-3-642-40787-1_6
Conference or Workshop Item, Bibliographie

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013)
Highly Precise Taint Analysis for Android Applications.
Report, Bibliographie

Funke, Sebastian (2013)
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Article, Bibliographie

Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj (2013)
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
Conference or Workshop Item, Bibliographie

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Onete, Cristina (2013)
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Conference or Workshop Item, Bibliographie

Falzon, Kevin ; Pace, Gordon J.
eds.: Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (2012)
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software. Essen, Germany (September 04, 2012)
Conference or Workshop Item, Bibliographie

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2012)
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
doi: 10.1109/WoWMoM.2012.6263689
Conference or Workshop Item, Bibliographie

Faber, Natalie (2012)
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Fuhrmann, Tino (2012)
Ansatz zur Erkennung von HTTPS Stripping Attacken.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Filtschew, Konstantin (2012)
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2011)
Curve-based Planar Graph Routing in Multihop Wireless Networks.
doi: 10.1109/MASS.2011.127
Conference or Workshop Item, Bibliographie

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011)
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045914
Conference or Workshop Item, Bibliographie

Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
Hong Kong
Conference or Workshop Item, Bibliographie

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011)
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy
Article, Bibliographie

Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin (2011)
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
Conference or Workshop Item, Bibliographie

Franz, M. ; Katzenbeisser, Stefan (2011)
Processing Encrypted Floating Point Signals.
Conference or Workshop Item, Bibliographie

Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas (2011)
Oblivious Outsourced Storage with Delegation.
Conference or Workshop Item, Bibliographie

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011)
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1)
Article, Bibliographie

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet.
Conference or Workshop Item, Bibliographie

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2)
Article, Bibliographie

Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano (2010)
Random Oracles With(out) Programmability.
Conference or Workshop Item, Bibliographie

Feller, Thomas ; Demirezen, Aziz (2010)
Hardware Trojans: Data Leakage Using General Purpose LEDs.
Report, Bibliographie

Fischlin, Marc ; Schröder, Dominique (2010)
On the Impossibility of Three-Move Blind Signature Schemes.
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Lehmann, Anja (2010)
Hash Function Combiners in SSL and TLS.
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Lehmann, Anja (2010)
Delayed-Key Message Authentication for Streams.
Conference or Workshop Item, Bibliographie

Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto (2010)
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
Conference or Workshop Item, Bibliographie

Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
eds.: Clavier, C. ; Gaj, K. (2009)
A New Side-Channel Attack on RSA Prime Generation.
Berlin
Conference or Workshop Item, Bibliographie

Freiling, Felix ; Heinson, Dennis (2009)
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9)
Article, Bibliographie

Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
A Pattern for Secure Graphical User Interface Systems.
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Schröder, Dominique (2009)
Security of Blind Signatures under Aborts.
Conference or Workshop Item, Bibliographie

Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia (2008)
Measuring Unlinkability Revisited.
Alexandria, Virginia, USA
doi: 10.1145/1456403.1456421
Conference or Workshop Item, Bibliographie

Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas (2008)
Designing Context-Aware HCI for Collaborative Emergency Management.
Conference or Workshop Item, Bibliographie

Field, Simon ; Waidner, Michael (2000)
Electronic Commerce.
In: Computer Networks, 32 (6)
Article, Bibliographie

G

Götte, Jan Sebastian ; Katzir, Liran ; Scheuermann, Björn (2022)
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation.
38th Annual Computer Security Applications Conference. Austin, USA (05.-09.12.2022)
doi: 10.1145/3564625.3564640
Conference or Workshop Item, Bibliographie

Gebhard, Tobias ; Steinke, Florian ; Brucherseifer, Eva (2022)
Monitoring Electricity Demand Synchronization Using Copulas.
IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022). Novi Sad, Serbia (10.-12.10.2022)
doi: 10.1109/ISGT-Europe54678.2022.9960369
Conference or Workshop Item, Bibliographie

Geihs, Kurt ; Jakob, Stefan ; Opfer, Stephan ; Alhamwy, Yasin (2022)
Commonsense Knowledge for Human-Robot Collaboration in Hybrid Search and Rescue Teams.
2nd International Workshop on Human-Robot Interaction new Trends in Service and Industry (HRI-SI2022). Napoli, Italy (29.08.2022)
Conference or Workshop Item, Bibliographie

Ghorbani, Elaheh ; Villa, Lorenzo ; Erhart, Paul ; Klein, Andreas ; Albe, Karsten (2022)
Self-consistent calculations of charge self-trapping energies: A comparative study of polaron formation and migration in PbTiO3.
In: Physical Review Materials, 6 (7)
doi: 10.1103/PhysRevMaterials.6.074410
Article, Bibliographie

Geigle, Gregor ; Pfeiffer, Jonas ; Reimers, Nils ; Vulić, Ivan ; Gurevych, Iryna (2022)
Retrieve Fast, Rerank Smart: Cooperative and Joint Approaches for Improved Cross-Modal Retrieval.
In: Transactions of the Association for Computational Linguistics, 10
doi: 10.1162/tacl_a_00473
Article, Bibliographie

Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2022)
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4)
doi: 10.26083/tuprints-00020660
Article, Secondary publication, Postprint

Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2021)
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4)
doi: 10.1145/3494986
Article, Bibliographie

Götte, Jan Sebastian ; Scheuermann, Björn (2021)
Can’t Touch This: Inertial HSMs Thwart Advanced Physical Attacks.
In: Transactions on Cryptographic Hardware and Embedded Systems, 2022 (1)
doi: 10.46586/tches.v2022.i1.69-93
Article, Bibliographie

Günther, Jonas ; Oehler, Martin ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021)
Industrial Manometer Detection and Reading for Autonomous Inspection Robots.
5th European Conference on Mobile Robots. virtual Conference (31.08.-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568833
Conference or Workshop Item, Bibliographie

Groher, Ann-Christin (2021)
Optimierung und Analyse von synthetischen Tetrazyklin-Tandem-Riboswitchen durch machine learning.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017891
Ph.D. Thesis, Primary publication, Publisher's Version

Grube, Tim ; Heinrich, Alexander ; Stroscher, Jan-Philipp ; Schomberg, Sabrina (2020)
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8)
doi: 10.1007/s11623-020-1314-0
Article, Bibliographie

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM CCS 2019. London (November 11-15, 2019)
doi: 10.1145/3319535.3363251
Conference or Workshop Item, Bibliographie

Gringoli, Francesco ; Schulz, Matthias ; Link, Jakob ; Hollick, Matthias (2019)
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH ’19). Los Cabos, Mexico (25.10.2019)
doi: 10.1145/3349623.3355477
Conference or Workshop Item, Bibliographie

Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
eds.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer. Hamburg, Germany (8. bis 11. September 2019)
doi: 10.1145/3340764.3340782
Conference or Workshop Item, Bibliographie

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
Article, Bibliographie

Günther, Daniel (2018)
Private Function Evaluation with Universal Circuits.
Bosch Renningen, Germany (6.-7.9.2018)
Conference or Workshop Item, Bibliographie

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018)
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems. Vienna, Austria (2.-5.7.2018)
Conference or Workshop Item, Bibliographie

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
eds.: Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (2018)
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018
Book Section, Bibliographie

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018)
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion
Book Section, Bibliographie

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018)
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
Conference or Workshop Item, Bibliographie

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018)
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
HotNets'18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (15. - 16.11.2018)
doi: 10.1145/3286062.3286071
Conference or Workshop Item, Bibliographie

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
doi: 10.1007/978-3-319-70697-9_16
Conference or Workshop Item, Bibliographie

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017)
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017. London, United Kingdom (04.-07.12.2017)
Conference or Workshop Item, Bibliographie

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017)
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017)
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Vancouver, Canada
doi: 10.1007/978-3-319-58460-7
Conference or Workshop Item, Bibliographie

Gedeon, Julien ; Meurisch, Christian ; Bhat, Disha ; Stein, Michael ; Wang, Lin ; Mühlhäuser, Max (2017)
Router-based Brokering for Surrogate Discovery in Edge Computing.
The 9th International Workshop on Hot Topics in Planet-­Scale Mobile Computing and ​Online Social Networking (HotPOST'17). Atlanta, GA, USA (June 5, 2017)
Conference or Workshop Item, Bibliographie

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
ed.: Tryfonas, Theo (2017)
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
5th International Conference on Human Aspects of Information Security, Privacy, and Trust. Vancouver, Canada (09.-14.07.2017)
doi: 10.1007/978-3-319-58460-7_44
Conference or Workshop Item, Bibliographie

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colonies for Efficient and Anonymous Group Communication Systems.
doi: 10.1109/NetSys.2017.7903958
Conference or Workshop Item, Bibliographie

Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Conference or Workshop Item, Bibliographie

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
Las Vegas (USA)
doi: 10.1109/CCNC.2017.7983129
Conference or Workshop Item, Bibliographie

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
doi: 10.1007/978-3-658-16835-3_8
Conference or Workshop Item, Bibliographie

Graubner, Pablo ; Sommer, Markus ; Hollick, Matthias ; Freisleben, Bernd (2017)
Dynamic Role Assignment in Software-Defined Wireless Networks.
2017 IEEE Symposium on Computers and Communications (ISCC). Heraklion, Greece (03.-06. July)
doi: 10.1109/ISCC.2017.8024619
Conference or Workshop Item, Bibliographie

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017)
Towards Accelerated Usage Control based on Access Correlations.
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
Conference or Workshop Item, Bibliographie

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017)
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item, Bibliographie

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016)
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1)
doi: 10.1016/j.jisa.2016.10.003
Article, Bibliographie

Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016)
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
doi: 10.1109/PST.2016.7906980
Conference or Workshop Item, Bibliographie

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016)
Semantic Security and Indistinguishability in the Quantum World.
doi: 10.1007/978-3-662-53015-3_3
Conference or Workshop Item, Bibliographie

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016)
Memorable And Secure: How Do You Choose Your PIN?
Frankfurt
Conference or Workshop Item, Bibliographie

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Conference or Workshop Item, Bibliographie

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016)
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
Saarbrucken
doi: 10.1109/EuroSP.2016.35
Conference or Workshop Item, Bibliographie

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max (2015)
ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems.
IEEE Conference on Communications and Network Security (CNS 2015). Florence, Italy (28.-30. Sept.)
doi: 10.1109/CNS.2015.7346912
Conference or Workshop Item, Bibliographie

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015)
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Conference or Workshop Item, Bibliographie

Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil (2015)
A Survey of Technologies for the Internet of Things.
Dubrovnik, Croatia
doi: 10.1109/IWCMC.2015.7289234
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015)
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
Dreseden
Conference or Workshop Item, Bibliographie

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Müller, Jan (2015)
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Oswald, Florian (2015)
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
Conference or Workshop Item, Bibliographie

Gerber, Paul ; Volkamer, Melanie (2015)
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2)
doi: 10.1007/s11623-015-0375-y
Article, Bibliographie

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015)
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1)
doi: 10.1145/2738210.2738214
Article, Bibliographie

Ghiglieri, Marco (2015)
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
Las Vegas, NV
Conference or Workshop Item, Bibliographie

Graubner, Pablo ; Baumgärtner, Lars ; Heckmann, Patrick ; Müller, Marcel ; Freisleben, Bernd (2015)
Dynalize: Dynamic Analysis of Mobile Apps in a Platform-as-a-Service Cloud.
Conference or Workshop Item, Bibliographie

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Conference or Workshop Item, Bibliographie

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Community-based Collaborative Intrusion Detection.
doi: 10.1007/978-3-319-28865-9_44
Conference or Workshop Item, Bibliographie

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco
eds.: Schiele, Otto ; Schön, Willi (2014)
HbbTV – aktueller Stand 2014.
Conference or Workshop Item, Bibliographie

Geihs, Matthias ; Cabarcas, Daniel
eds.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco (2014)
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
Report, Bibliographie

Ghiglieri, Marco (2014)
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy. San Jose, California (18.5.2014)
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014)
Personal DLP for Facebook.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815279
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Tews, Erik (2014)
A Privacy Protection System for HbbTV in Smart TVs.
Las Vegas, NV
doi: 10.1109/CCNC.2014.6866595
Conference or Workshop Item, Bibliographie

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014)
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
eds.: Schiele, Otto ; Schön, Willi (2013)
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
Conference or Workshop Item, Bibliographie

Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21-23 October, 2013)
Conference or Workshop Item, Bibliographie

Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013)
HbbTV - I Know What You Are Watching.
Conference or Workshop Item, Bibliographie

Grimm, Marco ; Anderl, Reiner (2013)
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
Conference or Workshop Item, Bibliographie

Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report, Bibliographie

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013)
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
Conference or Workshop Item, Bibliographie

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5)
Article, Bibliographie

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
eds.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Conference or Workshop Item, Bibliographie

Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Energy-efficient fair channel access for IEEE 802.11 WLANs.
Lucca, Italy
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012)
Technical Aspects of Online Privacy.
Report, Bibliographie

Göök, A. ; Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S. ; Richter, A.
ed.: Oberstedt, S. (2012)
Fragment properties from fission of actinide nuclei induced by 6-10 MeV bremsstrahlung.
Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011).
Conference or Workshop Item, Bibliographie

Grieser, M. ; Litvinov, Yu. A. ; Raabe, R. ; Blaum, K. ; Blumenfeld, Y. ; Butler, P. A. ; Wenander, F. ; Woods, P. J. ; Aliotta, M. ; Andreyev, A. ; Artemyev, A. ; Atanasov, D. ; Aumann, T. ; Balabanski, D. ; Barzakh, A. ; Batist, L. ; Bernardes, A.-P. ; Bernhardt, D. ; Billowes, J. ; Bishop, S. ; Borge, M. ; Borzov, I. ; Bosch, F. ; Boston, A. J. ; Brandau, C. ; Catford, W. ; Catherall, R. ; Cederkäll, J. ; Cullen, D. ; Davinson, T. ; Dillmann, I. ; Dimopoulou, C. ; Dracoulis, G. ; Düllmann, Ch. E. ; Egelhof, P. ; Estrade, A. ; Fischer, D. ; Flanagan, K. ; Fraile, L. ; Fraser, M. A. ; Freeman, S. J. ; Geissel, H. ; Gerl, J. ; Greenlees, P. ; Grisenti, R. E. ; Habs, D. ; Hahn, R. von ; Hagmann, S. ; Hausmann, M. ; He, J. J. ; Heil, M. ; Huyse, M. ; Jenkins, D. ; Jokinen, A. ; Jonson, B. ; Joss, D. T. ; Kadi, Y. ; Kalantar-Nayestanaki, N. ; Kay, B. P. ; Kiselev, O. ; Kluge, H.-J. ; Kowalska, M. ; Kozhuharov, C. ; Kreim, S. ; Kröll, T. ; Kurcewicz, J. ; Labiche, M. ; Lemmon, R. C. ; Lestinsky, M. ; Lotay, G. ; Ma, X. W. ; Marta, M. ; Meng, J. ; Mücher, D. ; Mukha, I. ; Müller, A. ; Murphy, A. St. J. ; Neyens, G. ; Nilsson, T. ; Nociforo, C. ; Nörtershäuser, W. ; Page, R. D. ; Pasini, M. ; Petridis, N. ; Pietralla, N. ; Pfützner, M. ; Podolyák, Z. ; Regan, P. ; Reed, M. W. ; Reifarth, R. ; Reiter, P. ; Repnow, R. ; Riisager, K. ; Rubio, B. ; Sanjari, M. S. ; Savin, D. W. ; Scheidenberger, C. ; Schippers, S. ; Schneider, D. ; Schuch, R. ; Schwalm, D. ; Schweikhard, L. ; Shubina, D. ; Siesling, E. ; Simon, H. ; Simpson, J. ; Smith, J. ; Sonnabend, K. ; Steck, M. ; Stora, T. ; Stöhlker, T. ; Sun, B. ; Surzhykov, A. ; Suzaki, F. ; Tarasov, O. ; Trotsenko, S. ; Tu, X. L. ; Duppen, P. van ; Volpe, C. ; Voulot, D. ; Walker, P. M. ; Wildner, E. ; Winckler, N. ; Winters, D. F. A. ; Wolf, A. ; Xu, H. S. ; Yakushev, A. ; Yamaguchi, T. ; Yuan, Y. J. ; Zhang, Y. H. ; Zuber, K. (2012)
Storage ring at HIE-ISOLDE.
In: The European Physical Journal Special Topics, 207 (1)
doi: 10.1140/epjst/e2012-01599-9
Article, Bibliographie

Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Glorius, J. ; Knörzer, M. ; Müller, S. ; Pietralla, N. ; Sauerwein, A. ; Sonnabend, K. ; Wälzlein, C. ; Wiescher, M. (2011)
p-process nucleosynthesis: Activation experiments.
In: Progress in Particle and Nuclear Physics, 66 (2)
Article, Bibliographie

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Cryptographic Treatment of Private User Profiles.
Conference or Workshop Item, Bibliographie

Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Key Management in Distributed Online Social Networks.
Conference or Workshop Item, Bibliographie

Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010)
Service Automata for Secure Distributed Systems.
Other, Bibliographie

Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. (2010)
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
Denver, Colorado, USA
Conference or Workshop Item, Bibliographie

Geibig, Joanna ; Bradler, Dirk (2010)
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10)
Article, Bibliographie

Gladnishki, K. A. ; Rainovski, G. ; Petkov, P. ; Jolie, J. ; Pietralla, N. ; Blazhev, A. ; Damyanova, A. ; Danchev, M. ; Dewald, A. ; Fransen, C. ; Hackstein, M. ; Karagyozov, D. ; Möller, O. ; Pissulla, T. ; Reese, M. ; Rother, W. ; Topchiyska, R. (2010)
Search for one-phonon mixed-symmetry states in the radioactive nucleus 140Nd.
In: Physical Review C, 82 (3)
doi: 10.1103/PhysRevC.82.037302
Article, Bibliographie

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010)
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Conference or Workshop Item, Bibliographie

Gharadaghy, Rojan (2010)
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
Conference or Workshop Item, Bibliographie

Gharadaghy, Rojan ; Volkamer, Melanie (2010)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Conference or Workshop Item, Bibliographie

Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf (2009)
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
Conference or Workshop Item, Bibliographie

Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
Conference or Workshop Item, Bibliographie

Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2009)
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
Ingelheim
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Fürnkranz, Johannes (2009)
Learning To Recognize Missing E-mail Attachments.
Report, Bibliographie

Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj (2009)
Threat Modeling and Dynamic Profiling.
Book Section, Bibliographie

Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008)
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie
eds.: Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (2008)
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
München
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie (2008)
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Conference or Workshop Item, Bibliographie

Gebhardt, Max ; Illies, Georg ; Schindler, Werner
eds.: Alkassar, A. ; Siekmann, J. (2008)
On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
Bonn
Conference or Workshop Item, Bibliographie

Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2008)
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
In: Cryptology ePrint Archive, 2008 (022)
Article, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie
eds.: Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (2008)
Trust Models for Remote Electronic Voting.
Koblenz
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie (2007)
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
Report, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie
ed.: Krimmer, Robert (2006)
Multiple Cast in Online Voting - Analyzing Chances.
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
eds.: Krimmer, Robert ; LNI, GI (2006)
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006
Book Section, Bibliographie

H

Haesler, Steffen ; Wendelborn, Marc ; Reuter, Christian (2023)
Getting the Residents' Attention: The Perception of Warning Channels in Smart Home Warning Systems.
2023 Designing Interactive Systems Conference. Pittsburgh, USA (10.-14.07.2023)
doi: 10.1145/3563657.3596076
Conference or Workshop Item, Bibliographie

Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian (2023)
Preparedness nudging for warning apps? A mixed-method study investigating popularity and effects of preparedness alerts in warning apps.
In: International Journal of Human-Computer Studies, 172
doi: 10.1016/j.ijhcs.2023.102995
Article, Bibliographie

Hekmati, Björn ; Rudolph-Cleff, Annette (2023)
Mobilität als Schlüssel zur lebenswerten Stadt.
In: Mobility Design: Die Zukunft der Mobilität gestalten Band 2: Forschung, Edition: 1. Auflage
doi: 10.1515/9783868597936
Book Section, Bibliographie

Huang, Binxiang ; Erhart, Paul ; Yang, Tongqing ; Klein, Andreas (2023)
Electrostatic boundary conditions and (electro)chemical interface stability.
In: Advanced Materials Interfaces, 10 (21)
doi: 10.1002/admi.202300332
Article, Bibliographie

Hünemohr, David ; Bauer, Maximilian ; Kleikemper, Jan ; Peukert, Markus (2022)
Analysis of Helicopter Flights in Urban Environments for UAV Traffic Management.
In: Engineering Proceedings, 28
doi: 10.3390/engproc2022028010
Article, Bibliographie

Heise, Michael ; Pietsch, Martin ; Steinke, Florian ; Bauer, Maximilian ; Yilmaz, Burak (2022)
Optimized UAV Placement for Resilient Crisis Communication and Power Grid Restoration.
IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022). Novi Sad, Serbia (10.-12.10.2022)
doi: 10.1109/ISGT-Europe54678.2022.9960494
Conference or Workshop Item, Bibliographie

Hessel, Frank ; Almon, Lars ; Hollick, Matthias (2022)
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation.
In: ACM Transactions on Sensor Networks
doi: 10.1145/3561973
Article, Bibliographie

Hornung, Gerrit ; Schomberg, Sabrina (2022)
Datensouveränität im Spannungsfeld zwischen Datenschutz und Datennutzung: das Beispiel des Data Governance Acts.
In: Computer und Recht, 38 (8)
doi: 10.9785/cr-2022-380810
Article, Bibliographie

Hornung, Gerrit ; Söllner, Matthias ; Stroscher, Jan-Philipp ; Zahn, Eva-Maria (2022)
Kollaboration im Datenschutz: Collaboration Engineering als Instrument zur partizipativen und nachhaltigen Gestaltung von Datenschutzprozessen.
In: Datenschutz und Datensicherheit, 46 (6)
doi: 10.1007/s11623-022-1625-4
Article, Bibliographie

Hornung, Gerrit ; Söllner, Matthias ; Stroscher, Jan-Philipp ; Zahn, Eva-Maria (2022)
Kollaboration im Datenschutz.
In: Datenschutz und Datensicherheit - DuD, 46 (6)
doi: 10.1007/s11623-022-1625-4
Article, Bibliographie

Höchst, Jonas ; Bellafkir, Hicham ; Lampe, Patrick ; Vogelbacher, Markus ; Mühling, Markus ; Schneider, Daniel ; Lindner, Kim ; Rösner, Sascha ; Schabo, Dana G. ; Farwig, Nina ; Freisleben, Bernd (2022)
Bird@Edge: Bird Species Recognition at the Edge.
10th Edition of the International Conference on Networked Systems (NETYS 2022). virtual Conference (17.-19.05.2022)
doi: 10.1007/978-3-031-17436-0_6
Conference or Workshop Item, Bibliographie

Himmel, Andreas ; Findeisen, Rolf ; Sundmacher, Kai (2022)
Closed-loop real-time optimization for unsteady operating production systems.
In: Journal of Process Control, 113
doi: 10.1016/j.jprocont.2022.03.002
Article, Bibliographie

Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2022)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
WI 2020: 15. Internationale Tagung Wirtschaftsinformatik - Zentrale Tracks. Potsdam, Germany (08.-11.03.2020)
doi: 10.26083/tuprints-00020743
Conference or Workshop Item, Secondary publication, Publisher's Version

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2022)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium (USENIX Security 21). Virtual event (11.-13.08.2021)
doi: 10.26083/tuprints-00020599
Conference or Workshop Item, Secondary publication, Publisher's Version

Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2022)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
The 21st Privacy Enhancing Technologies Symposium. Online (12.-16.07.2021)
doi: 10.26083/tuprints-00020598
Conference or Workshop Item, Secondary publication, Publisher's Version

Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2022)
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD Praxis der Wirtschaftsinformatik, 58 (5)
doi: 10.26083/tuprints-00022163
Article, Secondary publication, Publisher's Version

Haselhorst, Arno ; Germies, Jürgen ; Wright-Contreras, Lucía ; Camara, Luiza ; Rudolph-Cleff, Annette ; Schulze, Joachim (2022)
Spezialbericht - Smart-City-Ranking 2022 - Ressourcenschonend und CO₂-neutral - Die smarte Transformation unserer Städte im Hinblick auf die Energiekrise.
doi: 10.26083/tuprints-00022871
Report, Primary publication, Publisher's Version

Haunschild, Jasmin ; Reuter, Christian (2022)
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.-08.09.2021)
doi: 10.26083/tuprints-00022173
Conference or Workshop Item, Secondary publication, Publisher's Version

Hartwig, Katrin ; Reuter, Christian (2022)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14. Internationale Tagung Wirtschaftsinformatik (WI 2019). Siegen, Germany (23.-27.2.2019)
doi: 10.26083/tuprints-00020747
Conference or Workshop Item, Secondary publication, Publisher's Version

Haesler, Steffen ; Mogk, Ragnar ; Putz, Florentin ; Logan, Kevin ; Thiessen, Nadja ; Kleinschnitger, Katharina ; Baumgärtner, Lars ; Stroscher, Jan-Philipp ; Reuter, Christian ; Knodt, Michèle ; Hollick, Matthias (2021)
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods.
2021 Conference on Computer Supported Cooperative Work and Social Computing. virtual Conference (23.-27.10.2021)
doi: 10.1145/3462204.3481749
Conference or Workshop Item, Bibliographie

Haesler, Steffen ; Schmid, Stefka ; Vierneisel, Annemike Sophia ; Reuter, Christian (2021)
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic.
In: Proceedings of the ACM on Human Computer Interaction, 5 (CSCW2)
doi: 10.1145/3476045
Article, Bibliographie

Haunschild, Jasmin ; Reuter, Christian
ed.: ACM (2021)
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas.
24th ACM Conference on Computer-Supported Cooperative Work and Social Computing. virtual Conference (23.-27.10.2021)
doi: 10.1145/3462204.3481745
Conference or Workshop Item, Bibliographie

Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian
ed.: ACM (2021)
Citizens' Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic.
Conference on Information Technology for Social Good. Roma, Italy (09.-11.09.2021)
doi: 10.1145/3462203.3475886
Conference or Workshop Item, Bibliographie

Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2021)
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD : Praxis der Wirtschaftsinformatik, 58 (5)
doi: 10.1365/s40702-021-00770-8
Article, Bibliographie

Hornung, Gerrit ; Stroscher, Jan-Philipp (2021)
Datenschutz in der Katastrophe.
In: Zeitschrift für das gesamte Sicherheitsrecht (GSZ), 4 (4)
Article, Bibliographie

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.-13.08.2021)
Conference or Workshop Item, Bibliographie

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.–01.07.2021)
doi: 10.1145/3448300.3468251
Conference or Workshop Item, Bibliographie

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.–01.07.2021)
doi: 10.1145/3448300.3468252
Conference or Workshop Item, Bibliographie

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Conference or Workshop Item, Bibliographie

Huck, Andreas ; Monstadt, Jochen ; Driessen, Peter P. J. ; Rudolph‐Cleff, Annette (2021)
Towards Resilient Rotterdam? Key conditions for a networked approach to managing urban infrastructure risks.
In: Journal of Contingencies and Crisis Management (JCCM), 29 (1)
doi: 10.1111/1468-5973.12295
Article, Bibliographie

Hassan, Sohaib S. ; Reuter, Christian ; Bzhalava, Levan (2021)
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs.
In: International Journal of Innovation Management, 25 (1)
doi: 10.1142/S136391962150002X
Article, Bibliographie

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). San Diego, California, USA (21.-24.02. 2021)
Conference or Workshop Item, Bibliographie

Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3)
doi: 10.2478/popets-2021-0045
Article, Bibliographie

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Linz, Österreich (08.-10.07.2020)
doi: 10.26083/tuprints-00017839
Conference or Workshop Item, Secondary publication, Postprint

Hartwig, Katrin ; Reuter, Christian
eds.: Klimczak, Peter ; Zoglauer, Thomas (2021)
Fake News technisch begegnen - Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen.
In: Wahrheit und Fake im postfaktisch-digitalen Zeitalter: Distinktionen in den Geistes- und IT-Wissenschaften, Edition: 1.Auflage
doi: 10.1007/978-3-658-32957-0_7
Book Section, Bibliographie

Haselhorst, Arno ; Germies, Jürgen ; Wright-Contreras, Lucía ; Rudolph-Cleff, Annette ; Schulze, Joachim ; Dighe, Chaitali (2021)
Digitales Deutschland - Smart-City-Ranking 2021- Smart und Nachhaltig - Die digitale Transformation unserer Städte im Angesicht der Herausforderungen und Ziele einer nachhaltigen Entwicklung.
doi: 10.26083/tuprints-00019716
Report, Primary publication, Publisher's Version

Haunschild, Jasmin ; Reuter, Christian (2021)
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.-08.09.2021)
doi: 10.18420/muc2021-mci-ws08-255
Conference or Workshop Item, Bibliographie

Hornung, Gerrit ; Stroscher, Jan-Philipp (2021)
Datenschutz in der Katastrophe. Zulässigkeitstatbestände und Vorgaben für die Datenverarbeitung zur Katastrophenvorsorge und -bekämpfung - Teil 2.
In: Zeitschrift für das gesamte Sicherheitsrecht (GSZ), 4 (5)
Article, Bibliographie

Haunschild, Jasmin ; Reuter, Christian ; Kaufhold, Marc-André (2020)
Crisis informatics insights for peace operations.
Report, Bibliographie

Höchst, Jonas ; Penning, Alvar ; Lampe, Patrick ; Freisleben, Bernd (2020)
PIMOD: A Tool for Configuring Single-Board Computer Operating System Images.
10th IEEE Global Humanitarian Technology Conference (GHTC 2020). virtual Conference (29.10.-01.11.2020)
doi: 10.1109/GHTC46280.2020.9342928
Conference or Workshop Item, Bibliographie

Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira (2020)
Modular Collaborative Program Analysis in OPAL.
28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020). Virtual Conference (06.-16.11.2020)
doi: 10.1145/3368089.3409765
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Freisleben, Bernd ; Knodt, Michèle ; Hornung, Gerrit ; Mühlhäuser, Max ; Fraune, Cornelia ; Engels, Jens Ivo (2020)
Resiliente Informations- und Kommunikationstechnologie für ein krisenfestes Deutschland.
doi: 10.5281/zenodo.4066319
Report, Bibliographie

Haesler, Steffen ; Schmid, Stefka ; Reuter, Christian (2020)
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon #WirVsVirus.
MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services. Oldenburg, Germany (Oktober 2020)
doi: 10.1145/3406324.3424584
Conference or Workshop Item, Bibliographie

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020)
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. VIRTUAL (July 08.-10., 2020)
doi: 10.1145/3395351.3399343
Conference or Workshop Item, Bibliographie

Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020)
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.-10.07.2020)
doi: 10.1145/3395351.3399423
Conference or Workshop Item, Bibliographie

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.-10.07.2020)
doi: 10.1145/3395351.3401796
Conference or Workshop Item, Bibliographie

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020)
A Programming Model for Semi-implicit Parallelization of Static Analyses.
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis. virtual Conference (18.-22.07.)
doi: 10.1145/3395363.3397367
Conference or Workshop Item, Bibliographie

Himmelmann, Nicolás ; Yuan, Dingwen ; Almon, Lars ; Hollick, Matthias (2020)
Concurrent Wireless Cut-Through Forwarding: Ultra Low-Latency Multi-Hop Communication for the IoT.
IEEE DCOSS 2020: International Conference on Distributed Computing in Sensor Systems. Virtual Conference (June 15.-17.)
Conference or Workshop Item, Bibliographie

Höchst, Jonas ; Baumgärtner, Lars ; Kuntke, Franz ; Penning, Alvar ; Sterz, Artur ; Freisleben, Bernd (2020)
LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios.
17th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2020). Blacksburg, Virginia, USA (24.5.-27.5.2020)
Conference or Workshop Item, Bibliographie

Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
15. Internationale Tagung Wirtschaftsinformatik - Community Tracks. Potsdam, Germany (08.-11.03.2020)
doi: 10.30844/wi_2020_o2-haunschild
Conference or Workshop Item, Bibliographie

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020)
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020). San Diego, USA (23.-26. Febr.)
Conference or Workshop Item, Bibliographie

Hohmann, Fabian ; Ortiz, Andrea ; Klein, Anja (2019)
Optimal Resource Allocation Policy for Multi-Rate Opportunistic Forwarding.
IEEE Wireless Communications and Networking. Marrakesch, Marokko (15.-18.04.2019)
doi: 10.1109/WCNC.2019.8885462
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Hofmeister, Anne ; Engels, Jens Ivo ; Freisleben, Bernd ; Hornung, Gerrit ; Klein, Anja ; Knodt, Michèle ; Lorenz, Imke ; Mühlhäuser, Max ; Pelz, Peter F. ; Rudolph-Cleff, Annette ; Steinmetz, Ralf ; Steinke, Florian ; Stryk, Oskar von (2019)
The Emergency Responsive Digital City.
2019 World Congress on Resilience, Reliability and Asset Management (WCRRAM). Singapore (28.-31.07.2019)
Conference or Workshop Item, Bibliographie

Hartwig, Katrin ; Reuter, Christian
ed.: Reuter, Christian (2019)
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.-27.9.2019)
Conference or Workshop Item, Bibliographie

Hartwig, Katrin ; Reuter, Christian (2019)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (23.-27.02.2019)
Conference or Workshop Item, Bibliographie

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018)
A unified lattice model and framework for purity analyses.
ASE 2018. Corum, Montpellier, France (3.-7.9.2018)
doi: 10.1145/3238147.3238226
Conference or Workshop Item, Bibliographie

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018)
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks. Denver,CO,USA (26.-29.06.2018)
Conference or Workshop Item, Bibliographie

Hanreich, Matthias (2018)
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Heuss, Oliver (2018)
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Hohmann, Fabian ; Klein, Anja (2017)
Cooperative Forwarding using Distributed MISO in OFDMA Multihop Networks.
86th Vehicular Technology Conference. Toronto, Canada (24.-27.09.2017)
doi: 10.1109/VTCFall.2017.8288248
Conference or Workshop Item, Bibliographie

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Conference or Workshop Item, Bibliographie

Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich (2017)
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
Report, Bibliographie

Holz, Marco (2016)
Effective Protection of Sensitive Metadata in Online Communication Networks.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Requirements Markup Language.
Melbourne, Australia
Conference or Workshop Item, Bibliographie

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report, Bibliographie

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie

Heuser, Stephan (2016)
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Halvani, Oren ; Winter, Christian ; Pflug, Anika (2016)
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement)
doi: 10.1016/j.diin.2016.01.006
Article, Bibliographie

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015)
Capacity and Data Complexity in Multidimensional Linear Attack.
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015)
PALPAS - PAsswordLess PAssword Synchronization.
Université Paul Sabatier, Toulouse, France
Conference or Workshop Item, Bibliographie

Halvani, Oren ; Winter, Christian
eds.: Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (2015)
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
Toulouse, France
Conference or Workshop Item, Bibliographie

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
eds.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Book Section, Bibliographie

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015)
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
Vancouver, Canada
doi: 10.4108/icst.tridentcom.2015.259694
Conference or Workshop Item, Bibliographie

Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj (2014)
Event pattern discovery on IDS traces of Cloud Services.
Conference or Workshop Item, Bibliographie

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014)
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11)
doi: 10.1002/sec.748
Article, Bibliographie

Halvani, Oren ; Steinebach, Martin (2014)
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014)
Article, Bibliographie

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Conference or Workshop Item, Bibliographie

Hiemenz, Benedikt (2014)
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
eds.: Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (2014)
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich
Book Section, Bibliographie

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report, Bibliographie

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Report, Bibliographie

Halvani, Oren ; Steinebach, Martin
eds.: Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (2014)
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Sheffield, UK
Conference or Workshop Item, Bibliographie

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Article, Bibliographie

Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
eds.: Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (2013)
Authorship Verification via k-Nearest Neighbor Estimation.
Conference or Workshop Item, Bibliographie

Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik (2013)
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Melbourne, Australia (16.-18.07.2013)
doi: 10.1109/TrustCom.2013.5
Conference or Workshop Item, Bibliographie

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Melbourne, Australia
doi: 10.1109/TrustCom.2013.58
Conference or Workshop Item, Bibliographie

Hamann, Tobias (2013)
The BKZ Simulation Algorithm.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf (2013)
Natural Language Watermarking for German Texts.
Montpellier, France
doi: 10.1145/2482513.2482522
Conference or Workshop Item, Bibliographie

Henecka, Wilko ; Schneider, Thomas (2013)
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Hangzhou, China (May 08 - 10, 2013)
doi: 10.1145/2484313.2484369
Conference or Workshop Item, Bibliographie

Hülsing, Andreas ; Braun, Johannes (2013)
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013)
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Conference or Workshop Item, Bibliographie

Hülsing, Andreas (2013)
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Cairo, Egypt
Conference or Workshop Item, Bibliographie

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Book Section, Bibliographie

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13). Coimbra, Portugal (March 2013)
doi: 10.1145/2480362.2480727
Conference or Workshop Item, Bibliographie

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013)
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Conference or Workshop Item, Bibliographie

Hornschuch, Marian (2012)
Multivariate-based identification and signature schemes with additional properties.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012)
Decoupling Authentication from the Usage of Services.
Report, Bibliographie

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012)
Secure Two-Party Computations in ANSI C.
doi: 10.1145/2382196.2382278
Conference or Workshop Item, Bibliographie

Heinrich, Markus (2012)
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Halvani, Oren (2012)
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
eds.: Knudsen, Lars ; Wu, Huapeng (2012)
Forward Secure Signatures on Smart Cards.
Windsor, Canada
doi: 10.1007/978-3-642-35999-6_5
Conference or Workshop Item, Bibliographie

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012)
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
11th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012). Liverpool, UK (25.-27.06.)
doi: 10.1109/TrustCom.2012.165
Conference or Workshop Item, Bibliographie

Heuser, Annelie ; Zohner, Michael (2012)
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
Conference or Workshop Item, Bibliographie

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph (2012)
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1)
doi: 10.1049/iet-bmt.2011.0013
Article, Bibliographie

Hartung, Daniel ; Pflug, Anika ; Busch, Christoph (2012)
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
Conference or Workshop Item, Bibliographie

Henriques, Joselito ; Lukas, Uwe Freiherr von ; Mesing, Benjamin (2012)
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2
Article, Bibliographie

Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012)
Fusion of Opinions under Uncertainty and Conflict — Trust Assessment for Cloud Marketplaces (Full version).
Report, Bibliographie

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
ed.: Waldmann, Ulrich (2012)
Post-Quantum Signaturverfahren Heute.
Conference or Workshop Item, Bibliographie

Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Conference or Workshop Item, Bibliographie

Halvani, Oren ; Steinebach, Martin
eds.: Schartner, Peter ; Taeger, Jürgen (2012)
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven
Book Section, Bibliographie

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012)
On the design and implementation of the Open eCard App.
Darmstadt
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012)
Verteilte Dienstnutzung mit dem neuen Personalausweis.
Conference or Workshop Item, Bibliographie

Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner (2012)
Data Exchange Processes based on Trust and Rights Management.
Karlsruhe
Conference or Workshop Item, Bibliographie

Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten (2012)
Friendship in German Online Social Networks.
Conference or Workshop Item, Bibliographie

Halvani, Oren Avni (2012)
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012)
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Salzburg, Austria
Conference or Workshop Item, Bibliographie

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011)
Towards a Trust Management System for Cloud Computing.
10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha, China (16.-18.11.2011)
doi: 10.1109/TrustCom.2011.129
Conference or Workshop Item, Bibliographie

Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2011)
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011)
Article, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011)
Mobile eID application for the German identity card.
Report, Bibliographie

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011)
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
Report, Bibliographie

Hoffmann, Gerhard (2011)
Implementation of McEliece using quasi-dyadic Goppa codes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Horsch, Moritz ; Stopczynski, Martin (2011)
The German eCard-Strategy.
Report, Bibliographie

Horsch, Moritz (2011)
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hamacher, Kay ; Katzenbeisser, Stefan (2011)
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011)
Book Section, Bibliographie

Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2011)
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Conference or Workshop Item, Bibliographie

Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco (2010)
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
Vancouver, British Columbia, Canada
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro (2010)
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2)
Article, Bibliographie

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2010)
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
Xi'an, China
doi: 10.1109/UIC-ATC.2010.48
Conference or Workshop Item, Bibliographie

Heinson, Dennis ; Schmidt, Bernd (2010)
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8)
Article, Bibliographie

Halvani, Oren ; Steinebach, Martin (2010)
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 61 (5)
Article, Bibliographie

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
Stellenbpsch, South Africa
Conference or Workshop Item, Bibliographie

Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus (2010)
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2)
doi: 10.1007/s11623-010-0039-x
Article, Bibliographie

Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
ed.: Freiling, Felix (2010)
Quantifying the Attack Surface of a Web Application.
Bonn
Conference or Workshop Item, Bibliographie

Hartmann, Frank (2010)
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph (2010)
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
Conference or Workshop Item, Bibliographie

Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009)
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
doi: 10.1109/NTMS.2009.5384830
Conference or Workshop Item, Bibliographie

Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas (2009)
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10)
doi: 10.4304/jnw.4.10.968-975
Article, Bibliographie

Horsch, Moritz (2009)
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hornung, Gerrit ; Schnabel, Christoph (2009)
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2)
Article, Bibliographie

Hornung, Gerrit ; Schnabel, Christoph (2009)
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1)
Article, Bibliographie

Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max (2009)
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1)
Article, Bibliographie

Hartung, Daniel (2009)
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009)
Software protection using an installation product having an entitlement file.
Norm, patent, standard, Bibliographie

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009)
Software Protection Using an Installaton Product Having an Entitlement File.
Norm, patent, standard, Bibliographie

Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel (2008)
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR
Article, Bibliographie

Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf (2007)
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Conference or Workshop Item, Bibliographie

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007)
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6)
Article, Bibliographie

Hutter, Dieter ; Volkamer, Melanie
eds.: Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (2006)
Information Flow Control to Secure Dynamic Web Service Composition.
York, UK
Conference or Workshop Item, Bibliographie

Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
eds.: Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (2006)
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Freiburg (Schweiz)
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf (2005)
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. (2004)
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Conference or Workshop Item, Bibliographie

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004)
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1)
Article, Bibliographie

Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf (2004)
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Krop, T. ; Schmitt, J. (2003)
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.
Report, Bibliographie

Hollick, Matthias ; Steinmetz, Ralf (2002)
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Schmitt, J. (2002)
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Report, Bibliographie

Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf (2001)
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Steinmetz, Ralf (2001)
Security Goals for Service Discovery in Ad-hoc Environments.
Conference or Workshop Item, Bibliographie

Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf (2001)
A Security Model for Multicast Group Integrity Management.
Third International Workshop on Networked Group Communication. London, UK (November 7–9, 2001)
Conference or Workshop Item, Bibliographie

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996)
Micro-payments based on iKP.
Conference or Workshop Item, Bibliographie

I

István, Zsolt ; Rosero, Paul ; Bonnet, Philippe (2022)
Always-trusted IoT - Making IoT Devices Trusted with Minimal Overhead.
5th Workshop on System Software for Trusted Execution (SysTEX'22). Lausanne, Switzerland (28.02.-04.03.2022)
Conference or Workshop Item, Bibliographie

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
eds.: Ojendal, Joakim ; Swain, Ashok (2018)
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding
Book Section, Bibliographie

Islam, Md. Monirul (2017)
Automating Trustworthiness Assessment of Mobile Applications.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Conference or Workshop Item, Bibliographie

Inel, Miray (2014)
Entwurf und Implementierung von Plug-ins für JCrypTool.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Modular Reasoning with Join Point Interfaces.
Report, Bibliographie

Isaak, J. ; Savran, D. ; Fritzsche, M. ; Galaviz, D. ; Hartmann, T. ; Kamerdzhiev, S. ; Kelley, J. ; Kwan, E. ; Pietralla, N. ; Romig, C. ; Rusev, G. ; Sonnabend, K. ; Tonchev, A. ; Tornow, W. ; Zilges, A. (2011)
Investigation of low-lying electric dipole strength in the semimagic nucleus ^{44}Ca.
In: Physical Review C, 83 (3)
doi: 10.1103/PhysRevC.83.034304
Article, Bibliographie

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie

Ivanova, Vanya (2010)
Lattice Basis Reduction in Infinity Norm.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Israr, Adeel ; Shoufan, Abdulhadi ; Huss, Sorin (2009)
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
Conference or Workshop Item, Bibliographie

J

Jamali, Vahid ; Ghanem, Walid ; Schober, Robert ; Poor, H. Vincent (2023)
Impact of Channel Models on Performance Characterization of RIS-Assisted Wireless Systems.
17th European Conference on Antennas and Propagation (EuCAP 2023). Florence, Italy (26.-31.03.2023)
doi: 10.23919/EuCAP57121.2023.10133758
Conference or Workshop Item, Bibliographie

Jiang, Lingzi ; Huang, Can ; Zhu, Yan ; Pan, Yanfei ; Fan, Jiyu ; Zhang, Kaicheng ; Ma, Chunlan ; Shi, Daning ; Zhang, Hongbin (2022)
Tuning the size of skyrmion by strain at the Co/Pt₃ interfaces.
In: iScience, 2022, 25 (4)
doi: 10.26083/tuprints-00021411
Article, Secondary publication, Publisher's Version

Jakob, Stefan (2021)
A Self-Organising Multi-Agent Knowledge Base.
Universität Kassel
Ph.D. Thesis, Bibliographie

Janke, Tim ; Ghanmi, Mohamed ; Steinke, Florian (2021)
Implicit Generative Copulas.
35th International Conference on Neural Information Processing Systems (NeurIPS 2021). virtual Conference (07.-10.12.2021)
Conference or Workshop Item, Bibliographie

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Article, Bibliographie

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020)
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020
doi: 10.1109/TC.2020.2972549
Article, Bibliographie

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.-02.07)
Conference or Workshop Item, Bibliographie

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.-02.07.)
Conference or Workshop Item, Bibliographie

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks. virtual Conference (29.06.-02.07.)
Conference or Workshop Item, Bibliographie

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security
doi: 10.1049/iet-ifs.2019.0125
Article, Bibliographie

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
Conference or Workshop Item, Bibliographie

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018)
Faster Privacy-Preserving Location Proximity Schemes.
doi: 10.1007/978-3-030-00434-7_1
Conference or Workshop Item, Biblio