Items in division
- TU Darmstadt (104544)
A
Audrito, Giorgio ; Casadei, Roberto ; Damiani, Ferruccio ; Salvaneschi, Guido ; Viroli, Mirko
eds.: Ali, Karim ; Vitek, Jan (2022)
Functional Programming for Distributed Systems with XC.
36th European Conference on Object-Oriented Programming. Berlin, Germany (06.-10.06.2022)
doi: 10.4230/LIPIcs.ECOOP.2022.20
Conference or Workshop Item
Almon, Lars ; Krause, Arno ; Fietze, Oliver ; Hollick, Matthias (2021)
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
19th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’21). virtual Conference (22.-26.11.2021)
doi: 10.1145/3479241.3486689
Conference or Workshop Item
Ansell, Alan ; Edoardo, Maria Ponti ; Pfeiffer, Jonas ; Ruder, Sebastian ; Glavaš, Goran ; Vulić, Ivan ; Korhonen, Anna (2021)
MAD-G: Multilingual Adapter Generation for Efficient Cross-Lingual Transfer.
Conference on Empirical Methods in Natural Language Processing (EMNLP 2021). Punta Cana, Dominican Republic (07.-11.11.2021)
Conference or Workshop Item
Alhamwy, Yasin (2021)
Information Management for Multi-Agent Systems.
NetSys 2021. Lübeck (13.-16.09.2021)
Conference or Workshop Item
Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021)
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21). virtual conference (Mon 11 - Fri 15 October 2021)
doi: 10.1145/3475716.3475783
Conference or Workshop Item
Alhamwy, Yasin ; Watson, Simon ; Carrasco, Joaquin ; Cooper, Glen ; Geihs, Kurt (2021)
A Feasibility Analysis of Tether
Localisation for Mobile Robots.
1st European Workshop on Maritime Systems Resilience and Security (MARESEC 2021). virtual Conference (14.06.2021)
Conference or Workshop Item
Araslanov, Nikita ; Roth, Stefan (2021)
Self-supervised Augmentation Consistency for Adapting Semantic Segmentation.
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2021). virtual Conference (19.-25.06.2021)
doi: 10.1109/CVPR46437.2021.01513
Conference or Workshop Item
Araslanov, Nikita ; Schaub-Meyer, Simone ; Roth, Stefan
eds.: Ranzato, Marc'Aurelio ; Beygelzimer, Alina ; Dauphin, Yann N. ; Liang, Percy ; Vaughan, Jennifer Wortman (2021)
Dense Unsupervised Learning for Video Segmentation.
(6.12. - 14.12.2021)
Conference or Workshop Item
Abanto-Leon, Luis F. ; Bäuml, Andreas ; Sim, Gek Hong ; Hollick, Matthias ; Asadi, Arash (2020)
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints.
In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4 (3)
doi: 10.1145/3428329
Article
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020)
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1)
doi: 10.1145/3406112
Article
Araslanov, N. ; Roth, S. (2020)
Single-stage semantic segmentation from image labels.
2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition. virtual Conference (13.-19.06.2020)
doi: 10.1109/CVPR42600.2020.00431
Conference or Workshop Item
Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Article
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020)
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20). virtual Conference (30.03.-03.04.)
doi: 10.1145/3341105.3374020
Conference or Workshop Item
Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19-22.10.2020)
Conference or Workshop Item
Alexopoulos, Nikolaos ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max
eds.: Cavallaro, Lorenzo ; Kinder, Johannes ; Wang, XiaoFeng ; Katz, Jonathan (2019)
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
ACM SIGSAC Conference on Computer and Communications Security, CCS 2019. London, UK (November 11-15, 2019)
doi: 10.1145/3319535.3363285
Conference or Workshop Item
Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019)
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (May 19 to 22, 2019)
Conference or Workshop Item
Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019)
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN). Osnabrück (14-17 Oktober 2019)
Conference or Workshop Item
Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
TU Darmstadt
Master Thesis
Alhassan, Masaud Y. (2018)
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
Master Thesis
Ay, Serafettin (2017)
Detecting WiFi Covert Channels.
Technische Universität
Master Thesis
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017)
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Lucca, Italy (08.-13.10 2017)
doi: 10.1007/978-3-319-99843-5_10
Conference or Workshop Item
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017)
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
26th USENIX Security Symposium. Vancouver, Canada (16.-18.08.2017)
Conference or Workshop Item
Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Article
Arzt, Steven (2017)
Static Data Flow Analysis for Android Applications.
Technische Universität
Ph.D. Thesis, Primary publication
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Conference or Workshop Item
Ali, Azmzt ; Othmane, Lotfi Ben (2016)
Towards effective security assurance for incremental software development - the case of zen cart application,.
Conference or Workshop Item
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Conference or Workshop Item
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Conference or Workshop Item
Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016)
Computational Security of Quantum Encryption.
In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016
Book Section
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Conference or Workshop Item
Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015)
Conference or Workshop Item
Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben (2015)
Incremental Development of RBAC-controlled E-marking System Using the B Method.
Conference or Workshop Item
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report
Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015)
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. Portland, USA (14.06.2015)
Conference or Workshop Item
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Conference or Workshop Item
Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität
Bachelor Thesis
Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität
Master Thesis
Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
doi: 10.1007/978-3-662-46800-5_17
Conference or Workshop Item
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
doi: 10.1007/978-3-662-46800-5_26
Conference or Workshop Item
Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés (2015)
Blended Identity: Pervasive IdM for Continuous Authentication.
Conference or Workshop Item
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
eds.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Book Section
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Article
Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
doi: 10.1145/2568225.2568243
Conference or Workshop Item
Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014)
Constructing Call Graphs of Scala Programs.
Proceedings of the 28th European Conference on Object-Oriented Programming.
Conference or Workshop Item
Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014)
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. Edinburgh
Conference or Workshop Item
Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014)
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. Scottsdale
Conference or Workshop Item
Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
ICSE. Hyderabad
Conference or Workshop Item
Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014)
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Conference or Workshop Item
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Book
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
Berlin (November 04 - 08, 2013)
doi: 10.1145/2508859.2516738
Conference or Workshop Item
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Conference or Workshop Item
Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Conference or Workshop Item
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Article
Arzt, Steven ; Bodden, Eric (2013)
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
Report
Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13).
doi: 10.1007/978-3-642-38980-1_27
Conference or Workshop Item
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
Report
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Article
Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013)
How useful are existing monitoring languages for securing Android apps?
6. Arbeitstagung Programmiersprachen (ATPS 2013).
Conference or Workshop Item
Ali, Karim ; Lhoták, Ondřej (2013)
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the 27th European Conference on Object-Oriented Programming.
Conference or Workshop Item
Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012)
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
15th International Conference on Information Security. Passau, Germany (19-21 Sep 2012)
Conference or Workshop Item
Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012)
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012).
Conference or Workshop Item
Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Article
Ahn, T. ; Rainovski, G. ; Pietralla, N. ; Coquard, L. ; Möller, T. ; Costin, A. ; Janssens, R. V. ; Lister, C. ; Carpenter, M. ; Zhu, S. (2012)
Identification of the 2_{1,ms}^{+} mixed-symmetry state in ^{136}Ce.
In: Physical Review C, 86 (1)
Article
Ali, Karim ; Lhoták, Ondřej (2012)
Application-Only Call Graph Construction.
Proceedings of the 26th European Conference on Object-Oriented Programming.
Conference or Workshop Item
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Conference or Workshop Item
Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef (2012)
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7)
Article
Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf (2011)
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
Helsinki, Finland
Conference or Workshop Item
Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011)
A Formal Foundation for the Security Features of Physical Functions.
Conference or Workshop Item
Armknecht, Frederik ; Strufe, Thorsten (2011)
An Efficient Distributed Privacy-preserving Recommendation System.
Conference or Workshop Item
Ahmed, Sarah (2011)
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt
Master Thesis
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010)
Impossibility Results for RFID Privacy Notions.
Conference or Workshop Item
Ackermann, Tobias ; Buxmann, Peter (2010)
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
Conference or Workshop Item
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk (2010)
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, 5 (Special Issue)
Article
Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph (2010)
Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
Workshop on Program Semantics, Specification and Verification: Theory and Applications (PSSV 2010). Kazan, Russia (June 14-15, 2010)
Conference or Workshop Item
Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Conference or Workshop Item
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
On RFID Privacy with Mutual Authentication and Tag Corruption.
Conference or Workshop Item
Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Anonymous Authentication for RFID Systems.
Conference or Workshop Item
Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
eds.: Acquisti, A. ; Sadeghi, Ahmad-Reza (2010)
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Conference or Workshop Item
Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David (2010)
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
3rd International Conference on Cryptology in Africa. Stellenbosch, South Africa (03.-06.05.2010)
doi: 10.1007/978-3-642-12678-9_21
Conference or Workshop Item
Anderl, Reiner ; Henriques, Joselito Rodrigues (2010)
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2)
Article
Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj (2010)
Data-based Agreement for Inter-Vehicle Coordination.
Conference or Workshop Item
Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
Conference or Workshop Item
Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia (2010)
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
Conference or Workshop Item
Acker, Robin ; Massoth, Michael (2010)
Secure Ubiquitous House and Facility Control Solution.
Conference or Workshop Item
Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael (2010)
Ubiquitous Home Control based on SIP and Presence Service.
Conference or Workshop Item
Anderl, Reiner ; Henriques, Joselito (2009)
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
International Congress of Mechanical Engineering. Gramado, Brazil
Conference or Workshop Item
Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009)
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
Global Information Infrastructure Symposium.
Conference or Workshop Item
Ali, Karim ; Boutaba, Raouf (2009)
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
Global Information Infrastructure Symposium.
Conference or Workshop Item
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max (2009)
Shaping the Future Internet.
3rd International CompanionAble Workshop IoPTS. Brussels, Belgium (02.12.2009)
Conference or Workshop Item
Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina (2008)
Smart Products: Integration Challenges.
Conference or Workshop Item
Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008)
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Conference or Workshop Item
Aciicmez, Onur ; Schindler, Werner
ed.: Malkin, T. (2008)
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
Berlin
Conference or Workshop Item
Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008)
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6)
Article
Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina (2008)
Smart Products: Integration Challenges.
Conference or Workshop Item
Alkassar, Ammar ; Volkamer, Melanie (2007)
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
Article
Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006)
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
Norm, patent, standard
Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005)
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8
Article
Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004)
Proceedings of the 2004 ACM Workshop on Formal Methods in Security
Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
Conference or Workshop Item
Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001)
Using a Rules Model to Improve Handling of Personally Identifiable
Information.
Norm, patent, standard
Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias (2001)
Using an Object Model to Improve Handling of Personally Identifiable
Information.
Norm, patent, standard
B
Böck, Leon ; Levin, Dave ; Padmanabhan, Ramakrishna ; Doerr, Christian ; Mühlhäuser, Max (2023)
How to Count Bots in Longitudinal Datasets of IP Addresses.
Conference or Workshop Item
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2023)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung. Wien, Austria (18.-19.2.2019)
doi: 10.26083/tuprints-00022202
Conference or Workshop Item, Secondary publication, Publisher's Version
Bugliarello, Emanuele ; Liu, Fangyu ; Pfeiffer, Jonas ; Reddy, Siva ; Elliott, Desmond ; Ponti, Edoardo M. ; Vulić, Ivan
eds.: Chaudhuri, Kamalika ; Jegelka, Stefanie ; Song, Le ; Szepesvari, Csaba ; Niu, Gang ; Sabato, Sivan ; University of Copenhagen, Mila – Quebec Artificial Intelligence Institute, University of Cambridge, TU Darmstadt, New York University, McGill University (2022)
IGLUE: A Benchmark for Transfer Learning across Modalities, Tasks, and Languages.
The 39th International Conference on Machine Learning. Baltimore, Maryland USA (17.-23.07.2022)
Conference or Workshop Item
Bock, Carolin ; Kurz, Konstantin (2022)
Flip the Tweet - The Two-Sided Coin of Entrepreneurial Empathy.
In: Academy of Management Proceedings, 2022 (1)
doi: 10.5465/AMBPP.2022.14076abstract
Article
Böck, Leon ; Fejrskov, Martin ; Demetzou, Katerina ; Karuppayah, Shankar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2022)
Processing of botnet tracking data under the GDPR.
In: Computer law & security review, 45
doi: 10.1016/j.clsr.2021.105652
Article
Beck, Tilman ; Bohlender, Bela ; Viehmann, Christina ; Hane, Vincent ; Adamson, Yanik ; Khuri, Jaber ; Brossmann, Jonas ; Pfeiffer, Jonas ; Gurevych, Iryna (2022)
AdapterHub Playground: Simple and Flexible Few-Shot Learning with Adapters.
60th Annual Meeting of the Association for Computational Linguistics. Dublin, Ireland (22.-27.05.2022)
Conference or Workshop Item
Baumgärtner, Lars ; Meuser, Tobias ; Bloessl, Bastian (2021)
coreemu-lab: An Automated Network Emulation and Evaluation Environment.
11th IEEE Global Humanitarian Technology Conference (GHTC 2021). virtual Conference (19.-23.10.2021)
doi: 10.1109/GHTC53159.2021.9612475
Conference or Workshop Item
Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2021)
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes.
17th International Conference on distributed Computing in sensor systems (DCOSS 2021). virtual Conference (14.-16.07.2021)
doi: 10.1109/DCOSS52077.2021.00014
Conference or Workshop Item
Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.-11.06.2021)
Conference or Workshop Item
Bock, Carolin ; Kurz, Konstantin ; Madina, Iliyana ; Bejan, Julia ; Bürger, Robin ; Rockel, Jens (2021)
Crowdfunding in Zeiten von COVID-19: Ein geeignetes Finanzinstrument in der Krise?
doi: 10.24406/publica-fhg-301034
Book
Börner, Johannes ; Steinke, Florian (2021)
Measuring LTI System Resilience against Adversarial Disturbances based on Efficient Generalized Eigenvalue Computations.
60th IEEE Conference on Decision and Control (CDC 2021). virtual Conference (13.-15.12.2021)
Conference or Workshop Item
Becker, Benjamin ; Oberli, Christian ; Lieser, Patrick ; Steinmetz, Ralf
eds.: Hölscher, Christoph ; Comes, Tina (2020)
A Survey about Resilience in Communication Networks.
2020 Joint International Resilience Conference. virtual Conference (23.-27.11.)
Conference or Workshop Item
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop. Orlando, USA (09.-13.11.)
Conference or Workshop Item
Baumgärtner, Lars ; Lieser, Patrick ; Zobel, Julian ; Bloessl, Bastian ; Steinmetz, Ralf ; Mezini, Mira (2020)
LoRAgent: A DTN-based Location-aware Communication System using LoRa.
10th IEEE Global Humanitarian Technology Conference. virtual Conference (29.10.-01.11.2020)
doi: 10.1109/GHTC46280.2020.9342886
Conference or Workshop Item
Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (June 1-5, 2020)
Conference or Workshop Item
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.-22.10.2020)
Conference or Workshop Item
Bloessl, Bastian ; Baumgärtner, Lars ; Hollick, Matthias (2020)
Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio.
Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization. London, United Kingdom (September 2020)
doi: 10.1145/3411276.3412184
Conference or Workshop Item
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.-28.08)
Conference or Workshop Item
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop. virtual Conference (16.08.2020)
Conference or Workshop Item
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09. – 13. March 2020)
Conference or Workshop Item
Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2020)
Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices.
International Conference on Embedded Wireless Systems and Networks (EWSN 2020). Lyon, France (17.02.-19.02.2020)
Conference or Workshop Item
Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.-11.12.)
Conference or Workshop Item
Baumgärtner, Lars ; Lieser, Patrick ; Mezini, Mira (2020)
The Buschfunk Project : Offline Communication for Everyone.
10th IEEE Global Humanitarian Technology Conference. virtual Conference (29.10.-01.11.2020)
Conference or Workshop Item
Beilschmidt, Christian ; Drönner, Johannes ; Glombiewski, Nikolaus ; Körber, Michael ; Mattig, Michael ; Morgen, Andreas ; Seeger, Bernhard (2019)
VAT to the Future: Extrapolating Visual Complex Event Processing.
7th OpenSky Workshop. Zurich, Switzerland (21.-22.11.2019)
doi: 10.29007/wz4w
Conference or Workshop Item
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop. London (15. November 2019)
Conference or Workshop Item
Baumgärtner, Lars ; Höchst, Jonas ; Lampe, Patrick ; Mogk, Ragnar ; Sterz, Artur ; Weisenburger, Pascal ; Mezini, Mira ; Freisleben, Bernd (2019)
Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City.
2019 IEEE Global Humanitarian Technology Conference (GHTC 2019). Seattle, USA (17.-20.10.)
Conference or Workshop Item
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
ESORICS 2019 - The European Symposium on Research in Computer Security. Luxembourg (23.-27.09.2019)
Conference or Workshop Item
Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (June 02 - 06, 2019)
Conference or Workshop Item
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
PQCrypto 2019. (May 8-10, 2019)
Conference or Workshop Item
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung 2019: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.-19.02.2019)
Conference or Workshop Item
Bloessl, Bastian ; Müller, Marcus ; Hollick, Matthias (2019)
Benchmarking and Profiling the GNU Radio Scheduler.
Proceedings of the GNU Radio Conference. Huntsville, Alabama (17.09. - 21.09.2019)
Conference or Workshop Item
Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018)
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018. Toronto, Canada (15.-19.10. 2018)
Conference or Workshop Item
Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
doi: 10.1145/3243734.3243786
Conference or Workshop Item
Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar (2018)
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Heraklion, Crete, Greece
doi: 10.1007/978-3-030-00470-5_24
Conference or Workshop Item
Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
doi: 10.21437/Interspeech.2018-2032
Conference or Workshop Item
Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018)
Towards Practical RAM based Secure Computation.
ESORICS 2018. Barcelona, Spain (3.9.-7.9. 2018)
Conference or Workshop Item
Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018)
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM). Honolulu, Hawaii, USA (15-19 April 2018)
Conference or Workshop Item
Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018)
Internet As a Source of Randomness.
HotNets '18: 17th ACM Workshop on Hot Topics in Networks. Redmond, USA (November 2018)
doi: 10.1145/3286062.3286072
Conference or Workshop Item
Böck, Leon (2017)
On P2P botnet monitoring in adverse conditions.
Technische Universität
Master Thesis
Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017)
Software Grand Exposure: SGX Cache Attacks Are Practical.
Conference or Workshop Item
Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Conference or Workshop Item
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017)
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
doi: 10.1145/3098954.3098990
Conference or Workshop Item
Borges, Fábio ; Lara, Pedro ; Portugal, Renato (2017)
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292
doi: 10.1016/j.amc.2016.07.036
Article
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017)
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item
Bieber, Julian (2016)
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
Bachelor Thesis
Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Conference or Workshop Item
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article
Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Conference or Workshop Item
Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität
Master Thesis
Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Conference or Workshop Item
Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Hide And Seek: Detecting Sensors in P2P Botnets.
Florence, Italy
doi: 10.1109/CNS.2015.7346908
Conference or Workshop Item
Baluda, Mauro (2015)
EvoSE: Evolutionary Symbolic Execution.
6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015). Bergamo, Italy (August 2015)
Conference or Workshop Item
Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Conference or Workshop Item
Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität
Bachelor Thesis
Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Conference or Workshop Item
Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Conference or Workshop Item
Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Conference or Workshop Item
Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article
Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Conference or Workshop Item
Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Conference or Workshop Item
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article
Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Conference or Workshop Item
Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Conference or Workshop Item
Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
eds.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Conference or Workshop Item
Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item
Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
eds.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Conference or Workshop Item
Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Conference or Workshop Item
Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
eds.: Peterson, Gilbert ; Shenoi, Sujeet (2014)
Using Approximate Matching to Reduce the Volume of Digital Data.
Vienna, Austria
Conference or Workshop Item
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article
Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
Salzburg, Austria (June 11 - 13, 2014)
doi: 10.1145/2600918.2600922
Conference or Workshop Item
Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
eds.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Conference or Workshop Item
Budurushi, Jurlind ; Volkamer, Melanie
eds.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Conference or Workshop Item
Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article
Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014)
Key2Share for Authentication Services.
Conference or Workshop Item
Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
ed.: SPIE, IS&T (2014)
Robust Hashing for 3D Models.
Conference or Workshop Item
Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Conference or Workshop Item
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article
Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Conference or Workshop Item
Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias (2014)
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
doi: 10.1145/2627393.2627405
Conference or Workshop Item
Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
eds.: Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (2014)
Towards a Process Model for Hash Functions in Digital Forensics.
Moscow, Russia
doi: 10.1007/978-3-319-14289-0_12
Conference or Workshop Item
Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2014)
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4)
Article
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014)
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327
Article
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Conference or Workshop Item
Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014)
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
Conference or Workshop Item
Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Conference or Workshop Item
Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014)
Scalable Offline Monitoring.
Proceedings of the 14th International Conference on Runtime Verification (RV). Heidelberg, Germany
Conference or Workshop Item
Buchmann, Johannes ; Neumann, Stephan (2014)
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2)
Article
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book
Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013)
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37
doi: 10.1007/s11623-013-0300-1
Article
Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013)
Reducing human factors in software security architectures.
Future Security Conference 2013.
Conference or Workshop Item
Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil (2013)
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article
Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013)
Security considerations on extending PACE to a biometric-based connection establishment.
Conference or Workshop Item
Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
eds.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Conference or Workshop Item
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section
Bartsch, Steffen ; Volkamer, Melanie (2013)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Koblenz
Conference or Workshop Item
Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013)
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
Article
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
eds.: Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (2013)
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing
doi: 10.1007/s00200-013-0199-7
Book Section
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item
Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität
Bachelor Thesis
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Conference or Workshop Item
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013)
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1)
Article
Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Conference or Workshop Item
Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Conference or Workshop Item
Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Conference or Workshop Item
Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Conference or Workshop Item
Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
ed.: Horbach, Matthias (2013)
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Koblenz
Conference or Workshop Item
Beckerle, Matthias ; Martucci, Leonardo (2013)
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
Conference or Workshop Item
Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
Conference or Workshop Item
Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
ed.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17. - 19. Juni 2013)
Conference or Workshop Item
Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Conference or Workshop Item
Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin (2013)
Leakage Detection and Tracing for Databases.
Conference or Workshop Item
Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
Conference or Workshop Item
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
ed.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Conference or Workshop Item
Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Conference or Workshop Item
Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013)
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
Article
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
ed.: Dawson, E. (2013)
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
Conference or Workshop Item
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2013)
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4)
Article
Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Conference or Workshop Item
Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas (2013)
Video Game Watermarking.
Conference or Workshop Item
Breitinger, Frank ; Petrov, Kaloyan (2013)
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9)
Article
Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
ed.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Conference or Workshop Item
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013)
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3)
doi: 10.1007/s10623-013-9840-5
Article
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article
Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. (2013)
Multi-Biometrische Gesichtserkennung.
Bonn, Germany
Conference or Workshop Item
Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item
Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013)
Reset Indifferentiability and its Consequences.
Conference or Workshop Item
Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Conference or Workshop Item
Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten (2013)
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2)
doi: 10.4230/DagRep.3.2.22
Article
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report
Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012)
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
Report
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report
Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012)
Delta-oriented Monitor Specification.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item
Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012)
Challenges in defining a programming language for provably correct dynamic analyses.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
Article
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
eds.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Conference or Workshop Item
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Conference or Workshop Item
Bartsch, Steffen ; Volkamer, Melanie (2012)
Towards the Systematic Development of Contextualized Security Interventions.
Birmingham, UK
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012)
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
Article
Breitinger, Frank ; Baier, Harald (2012)
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
Article
Baier, Harald ; Brand, Achim (2012)
On the Investigation of Application Specific Data within Digital Forensics.
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2012)
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL)
Article
Braun, Johannes ; Buchmann, Johannes
eds.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Conference or Workshop Item
Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report
Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet (2012)
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, 11 (1)
Article
Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
TU Darmstadt
Master Thesis
Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
eds.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Book Section
Bulygin, Stanislav ; Walter, Michael (2012)
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
Report
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Conference or Workshop Item
Bodden, Eric (2012)
Identifying meaningless parameterized linear-temporal-logic formulas.
Report
Bodden, Eric (2012)
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
Report
Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012)
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
Article
Bauer, C. ; Behrens, T. ; Bildstein, V. ; Blazhev, A. ; Bruyneel, B. ; Butterworth, J. ; Clément, E. ; Coquard, L. ; Egido, J. ; Ekström, A. ; Fitzpatrick, C. ; Fransen, C. ; Gernhäuser, R. ; Habs, D. ; Hess, H. ; Leske, J. ; Kröll, T. ; Krücken, R. ; Lutter, R. ; Marley, P. ; Möller, T. ; Otsuka, T. ; Patronis, N. ; Petts, A. ; Pietralla, N. ; Rodríguez, T. ; Shimizu, N. ; Stahl, C. ; Stefanescu, I. ; Stora, T. ; Thirolf, P. ; Voulot, D. ; Walle, J. van de ; Warr, N. ; Wenander, F. ; Wiens, A. (2012)
Prolate shape of ^{140}Ba from a first combined Doppler-shift and Coulomb-excitation measurement at the REX-ISOLDE facility.
In: Physical Review C, 86 (3)
Article
Bockisch, Christoph ; Sewe, Andreas (2012)
The ALIA4J Approach to Efficient Language Implementation.
Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity. Tucson, AZ, USA
Conference or Workshop Item
Bodden, Eric (2012)
MOPBox: A Library Approach to Runtime Verification.
RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30.
Conference or Workshop Item
Baier, Harald ; Dichtelmüller, Christian (2012)
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
Conference or Workshop Item
Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Conference or Workshop Item
Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis (2012)
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
Conference or Workshop Item
Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. (2012)
Towards a more Secure Border Control with 3D Face Recognition.
Conference or Workshop Item
Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report
Bartsch, Steffen (2012)
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
Ph.D. Thesis
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Conference or Workshop Item
Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin (2012)
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
Norm, patent, standard
Berchtold, Waldemar ; Schäfer, Marcel (2012)
Rebound on Symmetric Tardos Codes.
Conference or Workshop Item
Bartsch, Steffen ; Sasse, Angela
eds.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Conference or Workshop Item
Bodden, Eric ; Thies, Andreas (2012)
RefaFlex: Safer Refactorings for Reflective Java Programs.
Conference or Workshop Item
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012)
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
Report
Bulygin, Stanislav ; Buchmann, Johannes
eds.: Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (2011)
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
Sanya, China
Conference or Workshop Item
Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011)
Random Oracles in a Quantum World.
Conference or Workshop Item
Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
ed.: Yang, Bo-Yin (2011)
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
doi: 10.1007/978-3-642-25405-5_8
Conference or Workshop Item
Breitinger, Frank ; Baier, Harald (2011)
Performance Issues about Context-Triggered Piecewise Hashing.
Dublin
Conference or Workshop Item
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
Conference or Workshop Item
Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
eds.: Sadeghi, Ahmad-Reza ; Zhang, Xinwen (2011)
Scalable Trust Establishment with Software Reputation.
Chicago, Illinois, USA
Conference or Workshop Item
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
Practical and Lightweight Domain Isolation on Android.
Conference or Workshop Item
Bodden, Eric (2011)
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
eds.: Schartner, Peter ; Taeger, Jürgen (2011)
Mobile Authentisierung und Signatur.
Oldenburg
Conference or Workshop Item
Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011)
Der elektronische Safe als vertrauenswürdiger Cloud Service.
Report
Bartsch, Steffen (2011)
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
Milan, Italy
doi: 10.1109/ICNSS.2011.6060003
Conference or Workshop Item
Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011)
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
Conference or Workshop Item
Bartsch, Steffen (2011)
Practitioners Perspectives on Security in Agile Development.
Vienna, Austria
doi: 10.1109/ARES.2011.82
Conference or Workshop Item
Bodden, Eric (2011)
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
WODA '11: International Workshop on Dynamic Analysis.
Conference or Workshop Item
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
eds.: Nitaj, Abderrahmane ; Pointcheval, David (2011)
On the security of the Winternitz one-time signature scheme.
Dakar, Senegal
doi: 10.1007/978-3-642-21969-6_23
Conference or Workshop Item
Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
eds.: Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (2011)
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
12th International Conference on Distributed Computing and Networking (ICDCN 2011). Bangalore, India (02.-05.01.2011)
doi: 10.1007/978-3-642-17679-1_7
Conference or Workshop Item
Bodden, Eric (2011)
Defining Access Control Policies as Tracematches.
Report
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
eds.: Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (2011)
Interactive Access Rule Learning for Access Control: Concepts and Design.
Conference or Workshop Item
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Report
Bodden, Eric (2011)
Closure Joinpoints: Block joinpoints without surprises.
AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development.
Conference or Workshop Item
Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing (2011)
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD)
Article
Bartsch, Steffen (2011)
An Authorization Enforcement Usability Case Study.
Madrid, Spain
doi: 10.1007/978-3-642-19125-1_16
Conference or Workshop Item
Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin (2011)
Collusion-secure patchwork embedding for transaction watermarking.
Conference or Workshop Item
Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011)
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
International Conference on Software Engineering. Waikiki, Honolulu, HI, USA (21-28 May 2011)
Conference or Workshop Item
Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
eds.: Bishop, Judith ; Vallecillo, Antonio (2011)
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
In: Objects, Models, Components, Patterns
doi: 10.1007/978-3-642-21952-8_11
Book Section
Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin (2011)
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
5th workshop on Virtual Machines and Intermediate Languages. Portland, OR, USA (24 Oct 2011)
Conference or Workshop Item
Baier, Harald ; Breitinger, Frank (2011)
Security Aspects of Piecewise Hashing in Computer Forensics.
Conference or Workshop Item
Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin (2011)
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
Conference or Workshop Item
Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan (2011)
Physically Uncloneable Functions in the Universal Composition Framework.
Conference or Workshop Item
Biedermann, Sebastian ; Katzenbeisser, Stefan (2011)
Detecting Computer Worms in the Cloud.
Conference or Workshop Item
Bodden, Eric ; Hendren, Laurie (2011)
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer)
Article
Berjani, Betim ; Strufe, Thorsten (2011)
A Recommendation System for Spots in Location-Based Online Social Networks.
Conference or Workshop Item
Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011)
Data network and method for checking nodes of a data network.
Norm, patent, standard
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian (2011)
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems
Book Section
Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
Conference or Workshop Item
Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Conference or Workshop Item
Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010)
IDE 2.0: Collective Intelligence in Software Development.
FSE/SDP Workshop on the Future of Software Engineering.
doi: 10.1145/1882362.1882374?
Conference or Workshop Item
Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian (2010)
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
Lisbon, Portugal
Conference or Workshop Item
Bugiel, Sven ; Ekberg, Jan-Erik (2010)
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
Conference or Workshop Item
Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique (2010)
CAPTCHAs: The Good, the Bad, and the Ugly.
Conference or Workshop Item
Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max (2010)
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
12th International Conference on Distributed Computing and Networking. Bangalore, India (02.-05.01.2011)
doi: 10.1007/978-3-642-17679-1_7
Conference or Workshop Item
Bartsch, Steffen (2010)
A calculus for the qualitative risk assessment of policy override authorization.
Taganrog, Rostov-on-Don, Russian Federation
doi: 10.1145/1854099.1854115
Conference or Workshop Item
Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato (2010)
The uncertainty principle in the presence of quantum memory.
In: Nature Physics
Article
Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. (2010)
The PUF Promise.
Conference or Workshop Item
Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
Stellenbosch, South Africa
Conference or Workshop Item
Bedner, Mark (2010)
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR)
Article
Buchmann, Johannes ; Wiesmaier, Alexander (2010)
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17)
Article
Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2010)
Unlinkability of Sanitizable Signatures.
Conference or Workshop Item
Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan (2010)
Attribute-based Encryption with Break-Glass.
Conference or Workshop Item
Bulygin, Stanislav ; Brickenstein, Michael (2010)
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3)
doi: 10.1007/s11786-009-0020-y
Article
Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (2010)
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory
Book Section
Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira (2010)
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
Report
Bartsch, Steffen (2010)
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
Krakow, Poland
doi: 10.1109/ARES.2010.19
Conference or Workshop Item
Baier, Harald ; Busch, Christoph
ed.: Hochschule Darmstadt (3094) (2010)
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung
Book Section
Backs, Christian (2010)
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Technische Universität
Bachelor Thesis
Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas (2010)
Optimizing the evaluation of patterns in pointcuts.
Workshop on Virtual Machines and Intermediate Languages. Reno, Nevada, USA (17 Oct 2010)
Conference or Workshop Item
Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010)
Quasi-dyadic CFS signatures.
Conference or Workshop Item
Buchmann, Johannes (2010)
Einführung in die Kryptographie / Introduction to Cryptography.
Book
Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter (2010)
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2)
Article
Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010)
Towards a mobile eCard Client.
Darmstadt
Conference or Workshop Item
Busch, Christoph ; Hartung, Daniel (2010)
Biometrische Nachrichten-Authentisierung.
Conference or Workshop Item
Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing (2010)
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
Conference or Workshop Item
Breitinger, Frank ; Nickel, Claudia (2010)
User Survey on Phone Security and Usage.
Conference or Workshop Item
Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne (2010)
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Conference or Workshop Item
Bedner, Mark ; Ackermann, Tobias (2010)
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
doi: 10.1007/s11623-010-0096-1
Article
Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul (2009)
PUF-Based Authentication Protocols, Revisited.
Conference or Workshop Item
Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan (2009)
Foundations of Non-Malleable Hash and One-Way Functions.
Conference or Workshop Item
Bras-Amoros, Maria ; Bulygin, Stanislav (2009)
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3)
doi: 10.1007/s00233-009-9175-8
Article
Bulygin, Stanislav ; Pellikaan, Ruud (2009)
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12)
doi: 10.1016/j.jsc.2007.12.003
Article
Braun, Johannes (2009)
Nutzung des elektronischen Personalausweises im eCommerce.
Technische Universität
Diploma Thesis or Magisterarbeit
Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian (2009)
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
Conference or Workshop Item
Bedner, Mark (2009)
Rechtmäßigkeit der "Deep Packet Inspection".
Other
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
eds.: Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (2009)
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
Conference or Workshop Item
Baier, Harald ; Straub, Tobias (2009)
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Conference or Workshop Item
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6)
Article
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2009)
PSP : private and secure payment with RFID WPES 2009.
Conference or Workshop Item
Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2009)
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
Conference or Workshop Item
Busch, Christoph ; Reimer, Helmut (2009)
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5)
Article
Busch, Christoph (2009)
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5
Article
Busch, Christoph (2009)
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung
Article
Busch, Christoph (2009)
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
Conference or Workshop Item
Buchmann, Johannes ; Roßnagel, Alexander (2009)
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9
Article
Baier, Harald ; Karatsiolis, Vangelis (2009)
Validity Models of Electronic Signatures and their Enforcement in Practice.
Conference or Workshop Item
Baier, Harald ; Straub, Tobias (2009)
A Note on the Protection Level of Biometric Data in Electronic Passports.
Conference or Workshop Item
Bulygin, Stanislav (2009)
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Book
Bender, Jens ; Fischlin, Marc ; Kügler, Dennis (2009)
Security Analysis of the PACE Key-Agreement Protocol.
Conference or Workshop Item
Buchmann, Johannes ; Karatsiolis, Vangelis (2009)
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5)
doi: 10.4236/ijcns.2009.25042
Article
Bulygin, Stanislav (2009)
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern
Ph.D. Thesis
Biere, Thomas ; Schindler, Werner
eds.: Horster, P. ; Schartner, P. (2009)
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
Klagenfurt
Conference or Workshop Item
Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi (2009)
Demonstration of first response communication sandbox.
6th IEEE Conference on Consumer Communications and Networking Conference. Las Vegas, USA (11.-13.01.2009)
Conference or Workshop Item
Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009)
Supporting Agile Development of Authorization Rules for SME Applications.
Orlando, FL, USA
doi: 10.1007/978-3-642-03354-4_35
Conference or Workshop Item
Bodden, Eric ; Chen, Feng ; Rosu, Grigore (2009)
Dependent advice: A general approach to optimizing history-based aspects.
Report
Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (2009)
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography
Book Section
Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin (2009)
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
Conference or Workshop Item
Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten (2009)
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1)
Article
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99
Article
Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009)
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
Article
Bedner, Mark (2009)
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009
Article
Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut (2009)
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
Conference or Workshop Item
Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian (2009)
Security of Sanitizable Signatures Revisited.
Conference or Workshop Item
Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph (2009)
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5
Article
Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max (2008)
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
Report
Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely (2008)
Incremental Pattern Matching in the VIATRA Model Transformation System.
Conference or Workshop Item
Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max (2008)
First Response Communication Sandbox.
11th communications and networking simulation symposium (CNS '08). Ottawa, Canada (14.-17.04.2008)
doi: 10.1145/1400713.1400733
Conference or Workshop Item
Brickenstein, Michael ; Bulygin, Stanislav
eds.: Faugere, J.-C. ; Wang, D. (2008)
Attacking AES via Solving Systems in the Key Variables Only.
Conference or Workshop Item
Bartsch, Steffen ; Bormann, Carsten
ed.: Horster, Patrick (2008)
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
Conference or Workshop Item
Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair (2008)
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008
Article
Bodden, Eric ; Havelund, Klaus (2008)
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008)
Article
Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Merkle Tree Traversal Revisited.
Conference or Workshop Item
Bulygin, Stanislav ; Pellikaan, Ruud (2007)
Decoding error-correcting codes with Groebner bases.
Conference or Workshop Item
Backes, Michael ; Basin, David ; Waidner, Michael (2007)
Preface.
In: Journal of Computer Security, 15 (6)
Article
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007)
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12)
Article
Bulygin, Stanislav (2006)
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10)
doi: 10.1109/TIT.2006.881831
Article
Bulygin, Stanislav (2006)
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern
Master Thesis
Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
Norm, patent, standard
Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006)
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer
Ad Hoc Networks.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Non-determinism in multi-party computation.
Report
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Formal Methods and Cryptography.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Soundness limits of Dolev-Yao models.
Report
Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006)
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
Norm, patent, standard
Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005)
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
Norm, patent, standard
Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005)
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
Report
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
Report
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Justifying a Dolev-Yao Model under Active Attacks.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3)
Article
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4)
Article
Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005)
Privacy-protecting Integrity Attestation of a Computing Platform.
Norm, patent, standard
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
Low-Level Ideal Signatures and General Integrity Idealization.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
A General Composition Theorem for Secure Reactive Systems.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004)
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4)
Article
Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004)
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
Norm, patent, standard
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library.
Report
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library with Nested Operations.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Reactively Secure Signature Schemes.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Conference or Workshop Item
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Security in Business Process Engineering.
Conference or Workshop Item
Bulygin, Stanislav (2003)
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2)
Article
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002)
Polynomial Fairness and Liveness.
Conference or Workshop Item
Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000)
Secure Password-based Cipher Suite for TLS.
Conference or Workshop Item
Baum-Waidner, Birgit ; Waidner, Michael (2000)
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
Conference or Workshop Item
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000)
Design, Implementation and Deployment of the iKP Secure Electronic
Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4)
Article
Baum-Waidner, Birgit ; Waidner, Michael (1998)
Optimistic Asynchronous Multi-Party Contract Signing.
Report
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995)
iKP -- a family of secure electronic payment protocols.
Conference or Workshop Item
Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994)
The ESPRIT Project CAFE - High Security Digital Payment Systems.
Conference or Workshop Item
Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
A remark on a signature scheme where forgery can be proved.
Conference or Workshop Item
Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
Unconditional Byzantine Agreement with Good Majority.
Conference or Workshop Item
C
Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022)
Hypergraphon mean field games.
In: Chaos: An Interdisciplinary Journal of Nonlinear Science, 32 (11)
doi: 10.1063/5.0093758
Article
Cui, K. ; Koeppl, H. (2022)
Learning Graphon Mean Field Games and Approximate Nash Equilibria.
10th International Conference on Learning Representations (ICLR 2022). virtual Conference (25.-29.04.2022)
Conference or Workshop Item
Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022)
Motif-based mean-field approximation of interacting particles on clustered networks.
In: Phys. Rev. E, 105
doi: 10.1103/PhysRevE.105.L042301
Article
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2022)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
doi: 10.26083/tuprints-00022319
Article, Secondary publication, Publisher's Version
Cui, K. ; Yilmaz, M. B. ; Tahir, A. ; Klein, A. ; Koeppl, H. (2022)
Optimal Offloading Strategies for Edge-Computing via Mean-Field Games and Control.
Rio de Janeiro, Brazil
doi: 10.1109/GLOBECOM48099.2022.10001412
Conference or Workshop Item
Cui, Kai ; Koeppl, Heinz (2021)
Approximately Solving Mean Field Games via Entropy-Regularized Deep Reinforcement Learning.
24th International Conference on Artificial Intelligence and Statistics. Virtual Conference (13.-15.04.2021)
Conference or Workshop Item
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.-27.05.2021)
Conference or Workshop Item
Cui, K. ; Tahir, A. ; Sinzger, M. ; Koeppl, H. (2021)
Discrete-Time Mean Field Control with Environment States.
60th Conference on Decision and Control (CDC2021). virtual Conference (13.-15.12.2021)
Conference or Workshop Item
Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
Report
Classen, Jiska ; Spörk, Michael ; Boano, Carlo Alberto ; Römer, Kay ; Hollick, Matthias (2020)
Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
International Conference on Embedded Wireless Systems and Networks (EWSN 2020). Lyon, France (17.02.-19.02.2020)
Conference or Workshop Item
Classen, Jiska ; Hollick, Matthias (2019)
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19). Miami, FL, USA (May 15.-17., 2019)
doi: 10.1145/3317549.3319727
Conference or Workshop Item
Carrasco Subieta, Alvaro German (2019)
Entwicklung neuartiger wimpernbasierter piezoelektrischer Antriebe.
Technische Universität
Ph.D. Thesis, Primary publication
Classen, Jiska ; Wegemer, Daniel (2018)
Fitbit Firmware Hacking.
Other
Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018)
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Conference or Workshop Item
Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
doi: 10.1145/3143361.3143362
Conference or Workshop Item
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
Article
Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Conference or Workshop Item
Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Conference or Workshop Item
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article
Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Conference or Workshop Item
Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Conference or Workshop Item
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Conference or Workshop Item
Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Conference or Workshop Item
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Conference or Workshop Item
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Conference or Workshop Item
Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Conference or Workshop Item
Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität
Bachelor Thesis
Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (November 3-7, 2014)
doi: 10.1145/2660267.2662387
Conference or Workshop Item
Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Conference or Workshop Item
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
eds.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Conference or Workshop Item
Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Conference or Workshop Item
Carmo, Rodrigo do ; Hollick, Matthias (2014)
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014). Obergurgl, Austria (2-4 April 2014)
Conference or Workshop Item
Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014)
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Book Section
Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt
Master Thesis
Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität
Master Thesis
Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014)
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP)
Article
Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Conference or Workshop Item
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias (2013)
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5)
Article
Carmo, Rodrigo do ; Hollick, Matthias (2013)
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
doi: 10.1145/2463183.2463187
Article
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2013)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3)
Article
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela (2013)
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3)
Article
Christin, Delphine ; Büchner, C. ; Leibecke, N. (2013)
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
Conference or Workshop Item
Christin, Delphine ; Hollick, Matthias
eds.: Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (2013)
European Data Protection: Coming of Age.
Book Section
Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013)
k-anonymous reputation.
Hangzhou, China
doi: 10.1145/2484313.2484361
Conference or Workshop Item
Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias (2013)
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
Conference or Workshop Item
Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. (2012)
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
Conference or Workshop Item
Carmo, R. do ; Werner, M. ; Hollick, Matthias (2012)
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Conference or Workshop Item
Christin, Delphine ; Büttner, C. ; Repp, Nicolas (2012)
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
Conference or Workshop Item
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012)
An improved threshold ring signature scheme based on error correcting codes.
Conference or Workshop Item
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
eds.: Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (2012)
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP)
Book Section
Christin, Delphine ; Bentolila, A. ; Hollick, Matthias (2012)
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
Conference or Workshop Item
Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York (2012)
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
Report
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2012)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
Conference or Workshop Item
Cooper, N. ; Reichel, F. ; Werner, V. ; Bettermann, L. ; Alikhani, B. ; Aslanidou, S. ; Bauer, C. ; Coquard, L. ; Fritzsche, M. ; Fritzsche, Y. ; Glorius, J. ; Goddard, P. ; Möller, T. ; Pietralla, N. ; Reese, M. ; Romig, C. ; Savran, D. ; Schnorrenberger, L. ; Siebenhühner, F. ; Simon, V. ; Sonnabend, K. ; Smith, M. ; Walz, C. ; Yates, S. ; Yevetska, O. ; Zweidinger, M. (2012)
Photoresponse of ^{76}Se below 9 MeV.
In: Physical Review C, 86 (3)
Article
Cuong, N. ; Katzenbeisser, Stefan (2012)
Robust Resampling Detection in Digital Images.
Conference or Workshop Item
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2011)
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11)
doi: 10.1016/j.jss.2011.06.073
Article
Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil (2011)
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
Conference or Workshop Item
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Recent Progress in Code-Based Cryptography.
Brno University, Czech Republic
Conference or Workshop Item
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011)
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
Article
Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias (2011)
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
Conference or Workshop Item
Coquard, L. ; Rainovski, G. ; Pietralla, N. ; Ahn, T. ; Bettermann, L. ; Carpenter, M. ; Janssens, R. ; Leske, J. ; Lister, C. ; Möller, O. ; Möller, T. ; Rother, W. ; Werner, V. ; Zhu, S. (2011)
O(6)-symmetry breaking in the γ-soft nucleus ^{126}Xe and its evolution in the light stable xenon isotopes.
In: Physical Review C, 83 (4)
Article
Canova, Gamze (2011)
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
Technische Universität
Bachelor Thesis
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item
Cuong, N. ; Katzenbeisser, Stefan (2011)
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
Conference or Workshop Item
Cuong, N. ; Katzenbeisser, Stefan (2011)
Security of Copy-Move Forgery Detection Techniques.
Conference or Workshop Item
Christin, Delphine ; Hollick, Matthias (2011)
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
Conference or Workshop Item
Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011)
Reducing access to sensitive information.
Norm, patent, standard
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
Improved Zero-knowledge Identification with Lattices.
Malacca, Malaysia (October 13 - 15, 2010)
Conference or Workshop Item
Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Conference or Workshop Item
Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns.
Chicago, Illinois, USA
doi: 10.1145/1866307.1866370
Conference or Workshop Item
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2010)
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
Conference or Workshop Item
Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010)
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Conference or Workshop Item
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
A Lattice-Based Threshold Ring Signature Scheme.
Puebla, Mexico (August 8-11, 2010)
Conference or Workshop Item
Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010)
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
SAC2010
Conference or Workshop Item
Cayrel, Pierre-Louis ; Meziani, Mohammed (2010)
Post-Quantum Cryptography: Code-based Signatures.
Conference or Workshop Item
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Article
Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias (2010)
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2
doi: 10.3390/fi2020096
Article
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010)
Dual Construction of Stern-based Signature Schemes.
Conference or Workshop Item
Cayrel, Pierre-Louis ; Strenzke, Falko (2010)
Side channels attacks in code-based cryptography.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2010)
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
Conference or Workshop Item
Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009)
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Conference or Workshop Item
Charnes, Christopher
eds.: Atallah, Mikhail ; Blanton, Marina (2009)
Algorithms and Theory of Computation Handbook.
Book Section
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Leveraging social links for trust and privacy in networks.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Privacy preserving social networking through decentralization.
Conference or Workshop Item
Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira (2009)
A Plugin-Architecture for Self-Adaptive WS Compositions.
Los Angeles, CA, USA
doi: 10.1109/ICWS.2009.125
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Leveraging Social Links for Trust and Privacy in Networks.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Privacy Preserving Social Networking Through Decentralization.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
Conference or Workshop Item
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12)
Article
Camenisch, Jan ; Waidner, Michael (2004)
Minimizing information gathered by access decision engines in access control systems.
Norm, patent, standard
Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003)
Anonymous Access to a Service.
Norm, patent, standard
Camenisch, Jan ; Waidner, Michael (2001)
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für
den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
Article
Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995)
Secure International Payment and Information Transfer - Towards a
Multi-Currency Electronic Wallet.
Report
D
Doula, Achref ; Schmidt, Lennart ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Visualization of Machine Learning Uncertainty in AR-Based See-Through Applications.
2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). virtual Conference (12.-14.12.2022)
doi: 10.1109/AIVR56993.2022.00022
Conference or Workshop Item
Dongare, Sumedh ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2022)
Deep Reinforcement Learning for Task Allocation in Energy Harvesting Mobile Crowdsensing.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference. Rio de Janeiro, Brazil (04.-08.12.2022)
doi: 10.1109/GLOBECOM48099.2022.10001204
Conference or Workshop Item
Doula, Achref ; Güdelhöfer, Tobias ; Matviienko, Andrii ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality.
SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference. Vancouver, Canada (08.-11.08.2022)
doi: 10.1145/3532719.3543249
Conference or Workshop Item
Doula, Achref ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022)
VR-Surv: A VR-Based Privacy Preserving Surveillance System.
2022 CHI Conference on Human Factors in Computing Systems. New Orleans, USA (29.04.-05.05.2022)
doi: 10.1145/3491101.3519645
Conference or Workshop Item
Doula, Achref ; Kaufmann, Philipp ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022)
Effects of the Level of Detail on the Recognition of City Landmarks in Virtual Environments.
2022 IEEE Conference on Virtual Reality and 3D User Interfaces. virtual Conference (12.-16.03.2022)
doi: 10.1109/VRW55335.2022.00281
Conference or Workshop Item
Degabriele, Jean Paul ; Govinden, Jérôme ; Günther, Felix ; Paterson, Kenneth G. (2021)
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.-19.11.2021)
doi: 10.1145/3460120.3484814
Conference or Workshop Item
Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.-08-07.2021)
Conference or Workshop Item
Daun, Kevin ; Schnaubelt, Marius ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021)
HectorGrapher: Continuous-time Lidar SLAM with Multi-resolution Signed Distance Function Registration for Challenging Terrain.
2021 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). New York, USA (25.-27.10.2021)
Conference or Workshop Item
Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (5.-7. April, 2020)
Conference or Workshop Item
Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security. virtual Conference (14.-18.09)
Conference or Workshop Item
Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.-12.12.2019)
Conference or Workshop Item
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (November, 11th -15th)
Conference or Workshop Item
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Conference or Workshop Item
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019)
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.-16.08.2019)
Conference or Workshop Item
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Conference or Workshop Item
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (MAY 21-23, 2018)
Conference or Workshop Item
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (8.12.-12.12. 2019)
Conference or Workshop Item
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
The 11th International Symposium on Foundations & Practice of Security (FPS). Montreal, Canada (13, 14 and 15 November 2018)
Conference or Workshop Item
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15-19 October 2018)
Conference or Workshop Item
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15-19 October 2018)
Conference or Workshop Item
Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018)
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
Taipei, Taiwan
doi: 10.1109/NOMS.2018.8406315
Conference or Workshop Item
Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Article
Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Conference or Workshop Item
Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
Conference or Workshop Item
Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
doi: 10.1007/978-3-319-61204-1_30
Conference or Workshop Item
Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Conference or Workshop Item
Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
doi: 10.14722/ndss.2017.23097
Conference or Workshop Item
Deckwerth, Frederik (2017)
Static Verification Techniques for Attributed Graph Transformations.
Technische Universität
Ph.D. Thesis, Primary publication
Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017)
AVR Processors as a Platform for Language-Based Security.
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
Conference or Workshop Item
Drachenfels, Magdalena von ; Riebe, Thea (2017)
Normative Ordnungen des Digitalen - Konferenzbericht.
Other
Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Conference or Workshop Item
Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität
Bachelor Thesis
Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016)
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76
doi: 10.1016/j.comcom.2015.11.004
Article
Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Conference or Workshop Item
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Book
Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Conference or Workshop Item
Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015)
A View on Privacy & Trust in IoT.
First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC). London, UK
doi: 10.1109/ICCW.2015.7247581
Conference or Workshop Item
Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report
Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität
Diploma Thesis or Magisterarbeit
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, CA (8-11 February 2015)
doi: 10.14722/ndss.2015.23113
Conference or Workshop Item
Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Conference or Workshop Item
Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Conference or Workshop Item
Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max (2014)
Twitterize: Anonymous Micro-Blogging.
International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA).
doi: 10.1109/AICCSA.2014.7073285
Conference or Workshop Item
Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (November 07 - 07, 2014)
doi: 10.1145/2664168.2664181
Conference or Workshop Item
Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Conference or Workshop Item
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Conference or Workshop Item
Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Conference or Workshop Item
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Conference or Workshop Item
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Conference or Workshop Item
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (August 20–22, 2014 •August 20–22, 2014)
Conference or Workshop Item
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Article
Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Conference or Workshop Item
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Conference or Workshop Item
Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Conference or Workshop Item
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Conference or Workshop Item
Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Conference or Workshop Item
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
Conference or Workshop Item
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
Conference or Workshop Item
Demmler, Daniel (2013)
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt
Master Thesis
Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
eds.: Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (2013)
Distributed and Anonymous Publish-Subscribe.
7th International Conference on Network and System Security. Madrid, Spain
doi: 10.1007/978-3-642-38631-2_57
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Conference or Workshop Item
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234)
Article
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Article
Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
eds.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Conference or Workshop Item
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Conference or Workshop Item
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Conference or Workshop Item
Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article
Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Conference or Workshop Item
Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Conference or Workshop Item
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012)
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18
doi: 10.1007/s11276-012-0505-5
Article
Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011)
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
POSTER: Control-Flow Integrity for Smartphones.
Conference or Workshop Item
Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011)
Feasibility Analysis of Pret a Voter for German Federal Elections.
Tallinn, Estonia
doi: 10.1007/978-3-642-32747-6_10
Conference or Workshop Item
Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011)
Readiness of various eVoting systems for complex elections.
Report
Demmler, Daniel (2011)
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt
Bachelor Thesis
Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
eds.: Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (2011)
Voting software to support election preparation, counting, and tallying.
Conference for E-Democracy and Open Government (CeDEM11). Krems, Austria (05.-06.05.2011)
Conference or Workshop Item
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Conference or Workshop Item
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
A Security Architecture for Accessing Health Records on Mobile Phones.
Rome, Italy
Conference or Workshop Item
Danchev, M. ; Rainovski, G. ; Pietralla, N. ; Gargano, A. ; Covello, A. ; Baktash, C. ; Beene, J. ; Bingham, C. ; Galindo-Uribarri, A. ; Gladnishki, K. ; Gross, C. ; Ponomarev, V. ; Radford, D. ; Riedinger, L. ; Scheck, M. ; Stuchbery, A. ; Wambach, J. ; Yu, C.-H. ; Zamfir, N. (2011)
One-phonon isovector 2_{1,MS}^{+} state in the neutron-rich nucleus ^{132}Te.
In: Physical Review C, 84 (6)
Article
Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011)
Vertrauensbildung bei Internetwahlen.
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Book Section
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2011)
Trust-based Content Distribution for Mobile Ad Hoc Networks.
Conference or Workshop Item
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Securing the Access to Electronic Health Records on Mobile Phones.
Conference or Workshop Item
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010)
Secure Computations on Real-Valued Signals.
Conference or Workshop Item
Dagdelen, Özgür ; Fischlin, Marc (2010)
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Boca Raton, USA
Conference or Workshop Item
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Privilege Escalation Attacks on Android.
Boca Raton, Florida, USA
Conference or Workshop Item
Demirel, Denise (2010)
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Technische Universität
Bachelor Thesis
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns on ARM.
Report
Dagdelen, Özgür ; Schneider, Michael (2010)
Parallel Enumeration of Shortest Lattice Vectors.
Conference or Workshop Item
Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010)
Confidential Signatures and Deterministic Signcryption.
Conference or Workshop Item
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Report
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010)
Towards Secure Bioinformatics Services.
Conference or Workshop Item
Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section
Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph (2010)
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
Conference or Workshop Item
Dahmen, Erik ; Krauß, Christoph
eds.: Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (2009)
Short Hash-Based Signatures for Wireless Sensor Networks.
Kanazawa, Japan
Conference or Workshop Item
Deußer, Clemens ; Reubold, Jan (2009)
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt
Master Thesis
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Chicago, Illinois, USA
doi: 10.1145/1655108.1655117
Conference or Workshop Item
Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj (2009)
Efficient Robust Storage Using Secret Tokens.
Conference or Workshop Item
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Digital Signatures out of Second-Preimage Resistant Hash Functions.
Cincinnati, USA
Conference or Workshop Item
Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
ed.: Horster, Patrick (2008)
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
Conference or Workshop Item
E
Eckrich, Christian ; Schroth, Christian A. ; Jamali, Vahid ; Zoubir, Abdelhak M. (2023)
Radar Based Humans Localization with Compressed Sensing and Sparse Reconstruction.
24th International Conference on Digital Signal Processing. Rhodes, Greece (11.-13.06.2023)
doi: 10.1109/DSP58604.2023.10167990
Conference or Workshop Item
Eskandani, Nafise ; Salvaneschi, Guido (2023)
The Uphill Journey of FaaS in the Open-Source Community.
In: Journal of Systems and Software, 198
doi: 10.1016/j.jss.2022.111589
Article
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2)
doi: 10.1515/icom-2021-0021
Article
Engels, Jens Ivo (2021)
Resiliente Infrastrukturen – gibt es das überhaupt?
In: ABI Technik, 41 (1)
doi: 10.1515/abitech-2021-0010
Article
Engels, Jens Ivo ; Frank, Sybille ; Gurevych, Iryna ; Heßler, Martina ; Knodt, Michèle ; Monstadt, Jochen ; Nordmann, Alfred ; Oetting, Andreas ; Rudolph-Cleff, Annette ; Rüppel, Uwe ; Schenk, Gerrit Jasper ; Steinke, Florian (2021)
Transformation, Zirkulation, System of Systems : Für ein dynamisches Verständnis netzgebundener Infrastrukturen.
doi: 10.26083/tuprints-00017923
Report, Primary publication, Publisher's Version
Eskandani, Nafise ; Salvaneschi, Guido (2021)
The Wonderless Dataset for Serverless Computing.
18th International Conference on Mining Software Repositories (MSR). virtual Conference (22.-30.05.2021)
doi: 10.1109/MSR52588.2021.00075
Conference or Workshop Item
Engels, Jens Ivo (2020)
Infrastrukturen als Produkte und Produzenten von Zeit.
In: NTM-Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin, 28 (1)
doi: 10.1007/s00048-019-00234-7
Article
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.-11.12.)
Conference or Workshop Item
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.-09.10.)
doi: 10.1145/3320269.3384749
Conference or Workshop Item
Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018)
Lattice Based Modularization of Static Analyses.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236509
Conference or Workshop Item
Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität
Bachelor Thesis
Engel, Andreas (2016)
A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-Intensive Distributed Applications.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013)
Ethical Considerations When Employing Fake Identities for Research in OSN.
Article
Egert, Rolf (2013)
Lattice-based Signatures.
TU Darmstadt
Master Thesis
Engels, Heinrich-Alexander (2012)
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt
Master Thesis
Enders, J.
ed.: Oberstedt, S. (2012)
Reactions induced by real photons for nuclear structure and nuclear astrophysics.
Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011).
Conference or Workshop Item
Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Göök, A. ; Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S.
ed.: Oberstedt, S. (2012)
Development of an active ²³⁸UF₆ gas target.
Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011).
Conference or Workshop Item
Endres, J. ; Savran, D. ; Butler, P. ; Harakeh, M. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Litvinova, E. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Schlüter, F. ; Sonnabend, K. ; Stoica, V. ; Wörtche, H. ; Zilges, A. (2012)
Structure of the pygmy dipole resonance in ^{124}Sn.
In: Physical Review C, 85 (6)
Article
Eichberg, Michael ; Sewe, Andreas (2011)
Encoding the Java Virtual Machine's Instruction Set.
Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010). Paphos, Cyprus (27 Mar 2010)
Conference or Workshop Item
Enders, J. ; Litvinova, E. ; Savran, D. ; Butler, P. A. ; Harakeh, M. N. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Sonnabend, K. ; Stoica, V. I. ; Wörtche, H. J. ; Zilges, A. (2010)
Isospin Character of the Pygmy Dipole Resonance in 124Sn.
In: Physical Review Letters, 105 (21)
Article
Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel (2010)
History-Free Aggregate Message Authentication Codes.
Conference or Workshop Item
Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
eds.: French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (2010)
A Task-based Messaging Approach To Facilitate Staff Work.
Conference or Workshop Item
Ekberg, Jan-Erik ; Bugiel, Sven (2009)
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
Conference or Workshop Item
Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas (2009)
Privacy-Preserving Face Recognition.
Conference or Workshop Item
Eu, Joy Boy Joy (2001)
Specification of Dependable Trusted Third Parties.
Report
F
Fabian, C. ; Cui, K. ; Koeppl, H. (2023)
Mean Field Games on Weighted and Directed Graphs via Colored Digraphons.
In: IEEE Control Systems Letters
doi: 10.1109/LCSYS.2022.3227453
Article
Friesen, John ; Pietsch, Martin (2022)
Slums in Smart Cities - Rethink the Standard.
12th IEEE Global Humanitarian Technology Conference (GHTC 2022). Santa Clara, USA (08.-11.09.2022)
doi: 10.1109/GHTC55712.2022.9911052
Conference or Workshop Item
Fraune, Cornelia ; Engel, Alice ; Knodt, Michèle (2021)
Local governance of critical infrastructure resilience: A survey of leadership, planning, and positive coordination in German cities.
In: Journal of Contingencies and Crisis Management (JCCM), (Early Access)
doi: 10.1111/1468-5973.12386
Article
Fabian, Stefan ; Stryk, Oskar von (2021)
Open-Source Tools for Efficient ROS and ROS2-based 2D Human-Robot Interface Development.
5th European Conference on Mobile Robots. virtual Conference (31.08.-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568801
Conference or Workshop Item
Fejrskov, Martin ; Pedersen, Jens Myrup ; Böck, Leon ; Vasilomanolakis, Emmanouil (2021)
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
Tempe, AZ, USA (2021)
doi: 10.1109/CNS53000.2021.9705029
Conference or Workshop Item
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.-21.10.2021)
Conference or Workshop Item
Fabian, Stefan ; Kohlbrecher, Stefan ; Stryk, Oskar von (2020)
Pose Prediction for Mobile Ground Robots in Uneven Terrain Based on Difference of Heightmaps.
2020 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). virtual Conference (04.-06.11.2020)
doi: 10.1109/SSRR50563.2020.9292574
Conference or Workshop Item
Fraune, Cornelia ; Knodt, Michèle (2020)
Crisis Informatics Challenges from a Political Science Perpsective.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020). virtual Conference (05.-09.10.2020)
doi: 10.1145/3406324.3424585
Conference or Workshop Item
Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (November, 11th, 2019)
Conference or Workshop Item
Felsen, Susanne (2019)
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt
Master Thesis
Franke, Fabian (2018)
Learning the Beams.
TU Darmstadt
Master Thesis
Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017)
Constrained PET Composition for Measuring Enforced Privacy.
doi: 10.1145/3098954.3098968
Conference or Workshop Item
Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017)
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1)
doi: 10.1109/COMST.2017.2748278
Article
Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017)
HardIDX: Practical and Secure Index with SGX.
Conference or Workshop Item
Funke, Sebastian
ed.: Daubert, Jörg (2017)
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Conference or Workshop Item
Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016)
Consumer oriented privacy preserving access control for electronic health records in the cloud.
Conference or Workshop Item
Falzon, Kevin ; Bodden, Eric
eds.: Lopez, Javier ; Mitchell, Chris J. (2015)
Dynamically Provisioning Isolation in Hierarchical Architectures.
Information Security Conference. Trondheim
Conference or Workshop Item
Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015)
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS). Florence, Italy (28.-30. Sept. 2015)
doi: 10.1109/CNS.2015.7346895
Conference or Workshop Item
Follner, Andreas ; Bodden, Eric (2015)
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
Report
Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
eds.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Conference or Workshop Item
Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Coercion-Resistant Internet Voting in Practice.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item
Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität
Bachelor Thesis
Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014)
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Conference or Workshop Item
Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014)
Robust Multi-Property Combiners for Hash Functions.
doi: 10.1007/s00145-013-9148-7
Conference or Workshop Item
Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013)
Distributed Finite-State Runtime Monitoring with Aggregated Events.
4th International Conference on Runtime Verification (RV'13). Rennes, France (24.-27.09.)
doi: 10.1007/978-3-642-40787-1_6
Conference or Workshop Item
Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013)
Highly Precise Taint Analysis for Android Applications.
Report
Funke, Sebastian (2013)
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
Master Thesis
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Article
Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj (2013)
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
Conference or Workshop Item
Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Conference or Workshop Item
Fischlin, Marc ; Onete, Cristina (2013)
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Conference or Workshop Item
Falzon, Kevin ; Pace, Gordon J.
eds.: Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (2012)
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software. Essen, Germany (September 04, 2012)
Conference or Workshop Item
Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2012)
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
doi: 10.1109/WoWMoM.2012.6263689
Conference or Workshop Item
Faber, Natalie (2012)
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt
Master Thesis
Fuhrmann, Tino (2012)
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt
Master Thesis
Filtschew, Konstantin (2012)
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt
Master Thesis
Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2011)
Curve-based Planar Graph Routing in Multihop Wireless Networks.
doi: 10.1109/MASS.2011.127
Conference or Workshop Item
Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011)
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045914
Conference or Workshop Item
Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
Hong Kong
Conference or Workshop Item
Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011)
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy
Article
Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin (2011)
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
Conference or Workshop Item
Franz, M. ; Katzenbeisser, Stefan (2011)
Processing Encrypted Floating Point Signals.
Conference or Workshop Item
Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas (2011)
Oblivious Outsourced Storage with Delegation.
Conference or Workshop Item
Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011)
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1)
Article
Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet.
Conference or Workshop Item
Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet
(Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2)
Article
Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano (2010)
Random Oracles With(out) Programmability.
Conference or Workshop Item
Feller, Thomas ; Demirezen, Aziz (2010)
Hardware Trojans: Data Leakage Using General Purpose LEDs.
Report
Fischlin, Marc ; Schröder, Dominique (2010)
On the Impossibility of Three-Move Blind Signature Schemes.
Conference or Workshop Item
Fischlin, Marc ; Lehmann, Anja (2010)
Hash Function Combiners in SSL and TLS.
Conference or Workshop Item
Fischlin, Marc ; Lehmann, Anja (2010)
Delayed-Key Message Authentication for Streams.
Conference or Workshop Item
Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto (2010)
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
Conference or Workshop Item
Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
eds.: Clavier, C. ; Gaj, K. (2009)
A New Side-Channel Attack on RSA Prime Generation.
Berlin
Conference or Workshop Item
Freiling, Felix ; Heinson, Dennis (2009)
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9)
Article
Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
A Pattern for Secure Graphical User Interface Systems.
Conference or Workshop Item
Fischlin, Marc ; Schröder, Dominique (2009)
Security of Blind Signatures under Aborts.
Conference or Workshop Item
Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia (2008)
Measuring Unlinkability Revisited.
Alexandria, Virginia, USA
doi: 10.1145/1456403.1456421
Conference or Workshop Item
Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas (2008)
Designing Context-Aware HCI for Collaborative Emergency Management.
Conference or Workshop Item
Field, Simon ; Waidner, Michael (2000)
Electronic Commerce.
In: Computer Networks, 32 (6)
Article
G
Götte, Jan Sebastian ; Katzir, Liran ; Scheuermann, Björn (2022)
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation.
38th Annual Computer Security Applications Conference. Austin, USA (05.-09.12.2022)
doi: 10.1145/3564625.3564640
Conference or Workshop Item
Gebhard, Tobias ; Steinke, Florian ; Brucherseifer, Eva (2022)
Monitoring Electricity Demand Synchronization Using Copulas.
IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022). Novi Sad, Serbia (10.-12.10.2022)
doi: 10.1109/ISGT-Europe54678.2022.9960369
Conference or Workshop Item
Geihs, Kurt ; Jakob, Stefan ; Opfer, Stephan ; Alhamwy, Yasin (2022)
Commonsense Knowledge for Human-Robot Collaboration in Hybrid Search and Rescue Teams.
2nd International Workshop on Human-Robot Interaction new Trends in Service and Industry (HRI-SI2022). Napoli, Italy (29.08.2022)
Conference or Workshop Item
Geigle, Gregor ; Pfeiffer, Jonas ; Reimers, Nils ; Vulić, Ivan ; Gurevych, Iryna (2022)
Retrieve Fast, Rerank Smart: Cooperative and Joint Approaches for Improved Cross-Modal Retrieval.
In: Transactions of the Association for Computational Linguistics, 10
doi: 10.1162/tacl_a_00473
Article
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2022)
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4)
doi: 10.26083/tuprints-00020660
Article, Secondary publication, Postprint
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2021)
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4)
doi: 10.1145/3494986
Article
Götte, Jan Sebastian ; Scheuermann, Björn (2021)
Can’t Touch This: Inertial HSMs Thwart Advanced Physical Attacks.
In: Transactions on Cryptographic Hardware and Embedded Systems, 2022 (1)
doi: 10.46586/tches.v2022.i1.69-93
Article
Günther, Jonas ; Oehler, Martin ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021)
Industrial Manometer Detection and Reading for Autonomous Inspection Robots.
5th European Conference on Mobile Robots. virtual Conference (31.08.-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568833
Conference or Workshop Item
Grube, Tim ; Heinrich, Alexander ; Stroscher, Jan-Philipp ; Schomberg, Sabrina (2020)
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8)
doi: 10.1007/s11623-020-1314-0
Article
Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM CCS 2019. London (November 11-15, 2019)
doi: 10.1145/3319535.3363251
Conference or Workshop Item
Gringoli, Francesco ; Schulz, Matthias ; Link, Jakob ; Hollick, Matthias (2019)
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH ’19). Los Cabos, Mexico (25.10.2019)
doi: 10.1145/3349623.3355477
Conference or Workshop Item
Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
eds.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer. Hamburg, Germany (8. bis 11. September 2019)
doi: 10.1145/3340764.3340782
Conference or Workshop Item
Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
Article
Günther, Daniel (2018)
Private Function Evaluation with Universal Circuits.
Bosch Renningen, Germany (6.-7.9.2018)
Conference or Workshop Item
Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018)
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems. Vienna, Austria (2.-5.7.2018)
Conference or Workshop Item
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
eds.: Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (2018)
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018
Book Section
Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018)
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion
Book Section
Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018)
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
Conference or Workshop Item
Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018)
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
HotNets'18: 17th ACM Workshop on Hot Topics in Networks. November 2018 (Redmond, USA)
doi: 10.1145/3286062.3286071
Conference or Workshop Item
Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
doi: 10.1007/978-3-319-70697-9_16
Conference or Workshop Item
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017)
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017. London, United Kingdom (04.-07.12.2017)
Conference or Workshop Item
Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017)
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
Conference or Workshop Item
Gerber, Nina ; Gerber, Paul ; Hernando, Maria
ed.: Tryfonas, Theo (2017)
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Vancouver, Canada
doi: 10.1007/978-3-319-58460-7_44
Conference or Workshop Item
Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017)
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Vancouver, Canada
doi: 10.1007/978-3-319-58460-7
Conference or Workshop Item
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colonies for Efficient and Anonymous Group Communication Systems.
doi: 10.1109/NetSys.2017.7903958
Conference or Workshop Item
Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität
Bachelor Thesis
Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Conference or Workshop Item
Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017)
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
Las Vegas (USA)
doi: 10.1109/CCNC.2017.7983129
Conference or Workshop Item
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
doi: 10.1007/978-3-658-16835-3_8
Conference or Workshop Item
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017)
Towards Accelerated Usage Control based on Access Correlations.
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
Conference or Workshop Item
Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017)
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
Conference or Workshop Item
Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016)
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1)
doi: 10.1016/j.jisa.2016.10.003
Article
Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016)
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
doi: 10.1109/PST.2016.7906980
Conference or Workshop Item
Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016)
Semantic Security and Indistinguishability in the Quantum World.
doi: 10.1007/978-3-662-53015-3_3
Conference or Workshop Item
Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016)
Memorable And Secure: How Do You Choose Your PIN?
Frankfurt
Conference or Workshop Item
Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Conference or Workshop Item
Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016)
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
Saarbrucken
doi: 10.1109/EuroSP.2016.35
Conference or Workshop Item
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max (2015)
ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems.
IEEE Conference on Communications and Network Security (CNS 2015). Florence, Italy (28.-30. Sept.)
doi: 10.1109/CNS.2015.7346912
Conference or Workshop Item
Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015)
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Conference or Workshop Item
Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil (2015)
A Survey of Technologies for the Internet of Things.
Dubrovnik, Croatia
doi: 10.1109/IWCMC.2015.7289234
Conference or Workshop Item
Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015)
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
Dreseden
Conference or Workshop Item
Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Conference or Workshop Item
Ghiglieri, Marco ; Müller, Jan (2015)
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
Conference or Workshop Item
Ghiglieri, Marco ; Oswald, Florian (2015)
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
Conference or Workshop Item
Gerber, Paul ; Volkamer, Melanie (2015)
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2)
doi: 10.1007/s11623-015-0375-y
Article
Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015)
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1)
doi: 10.1145/2738210.2738214
Article
Ghiglieri, Marco (2015)
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
Las Vegas, NV
Conference or Workshop Item
Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Conference or Workshop Item
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Community-based Collaborative Intrusion Detection.
doi: 10.1007/978-3-319-28865-9_44
Conference or Workshop Item
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Conference or Workshop Item
Ghiglieri, Marco
eds.: Schiele, Otto ; Schön, Willi (2014)
HbbTV – aktueller Stand 2014.
Conference or Workshop Item
Geihs, Matthias ; Cabarcas, Daniel
eds.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Conference or Workshop Item
Ghiglieri, Marco (2014)
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
Report
Ghiglieri, Marco (2014)
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy. San Jose, California (18.5.2014)
Conference or Workshop Item
Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014)
Personal DLP for Facebook.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815279
Conference or Workshop Item
Ghiglieri, Marco ; Tews, Erik (2014)
A Privacy Protection System for HbbTV in Smart TVs.
Las Vegas, NV
doi: 10.1109/CCNC.2014.6866595
Conference or Workshop Item
Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014)
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Conference or Workshop Item
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
eds.: Schiele, Otto ; Schön, Willi (2013)
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
Conference or Workshop Item
Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21-23 October, 2013)
Conference or Workshop Item
Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität
Bachelor Thesis
Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität
Bachelor Thesis
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013)
HbbTV - I Know What You Are Watching.
Conference or Workshop Item
Grimm, Marco ; Anderl, Reiner (2013)
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
Conference or Workshop Item
Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report
Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013)
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
Conference or Workshop Item
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5)
Article
Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
eds.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Conference or Workshop Item
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Energy-efficient fair channel access for IEEE 802.11 WLANs.
Lucca, Italy
Conference or Workshop Item
Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012)
Technical Aspects of Online Privacy.
Report
Göök, A. ; Eckardt, C. ; Enders, J. ; Freudenberger, M. ; Neumann-Cosel, P. ; Oberstedt, A. ; Oberstedt, S. ; Richter, A.
ed.: Oberstedt, S. (2012)
Fragment properties from fission of actinide nuclei induced by 6-10 MeV bremsstrahlung.
Physics Procedia 31 Proc. Int. Workshop GAMMA-1 Emission of Prompt Gamma-Rays in Fission and Related Topics, Novi Sad, Serbia (2011).
Conference or Workshop Item
Grieser, M. ; Litvinov, Yu. A. ; Raabe, R. ; Blaum, K. ; Blumenfeld, Y. ; Butler, P. A. ; Wenander, F. ; Woods, P. J. ; Aliotta, M. ; Andreyev, A. ; Artemyev, A. ; Atanasov, D. ; Aumann, T. ; Balabanski, D. ; Barzakh, A. ; Batist, L. ; Bernardes, A.-P. ; Bernhardt, D. ; Billowes, J. ; Bishop, S. ; Borge, M. ; Borzov, I. ; Bosch, F. ; Boston, A. J. ; Brandau, C. ; Catford, W. ; Catherall, R. ; Cederkäll, J. ; Cullen, D. ; Davinson, T. ; Dillmann, I. ; Dimopoulou, C. ; Dracoulis, G. ; Düllmann, Ch. E. ; Egelhof, P. ; Estrade, A. ; Fischer, D. ; Flanagan, K. ; Fraile, L. ; Fraser, M. A. ; Freeman, S. J. ; Geissel, H. ; Gerl, J. ; Greenlees, P. ; Grisenti, R. E. ; Habs, D. ; Hahn, R. von ; Hagmann, S. ; Hausmann, M. ; He, J. J. ; Heil, M. ; Huyse, M. ; Jenkins, D. ; Jokinen, A. ; Jonson, B. ; Joss, D. T. ; Kadi, Y. ; Kalantar-Nayestanaki, N. ; Kay, B. P. ; Kiselev, O. ; Kluge, H.-J. ; Kowalska, M. ; Kozhuharov, C. ; Kreim, S. ; Kröll, T. ; Kurcewicz, J. ; Labiche, M. ; Lemmon, R. C. ; Lestinsky, M. ; Lotay, G. ; Ma, X. W. ; Marta, M. ; Meng, J. ; Mücher, D. ; Mukha, I. ; Müller, A. ; Murphy, A. St. J. ; Neyens, G. ; Nilsson, T. ; Nociforo, C. ; Nörtershäuser, W. ; Page, R. D. ; Pasini, M. ; Petridis, N. ; Pietralla, N. ; Pfützner, M. ; Podolyák, Z. ; Regan, P. ; Reed, M. W. ; Reifarth, R. ; Reiter, P. ; Repnow, R. ; Riisager, K. ; Rubio, B. ; Sanjari, M. S. ; Savin, D. W. ; Scheidenberger, C. ; Schippers, S. ; Schneider, D. ; Schuch, R. ; Schwalm, D. ; Schweikhard, L. ; Shubina, D. ; Siesling, E. ; Simon, H. ; Simpson, J. ; Smith, J. ; Sonnabend, K. ; Steck, M. ; Stora, T. ; Stöhlker, T. ; Sun, B. ; Surzhykov, A. ; Suzaki, F. ; Tarasov, O. ; Trotsenko, S. ; Tu, X. L. ; Duppen, P. van ; Volpe, C. ; Voulot, D. ; Walker, P. M. ; Wildner, E. ; Winckler, N. ; Winters, D. F. A. ; Wolf, A. ; Xu, H. S. ; Yakushev, A. ; Yamaguchi, T. ; Yuan, Y. J. ; Zhang, Y. H. ; Zuber, K. (2012)
Storage ring at HIE-ISOLDE.
In: The European Physical Journal Special Topics, 207 (1)
Article
Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität
Bachelor Thesis
Glorius, J. ; Knörzer, M. ; Müller, S. ; Pietralla, N. ; Sauerwein, A. ; Sonnabend, K. ; Wälzlein, C. ; Wiescher, M. (2011)
p-process nucleosynthesis: Activation experiments.
In: Progress in Particle and Nuclear Physics, 66 (2)
Article
Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Cryptographic Treatment of Private User Profiles.
Conference or Workshop Item
Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Key Management in Distributed Online Social Networks.
Conference or Workshop Item
Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010)
Service Automata for Secure Distributed Systems.
Other
Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. (2010)
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
Denver, Colorado, USA
Conference or Workshop Item
Geibig, Joanna ; Bradler, Dirk (2010)
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10)
Article
Gladnishki, K. A. ; Rainovski, G. ; Petkov, P. ; Jolie, J. ; Pietralla, N. ; Blazhev, A. ; Damyanova, A. ; Danchev, M. ; Dewald, A. ; Fransen, C. ; Hackstein, M. ; Karagyozov, D. ; Möller, O. ; Pissulla, T. ; Reese, M. ; Rother, W. ; Topchiyska, R. (2010)
Search for one-phonon mixed-symmetry states in the radioactive nucleus 140Nd.
In: Physical Review C, 82 (3)
Article
Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010)
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Conference or Workshop Item
Gharadaghy, Rojan (2010)
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Technische Universität
Bachelor Thesis
Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
Conference or Workshop Item
Gharadaghy, Rojan ; Volkamer, Melanie (2010)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Conference or Workshop Item
Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Conference or Workshop Item
Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf (2009)
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
Conference or Workshop Item
Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
Conference or Workshop Item
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2009)
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
Ingelheim
Conference or Workshop Item
Ghiglieri, Marco ; Fürnkranz, Johannes (2009)
Learning To Recognize Missing E-mail Attachments.
Report
Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj (2009)
Threat Modeling and Dynamic Profiling.
Book Section
Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008)
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
Conference or Workshop Item
Grimm, Rüdiger ; Volkamer, Melanie
eds.: Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (2008)
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
München
Conference or Workshop Item
Grimm, Rüdiger ; Volkamer, Melanie (2008)
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Conference or Workshop Item
Gebhardt, Max ; Illies, Georg ; Schindler, Werner
eds.: Alkassar, A. ; Siekmann, J. (2008)
On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
Bonn
Conference or Workshop Item
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2008)
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
In: Cryptology ePrint Archive, 2008 (022)
Article
Grimm, Rüdiger ; Volkamer, Melanie
eds.: Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (2008)
Trust Models for Remote Electronic Voting.
Koblenz
Conference or Workshop Item
Grimm, Rüdiger ; Volkamer, Melanie (2007)
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
Report
Grimm, Rüdiger ; Volkamer, Melanie
ed.: Krimmer, Robert (2006)
Multiple Cast in Online Voting - Analyzing Chances.
Conference or Workshop Item
Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
eds.: Krimmer, Robert ; LNI, GI (2006)
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006
Book Section
H
Haesler, Steffen ; Wendelborn, Marc ; Reuter, Christian (2023)
Getting the Residents' Attention: The Perception of Warning Channels in Smart Home Warning Systems.
2023 Designing Interactive Systems Conference. Pittsburgh, USA (10.-14.07.2023)
doi: 10.1145/3563657.3596076
Conference or Workshop Item
Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian (2023)
Preparedness nudging for warning apps? A mixed-method study investigating popularity and effects of preparedness alerts in warning apps.
In: International Journal of Human-Computer Studies, 172
doi: 10.1016/j.ijhcs.2023.102995
Article
Hekmati, Björn ; Rudolph-Cleff, Annette (2023)
Mobilität als Schlüssel zur lebenswerten Stadt.
In: Mobility Design: Die Zukunft der Mobilität gestalten Band 2: Forschung, Edition: 1. Auflage
doi: 10.1515/9783868597936
Book Section
Hünemohr, David ; Bauer, Maximilian ; Kleikemper, Jan ; Peukert, Markus (2022)
Analysis of Helicopter Flights in Urban Environments for UAV Traffic Management.
In: Engineering Proceedings, 28
doi: 10.3390/engproc2022028010
Article
Heise, Michael ; Pietsch, Martin ; Steinke, Florian ; Bauer, Maximilian ; Yilmaz, Burak (2022)
Optimized UAV Placement for Resilient Crisis Communication and Power Grid Restoration.
IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022). Novi Sad, Serbia (10.-12.10.2022)
doi: 10.1109/ISGT-Europe54678.2022.9960494
Conference or Workshop Item
Hessel, Frank ; Almon, Lars ; Hollick, Matthias (2022)
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation.
In: ACM Transactions on Sensor Networks
doi: 10.1145/3561973
Article
Hornung, Gerrit ; Schomberg, Sabrina (2022)
Datensouveränität im Spannungsfeld zwischen Datenschutz und Datennutzung: das Beispiel des Data Governance Acts.
In: Computer und Recht, 38 (8)
doi: 10.9785/cr-2022-380810
Article
Hornung, Gerrit ; Söllner, Matthias ; Stroscher, Jan-Philipp ; Zahn, Eva-Maria (2022)
Kollaboration im Datenschutz: Collaboration Engineering als Instrument zur partizipativen und nachhaltigen Gestaltung von Datenschutzprozessen.
In: Datenschutz und Datensicherheit, 46 (6)
doi: 10.1007/s11623-022-1625-4
Article
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2022)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
WI 2020: 15. Internationale Tagung Wirtschaftsinformatik - Zentrale Tracks. Potsdam, Germany (08.-11.03.2020)
doi: 10.26083/tuprints-00020743
Conference or Workshop Item, Secondary publication, Publisher's Version
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2022)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium (USENIX Security 21). Virtual event (11.-13.08.2021)
doi: 10.26083/tuprints-00020599
Conference or Workshop Item, Secondary publication, Publisher's Version
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2022)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
The 21st Privacy Enhancing Technologies Symposium. Online (12.-16.07.2021)
doi: 10.26083/tuprints-00020598
Conference or Workshop Item, Secondary publication, Publisher's Version
Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2022)
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD Praxis der Wirtschaftsinformatik, 58 (5)
doi: 10.26083/tuprints-00022163
Article, Secondary publication, Publisher's Version
Haselhorst, Arno ; Germies, Jürgen ; Wright-Contreras, Lucía ; Camara, Luiza ; Rudolph-Cleff, Annette ; Schulze, Joachim (2022)
Spezialbericht - Smart-City-Ranking 2022 - Ressourcenschonend und CO₂-neutral - Die smarte Transformation unserer Städte im Hinblick auf die Energiekrise.
doi: 10.26083/tuprints-00022871
Report, Primary publication, Publisher's Version
Haunschild, Jasmin ; Reuter, Christian (2022)
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.-08.09.2021)
doi: 10.26083/tuprints-00022173
Conference or Workshop Item, Secondary publication, Publisher's Version
Hartwig, Katrin ; Reuter, Christian (2022)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14. Internationale Tagung Wirtschaftsinformatik (WI 2019). Siegen, Germany (23.-27.2.2019)
doi: 10.26083/tuprints-00020747
Conference or Workshop Item, Secondary publication, Publisher's Version
Haesler, Steffen ; Mogk, Ragnar ; Putz, Florentin ; Logan, Kevin ; Thiessen, Nadja ; Kleinschnitger, Katharina ; Baumgärtner, Lars ; Stroscher, Jan-Philipp ; Reuter, Christian ; Knodt, Michèle ; Hollick, Matthias (2021)
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods.
2021 Conference on Computer Supported Cooperative Work and Social Computing. virtual Conference (23.-27.10.2021)
doi: 10.1145/3462204.3481749
Conference or Workshop Item
Haesler, Steffen ; Schmid, Stefka ; Vierneisel, Annemike Sophia ; Reuter, Christian (2021)
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic.
In: Proceedings of the ACM on Human Computer Interaction, 5 (CSCW2)
doi: 10.1145/3476045
Article
Haunschild, Jasmin ; Reuter, Christian
ed.: ACM (2021)
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas.
24th ACM Conference on Computer-Supported Cooperative Work and Social Computing. virtual Conference (23.-27.10.2021)
doi: 10.1145/3462204.3481745
Conference or Workshop Item
Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian
ed.: ACM (2021)
Citizens' Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic.
Conference on Information Technology for Social Good. Roma, Italy (09.-11.09.2021)
doi: 10.1145/3462203.3475886
Conference or Workshop Item
Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2021)
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD : Praxis der Wirtschaftsinformatik, 58 (5)
doi: 10.1365/s40702-021-00770-8
Article
Hornung, Gerrit ; Stroscher, Jan-Philipp (2021)
Datenschutz in der Katastrophe.
In: Zeitschrift für das gesamte Sicherheitsrecht (GSZ), 4 (4)
Article
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.-13.08.2021)
Conference or Workshop Item
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.–01.07.2021)
doi: 10.1145/3448300.3468251
Conference or Workshop Item
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.–01.07.2021)
doi: 10.1145/3448300.3468252
Conference or Workshop Item
Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Conference or Workshop Item
Hassan, Sohaib S. ; Reuter, Christian ; Bzhalava, Levan (2021)
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs.
In: International Journal of Innovation Management, 25 (1)
doi: 10.1142/S136391962150002X
Article
Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). San Diego, California, USA (21.-24.02. 2021)
Conference or Workshop Item
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3)
doi: 10.2478/popets-2021-0045
Article
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Linz, Österreich (08.-10.07.2020)
doi: 10.26083/tuprints-00017839
Conference or Workshop Item, Secondary publication, Postprint
Hartwig, Katrin ; Reuter, Christian
eds.: Klimczak, Peter ; Zoglauer, Thomas (2021)
Fake News technisch begegnen - Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen.
In: Wahrheit und Fake im postfaktisch-digitalen Zeitalter: Distinktionen in den Geistes- und IT-Wissenschaften, Edition: 1.Auflage
doi: 10.1007/978-3-658-32957-0_7
Book Section
Haselhorst, Arno ; Germies, Jürgen ; Wright-Contreras, Lucía ; Rudolph-Cleff, Annette ; Schulze, Joachim ; Dighe, Chaitali (2021)
Digitales Deutschland - Smart-City-Ranking 2021- Smart und Nachhaltig - Die digitale Transformation unserer Städte im Angesicht der Herausforderungen und Ziele einer nachhaltigen Entwicklung.
doi: 10.26083/tuprints-00019716
Report, Primary publication, Publisher's Version
Haunschild, Jasmin ; Reuter, Christian (2021)
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.-08.09.2021)
doi: 10.18420/muc2021-mci-ws08-255
Conference or Workshop Item
Haunschild, Jasmin ; Reuter, Christian ; Kaufhold, Marc-André (2020)
Crisis informatics insights for peace operations.
Report
Höchst, Jonas ; Penning, Alvar ; Lampe, Patrick ; Freisleben, Bernd (2020)
PIMOD: A Tool for Configuring Single-Board Computer Operating System Images.
10th IEEE Global Humanitarian Technology Conference (GHTC 2020). virtual Conference (29.10.-01.11.2020)
doi: 10.1109/GHTC46280.2020.9342928
Conference or Workshop Item
Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020)
Modular Collaborative Program Analysis in OPAL.
28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020). virtual Conference (06.-16.11.)
doi: 10.1145/3368089.3409765
Conference or Workshop Item
Hollick, Matthias ; Freisleben, Bernd ; Knodt, Michèle ; Hornung, Gerrit ; Mühlhäuser, Max ; Fraune, Cornelia ; Engels, Jens Ivo (2020)
Resiliente Informations- und Kommunikationstechnologie
für ein krisenfestes Deutschland.
doi: 10.5281/zenodo.4066319
Report
Haesler, Steffen ; Schmid, Stefka ; Reuter, Christian (2020)
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon #WirVsVirus.
MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services. Oldenburg, Germany (Oktober 2020)
doi: 10.1145/3406324.3424584
Conference or Workshop Item
Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020)
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. VIRTUAL (July 08.-10., 2020)
doi: 10.1145/3395351.3399343
Conference or Workshop Item
Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020)
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.-10.07.2020)
doi: 10.1145/3395351.3399423
Conference or Workshop Item
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.-10.07.2020)
doi: 10.1145/3395351.3401796
Conference or Workshop Item
Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020)
A Programming Model for Semi-implicit Parallelization of Static Analyses.
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis. virtual Conference (18.-22.07.)
doi: 10.1145/3395363.3397367
Conference or Workshop Item
Himmelmann, Nicolás ; Yuan, Dingwen ; Almon, Lars ; Hollick, Matthias (2020)
Concurrent Wireless Cut-Through Forwarding: Ultra Low-Latency Multi-Hop Communication for the IoT.
IEEE DCOSS 2020: International Conference on Distributed Computing in Sensor Systems. Virtual Conference (June 15.-17.)
Conference or Workshop Item
Höchst, Jonas ; Baumgärtner, Lars ; Kuntke, Franz ; Penning, Alvar ; Sterz, Artur ; Freisleben, Bernd (2020)
LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios.
17th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2020). Blacksburg, Virginia, USA (24.5.-27.5.2020)
Conference or Workshop Item
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
15. Internationale Tagung Wirtschaftsinformatik - Community Tracks. Potsdam, Germany (08.-11.03.2020)
doi: 10.30844/wi_2020_o2-haunschild
Conference or Workshop Item
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020)
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020). San Diego, USA (23.-26. Febr.)
Conference or Workshop Item
Hohmann, Fabian ; Ortiz, Andrea ; Klein, Anja (2019)
Optimal Resource Allocation Policy for Multi-Rate Opportunistic Forwarding.
IEEE Wireless Communications and Networking. Marrakesch, Marokko (15.-18.04.2019)
doi: 10.1109/WCNC.2019.8885462
Conference or Workshop Item
Hollick, Matthias ; Hofmeister, Anne ; Engels, Jens Ivo ; Freisleben, Bernd ; Hornung, Gerrit ; Klein, Anja ; Knodt, Michèle ; Lorenz, Imke ; Mühlhäuser, Max ; Pelz, Peter F. ; Rudolph-Cleff, Annette ; Steinmetz, Ralf ; Steinke, Florian ; Stryk, Oskar von (2019)
The Emergency Responsive Digital City.
2019 World Congress on Resilience, Reliability and Asset Management (WCRRAM). Singapore (28.-31.07.2019)
Conference or Workshop Item
Hartwig, Katrin ; Reuter, Christian
ed.: Reuter, Christian (2019)
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.-27.9.2019)
Conference or Workshop Item
Hartwig, Katrin ; Reuter, Christian (2019)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (23.-27.02.2019)
Conference or Workshop Item
Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018)
A unified lattice model and framework for purity analyses.
ASE 2018. Corum, Montpellier, France (3.-7.9.2018)
doi: 10.1145/3238147.3238226
Conference or Workshop Item
Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018)
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks. Denver,CO,USA (26.-29.06.2018)
Conference or Workshop Item
Hanreich, Matthias (2018)
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
Master Thesis
Heuss, Oliver (2018)
Eine Analyse des Anwendungspotenzials von piezoelektrischen Netzwerken
im Maschinenbau - Evaluierung bestehender Techniken und Entwicklung einer Gesamtsystemmodellierung.
Technische Universität
Ph.D. Thesis, Primary publication
Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Conference or Workshop Item
Hermann, Ben ; Li, Ximeng ; Mantel, Heiko ; Mezini, Mira ; Tasch, Markus ; Wendel, Florian ; Weber, Friedrich (2017)
Requirements for a Specification Language for Data and Information Flow, and A Literature Review of Analytical and Constructive Research on the Java Native Interface.
Report
Holz, Marco (2016)
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt
Bachelor Thesis
Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Requirements Markup Language.
Melbourne, Australia
Conference or Workshop Item
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Conference or Workshop Item
Heuser, Stephan (2016)
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Halvani, Oren ; Winter, Christian ; Pflug, Anika (2016)
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement)
doi: 10.1016/j.diin.2016.01.006
Article
Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015)
Capacity and Data Complexity in Multidimensional Linear Attack.
Conference or Workshop Item
Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015)
PALPAS - PAsswordLess PAssword Synchronization.
Université Paul Sabatier, Toulouse, France
Conference or Workshop Item
Halvani, Oren ; Winter, Christian
eds.: Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (2015)
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
Toulouse, France
Conference or Workshop Item
Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
eds.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Book Section
Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015)
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
Vancouver, Canada
doi: 10.4108/icst.tridentcom.2015.259694
Conference or Workshop Item
Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj (2014)
Event pattern discovery on IDS traces of Cloud Services.
Conference or Workshop Item
Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014)
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11)
doi: 10.1002/sec.748
Article
Halvani, Oren ; Steinebach, Martin (2014)
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014)
Article
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Conference or Workshop Item
Hiemenz, Benedikt (2014)
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt
Bachelor Thesis
Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
eds.: Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (2014)
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich
Book Section
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Report
Halvani, Oren ; Steinebach, Martin
eds.: Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (2014)
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Sheffield, UK
Conference or Workshop Item
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Article
Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
eds.: Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (2013)
Authorship Verification via k-Nearest Neighbor Estimation.
Conference or Workshop Item
Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik (2013)
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Melbourne, Australia (16.-18.07.2013)
doi: 10.1109/TrustCom.2013.5
Conference or Workshop Item
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Melbourne, Australia
doi: 10.1109/TrustCom.2013.58
Conference or Workshop Item
Hamann, Tobias (2013)
The BKZ Simulation Algorithm.
Tu Darmstadt
Master Thesis
Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf (2013)
Natural Language Watermarking for German Texts.
Montpellier, France
doi: 10.1145/2482513.2482522
Conference or Workshop Item
Henecka, Wilko ; Schneider, Thomas (2013)
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Hangzhou, China (May 08 - 10, 2013)
doi: 10.1145/2484313.2484369
Conference or Workshop Item
Hülsing, Andreas ; Braun, Johannes (2013)
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Bonn
Conference or Workshop Item
Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013)
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Conference or Workshop Item
Hülsing, Andreas (2013)
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Cairo, Egypt
Conference or Workshop Item
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Book Section
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13). Coimbra, Portugal (March 2013)
doi: 10.1145/2480362.2480727
Conference or Workshop Item
Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013)
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Conference or Workshop Item
Hornschuch, Marian (2012)
Multivariate-based identification and signature schemes with additional properties.
Technische Universität
Bachelor Thesis
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012)
Decoupling Authentication from the Usage of Services.
Report
Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012)
Secure Two-Party Computations in ANSI C.
doi: 10.1145/2382196.2382278
Conference or Workshop Item
Heinrich, Markus (2012)
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
Bachelor Thesis
Halvani, Oren (2012)
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Technische Universität
Bachelor Thesis
Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
eds.: Knudsen, Lars ; Wu, Huapeng (2012)
Forward Secure Signatures on Smart Cards.
Windsor, Canada
doi: 10.1007/978-3-642-35999-6_5
Conference or Workshop Item
Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012)
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
11th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012). Liverpool, UK (25.-27.06.)
doi: 10.1109/TrustCom.2012.165
Conference or Workshop Item
Heuser, Annelie ; Zohner, Michael (2012)
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
Conference or Workshop Item
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph (2012)
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1)
doi: 10.1049/iet-bmt.2011.0013
Article
Hartung, Daniel ; Pflug, Anika ; Busch, Christoph (2012)
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
Conference or Workshop Item
Henriques, Joselito ; Lukas, Uwe Freiherr von ; Mesing, Benjamin (2012)
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2
Article
Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012)
Fusion of Opinions under Uncertainty and Conflict — Trust Assessment for Cloud Marketplaces (Full version).
Report
Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
ed.: Waldmann, Ulrich (2012)
Post-Quantum Signaturverfahren Heute.
Conference or Workshop Item
Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Conference or Workshop Item
Halvani, Oren ; Steinebach, Martin
eds.: Schartner, Peter ; Taeger, Jürgen (2012)
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven
Book Section
Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012)
On the design and implementation of the Open eCard App.
Darmstadt
Conference or Workshop Item
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012)
Verteilte Dienstnutzung mit dem neuen Personalausweis.
Conference or Workshop Item
Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner (2012)
Data Exchange Processes based on Trust and Rights Management.
Karlsruhe
Conference or Workshop Item
Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten (2012)
Friendship in German Online Social Networks.
Conference or Workshop Item
Halvani, Oren Avni (2012)
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Technische Universität
Master Thesis
Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012)
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Salzburg, Austria
Conference or Workshop Item
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011)
Towards a Trust Management System for Cloud Computing.
10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha, China (16.-18.11.2011)
doi: 10.1109/TrustCom.2011.129
Conference or Workshop Item
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2011)
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011)
Article
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011)
Mobile eID application for the German identity card.
Report
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011)
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
Report
Hoffmann, Gerhard (2011)
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt
Master Thesis
Horsch, Moritz ; Stopczynski, Martin (2011)
The German eCard-Strategy.
Report
Horsch, Moritz (2011)
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Technische Universität
Bachelor Thesis
Hamacher, Kay ; Katzenbeisser, Stefan (2011)
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011)
Book Section
Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2011)
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Conference or Workshop Item
Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco (2010)
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
Vancouver, British Columbia, Canada
Conference or Workshop Item
Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro (2010)
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2)
Article
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2010)
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
Xi'an, China
doi: 10.1109/UIC-ATC.2010.48
Conference or Workshop Item
Heinson, Dennis ; Schmidt, Bernd (2010)
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8)
Article
Halvani, Oren ; Steinebach, Martin (2010)
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 61 (5)
Article
Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
Stellenbpsch, South Africa
Conference or Workshop Item
Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus (2010)
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2)
doi: 10.1007/s11623-010-0039-x
Article
Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
ed.: Freiling, Felix (2010)
Quantifying the Attack Surface of a Web Application.
Bonn
Conference or Workshop Item
Hartmann, Frank (2010)
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Technische Universität
Bachelor Thesis
Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph (2010)
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
Conference or Workshop Item
Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009)
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
doi: 10.1109/NTMS.2009.5384830
Conference or Workshop Item
Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas (2009)
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10)
doi: 10.4304/jnw.4.10.968-975
Article
Horsch, Moritz (2009)
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Technische Universität
Bachelor Thesis
Hornung, Gerrit ; Schnabel, Christoph (2009)
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2)
Article
Hornung, Gerrit ; Schnabel, Christoph (2009)
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1)
Article
Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max (2009)
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1)
Article
Hartung, Daniel (2009)
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5
Article
Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009)
Software protection using an installation product having an entitlement file.
Norm, patent, standard
Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009)
Software Protection Using an Installaton Product Having an Entitlement File.
Norm, patent, standard
Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel (2008)
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR
Article
Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf (2007)
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Conference or Workshop Item
Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007)
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6)
Article
Hutter, Dieter ; Volkamer, Melanie
eds.: Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (2006)
Information Flow Control to Secure Dynamic Web Service Composition.
York, UK
Conference or Workshop Item
Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
eds.: Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (2006)
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Freiburg (Schweiz)
Conference or Workshop Item
Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf (2005)
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Conference or Workshop Item
Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. (2004)
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Conference or Workshop Item
Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004)
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1)
Article
Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf (2004)
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Conference or Workshop Item
Hollick, Matthias ; Krop, T. ; Schmitt, J. (2003)
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.
Report
Hollick, Matthias ; Steinmetz, Ralf (2002)
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
Conference or Workshop Item
Hollick, Matthias ; Schmitt, J. (2002)
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Report
Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf (2001)
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Conference or Workshop Item
Hollick, Matthias ; Steinmetz, Ralf (2001)
Security Goals for Service Discovery in Ad-hoc Environments.
Conference or Workshop Item
Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf (2001)
A Security Model for Multicast Group Integrity Management.
Third International Workshop on Networked Group Communication. London, UK (November 7–9, 2001)
Conference or Workshop Item
Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996)
Micro-payments based on iKP.
Conference or Workshop Item
I
István, Zsolt ; Rosero, Paul ; Bonnet, Philippe (2022)
Always-trusted IoT - Making IoT Devices Trusted with Minimal Overhead.
5th Workshop on System Software for Trusted Execution (SysTEX'22). Lausanne, Switzerland (28.02.-04.03.2022)
Conference or Workshop Item
Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
eds.: Ojendal, Joakim ; Swain, Ashok (2018)
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding
Book Section
Islam, Md. Monirul (2017)
Automating Trustworthiness Assessment of Mobile Applications.
Technische Universität
Master Thesis
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Conference or Workshop Item
Inel, Miray (2014)
Entwurf und Implementierung von Plug-ins für JCrypTool.
Technische Universität
Bachelor Thesis
Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Modular Reasoning with Join Point Interfaces.
Report
Isaak, J. ; Savran, D. ; Fritzsche, M. ; Galaviz, D. ; Hartmann, T. ; Kamerdzhiev, S. ; Kelley, J. ; Kwan, E. ; Pietralla, N. ; Romig, C. ; Rusev, G. ; Sonnabend, K. ; Tonchev, A. ; Tornow, W. ; Zilges, A. (2011)
Investigation of low-lying electric dipole strength in the semimagic nucleus ^{44}Ca.
In: Physical Review C, 83 (3)
Article
Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item
Ivanova, Vanya (2010)
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt
Master Thesis
Israr, Adeel ; Shoufan, Abdulhadi ; Huss, Sorin (2009)
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
Conference or Workshop Item
J
Jamali, Vahid ; Ghanem, Walid ; Schober, Robert ; Poor, H. Vincent (2023)
Impact of Channel Models on Performance Characterization of RIS-Assisted Wireless Systems.
17th European Conference on Antennas and Propagation (EuCAP 2023). Florence, Italy (26.-31.03.2023)
doi: 10.23919/EuCAP57121.2023.10133758
Conference or Workshop Item
Jakob, Stefan (2021)
A Self-Organising Multi-Agent Knowledge Base.
Universität Kassel
Ph.D. Thesis
Janke, Tim ; Ghanmi, Mohamed ; Steinke, Florian (2021)
Implicit Generative Copulas.
35th International Conference on Neural Information Processing Systems (NeurIPS 2021). virtual Conference (07.-10.12.2021)
Conference or Workshop Item
Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Article
Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020)
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020
doi: 10.1109/TC.2020.2972549
Article
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.-02.07)
Conference or Workshop Item
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.-02.07.)
Conference or Workshop Item
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks. virtual Conference (29.06.-02.07.)
Conference or Workshop Item
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security
doi: 10.1049/iet-ifs.2019.0125
Article
Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
Conference or Workshop Item
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018)
Faster Privacy-Preserving Location Proximity Schemes.
doi: 10.1007/978-3-030-00434-7_1
Conference or Workshop Item
Jauernig, Patrick Thomas (2017)
SMOV: Lighweight In-Process Memory Isolation.
Technische Universität
Bachelor Thesis
Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim (2015)
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
International Conference on Networked Systems (NetSys).
Conference or Workshop Item
Jamison, Emily ; Gurevych, Iryna
eds.: Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (2014)
Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
Phuket, Thailand
Conference or Workshop Item
Jamison, Emily ; Gurevych, Iryna
eds.: Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (2014)
Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
Phuket, Thailand
Conference or Workshop Item
Jeutter, Bennet (2013)
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
Master Thesis
Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012)
Unsafe Exposure Analysis of Mobile In-App Advertisements.
Conference or Workshop Item
Jolos, R. ; Pietralla, N. ; Shirikova, N. ; Voronov, V. (2011)
Schematic microscopic approach to the description of M1 transitions between mixed-symmetry and fully symmetric collective states in γ-soft nuclei based on RPA-IBM boson mapping.
In: Physical Review C, 84 (1)
Article
Jungclaus, A. ; Walker, J. ; Leske, J. ; Speidel, K.-H. ; Stuchbery, A. E. ; East, M. ; Boutachkov, P. ; Cederkäll, J. ; Doornenbal, P. ; Egido, J. L. ; Ekström, A. ; Gerl, J. ; Gernhäuser, R. ; Goel, N. ; Górska, M. ; Kojouharov, I. ; Maier-Komor, P. ; Modamio, V. ; Naqvi, F. ; Pietralla, N. ; Pietri, S. ; Prokopowicz, W. ; Schaffner, H. ; Schwengner, R. ; Wollersheim, H.-J. (2011)
Evidence for reduced collectivity around the neutron mid-shell in the stable even-mass Sn isotopes from new lifetime measurements.
In: Physics Letters B, 695 (1-4)
Article
Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010)
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
Article
Jonker, Hugo ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
Compliance of RIES to the proposed e-voting protection profile.
Bochum, Germany
Conference or Workshop Item
Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998)
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4)
Article
Janson, Phil ; Waidner, Michael (1996)
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6)
Article
K
Knodt, Michèle ; Platzer, Eva (2023)
Lessons Learned: Koordination im Katastrophenmanagement.
doi: 10.5281/zenodo.7756274
Report
Kreutz, Thomas ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2023)
Unsupervised 4D LiDAR Moving Object Segmentation in Stationary Settings with Multivariate Occupancy Time Series.
2023 IEEE/CVF Winter Conference on Applications of Computer Vision. Hawaii, USA (03.-07.01.2023)
Conference or Workshop Item
Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2023)
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
Mensch und Computer 2019. Hamburg, Germany (8.-11.9.2019)
doi: 10.26083/tuprints-00022195
Conference or Workshop Item, Secondary publication, Publisher's Version
Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar (2023)
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Mensch und Computer 2018. Dresden, Germany (02.-05.09.2018)
doi: 10.26083/tuprints-00022204
Conference or Workshop Item, Secondary publication, Publisher's Version
Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2023)
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Mensch und Computer 2018. Dresden, Germany (02.-05.09.2018)
doi: 10.26083/tuprints-00022210
Conference or Workshop Item, Secondary publication, Publisher's Version
Knodt, Michèle ; Stöckl, Anna ; Steinke, Florian ; Pietsch, Martin ; Hornun, Gerrit ; Stroscher, Jan-Philipp (2023)
Power blackout: Citizens’ contribution to strengthen urban resilience.
In: Energy Policy, 174
doi: 10.1016/j.enpol.2023.113433
Article
Knodt, Michèle ; Bock, Carolin ; Stöckl, Anna ; Kurz, Konstantin (2022)
A friend in need is a friend indeed? Analysis of willingness to share self-produced electricity during a long-lasting power outage.
In: Schmalenbach Journal of Business Research, 74 (4)
doi: 10.1007/s41471-022-00148-6
Article
Kreutz, Thomas ; Esbel, Ousama ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Unsupervised Driving Event Discovery Based on Vehicle CAN-data.
25th International Conference on Intelligent Transportation Systems. Macau, Peoples Republik of China (08.-12.10.2022)
doi: 10.1109/ITSC55140.2022.9922158
Conference or Workshop Item
Kemkemer-Böhmer, Julia ; Rudolph-Cleff, Annette (2022)
Zwischen Stadt und Land. Für eine neue Generation von Kulturlandschaften und Landschaftsräumen.
In: Die Architekt, 2022 (5)
Article
Koka, Taulant ; Muma, Michael (2022)
Fast and Sample Accurate R-Peak Detection for Noisy ECG Using Visibility Graphs.
44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society. Glasgow, United Kingdom (11.-15.07.2022)
doi: 10.1109/EMBC48229.2022.9871266
Conference or Workshop Item
Kurz, Konstantin ; Bock, Carolin ; Hanschur, Leonard (2022)
Hope this E-Mail finds you well – How empathic entrepreneurs succeed during times of adversity.
JPIM Research Forum 2022. virtual Conference (13.1.-15.1.2022)
Conference or Workshop Item
Kaufhold, Marc-André ; Reuter, Christian (2022)
Integration von Flow in die Mensch-Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Wissenschaft trifft Praxis, (6)
doi: 10.26083/tuprints-00020908
Article, Secondary publication, Publisher's Version
Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2022)
Business Continuity Management in Micro Enterprises: Perception, Strategies, and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management, 10 (1)
doi: 10.26083/tuprints-00022313
Article, Secondary publication, Publisher's Version
Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2022)
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
26th European Conference on Information Systems (ECIS 2018). Portsmouth, UK (23.-28.06.2018)
doi: 10.26083/tuprints-00020741
Conference or Workshop Item, Secondary publication, Publisher's Version
Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2022)
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
14. Internationale Tagung Wirtschaftsinformatik (WI 2019). Siegen (23.-27.2.2019)
doi: 10.26083/tuprints-00020749
Conference or Workshop Item, Secondary publication, Publisher's Version
Kurz, Konstantin ; Bock, Carolin ; Knodt, Michèle ; Stöckl, Anna (2022)
A Friend in Need Is a Friend Indeed? Analysis of the Willingness to Share Self-Produced Electricity During a Long-lasting Power Outage.
In: Schmalenbach Journal of Business Research, 74 (4)
doi: 10.1007/s41471-022-00148-6
Article
Kiekenap, Kilian ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2021)
Energy-Optimal Short Packet Transmission for Time-Critical Control.
94th Vehicular Technology Conference (VTC2021-Fall). virtual Conference (27.-30.09.2021)
doi: 10.1109/VTC2021-Fall52928.2021.9625205
Conference or Workshop Item
Knauf, Alice ; Knodt, Michèle (2021)
Krisenfest durch dunkle Zeiten - Wie resilient sind deutsche Großstädte gegenüber
Stromausfällen?
doi: 10.5281/zenodo.5082350
Report
Knodt, Michèle ; Knauf, Alice (2021)
Krisenfest durch dunkle Zeiten: Wie resilient sind deutsche Großsstädte gegenüber Stromausfällen?
Report
Kaufhold, Marc-André (2021)
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps.
Book
Knauf, Alice (2021)
Wie vorbereitet sind deutsche Großstädte auf einen Blackout?
In: Bevölkerungsschutz : Magazin für Zivil- und Katastrophenschutz, 2021 (1)
Article
Kiekenap, Kilian ; Klein, Anja (2021)
Optimum Sensor Value Transmission Scheduling for Linear Wireless Networked Control Systems.
92nd Vehicular Technology Conference. virtual Conference (18.11.-16.12.2020)
doi: 10.1109/VTC2020-Fall49728.2020.9348559
Conference or Workshop Item
Kurz, Konstantin ; Bock, Carolin ; Hanschur, Leonard (2021)
Hope this E-Mail finds you well : How empathic Entrepreneurs succeed during Times of Adversity.
Event: 7th Entrepreneurship Research workshop for young scholars. virtual Workshop (27.-28.05.2021)
Lecture
Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf (2021)
Resilience in Security and Crises through Adaptions and
Transitions.
INFORMATIK 2019 - INFORMATIK 2019 - 49. Jahrestagung der Gesellschaft für Informatik. Kassel, Germany (23.-26.09.2019)
doi: 10.26083/tuprints-00020061
Conference or Workshop Item, Secondary publication, Publisher's Version
Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon (2021)
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
INFORMATIK - Jahrestagung der Gesellschaft für Informatik (Informatik 2017). Chemnitz, Germany (25.-29.09.2017)
doi: 10.26083/tuprints-00020065
Conference or Workshop Item, Secondary publication, Publisher's Version
Kulyk, Oksana ; Gerber, Nina ; Hilt, Annika ; Volkamer, Melanie (2020)
Has the GDPR hype affected users’ reaction to cookie disclaimers?
In: Journal of Cybersecurity, 6 (1)
doi: 10.1093/cybsec/tyaa022
Article
Köhler, Mirko ; Eskandani, Nafise ; Margara, Alessandro ; Salvaneschi, Guido (2020)
ConSysT: Tunable, Safe Consistency Meets Object-Oriented Programming.
SPLASH '20: Conference on Systems, Programming, Languages, and Applications, Software for Humanity. virtual Conference (23.07.2020)
doi: 10.1145/3427761.3428346
Conference or Workshop Item
Köhler, Mirko ; Eskandani, Nafise ; Weisenburger, Pascal ; Margara, Alessandro ; Salvaneschi, Guido (2020)
Rethinking Safe Consistency in Distributed Object-Oriented Programming.
In: Proceedings of the ACM on Programming Languages, 4 (OOPSLA)
doi: 10.1145/3428256
Article
Kirchner, Jan ; Reuter, Christian (2020)
Countering Fake News: A Comparison of Possible Solutions Regarding User Acceptance and Effectiveness.
In: Proceedings of the ACM on Human-Computer Interaction PACMHCI, 4 (CSCW2)
doi: 10.1145/3415211
Article
Knauf, Alice (2020)
Urbane Resilienz gegenüber Stromausfällen in deutschen Großstädten.
doi: 10.1007/978-3-658-31254-1
Book
Kaufhold, Marc-André ; Haunschild, Jasmin ; Reuter, Christian (2020)
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
28th European Conference on Information Systems. Marrakech, Morocco (15.-17.06.2020)
Conference or Workshop Item
Knauf, Alice (2020)
Urbane Resilienz gegenüber einem langanhaltenden, überregionalen Stromausfall. Eine Qualitative Comparative Analysis zur Bestimmung der Bedingungen für ein hohes Aktivitätsniveau der Katastrophenschutzämter deutscher Großtstädte.
Technical University of Darmstadt
Ph.D. Thesis
Kaufhold, Marc-André ; Bayer, Markus ; Reuter, Christian (2020)
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, 57 (1)
doi: 10.1016/j.ipm.2019.102132
Article
Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020)
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium. Boston, USA (August 12–14, 2020)
Conference or Workshop Item
Kaufhold, Marc-André (2020)
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis.
Technische Universität
Ph.D. Thesis
Krämer, Juliane ; Marzougui, Soundes (2019)
Post-Quantum Cryptography in Embedded Systems.
14th International Conference on Availability, Reliability and Security. Canterbury, United Kingdom (26.-29.08.2019)
doi: 10.1145/3339252.3341475
Conference or Workshop Item
Köhler, Mirco ; Salvaneschi, Guido (2019)
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering. San Diego, Ca, USA (November 10.-15.,2019)
doi: 10.1109/ASE.2019.00082
Conference or Workshop Item
Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019)
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
Mensch und Computer 2019. Hamburg, Germany (08.-11.09.2019)
doi: 10.18420/muc2019-ws-133-04
Conference or Workshop Item
Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf
ed.: David, Klaus (2019)
Resilience in Security and Crises through Adaptions and Transitions.
49. Jahrestagung der Gesellschaft für Informatik. Kassel, Germany (23.-26. September 2019)
doi: 10.18420/inf2019_ws60
Conference or Workshop Item
Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019)
Mobile Private Contact Discovery at Scale.
28. USENIX Security Symposium (USENIX Security'19).
Conference or Workshop Item
Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019)
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
Article
Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019)
Web Application for Privacy-Preserving Scheduling using Secure Computation.
Conference or Workshop Item
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019)
A Practical Attestation Protocol for Autonomous Embedded Systems.
4th IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm, Sweden (17-19 June 2019)
Conference or Workshop Item
Kohnhäuser, Florian (2019)
Advanced Remote Attestation Protocols for Embedded Systems.
Technische Universität
Ph.D. Thesis, Primary publication
Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019)
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
IEEE Workshop on the Internet of Safe Things. San Francisco, California, USA (23rd May 2019)
Conference or Workshop Item
Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019)
Mitigating information overload in social media during conflicts and crises: design and evaluation of a cross-platform alerting system.
In: Behaviour & Information Technology (BIT), 38 (3)
doi: 10.1080/0144929X.2019.1620334
Article
Krämer, Juliane ; Loiero, Mirjam (2019)
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019). Darmstadt, Germany (03.-05.04.)
Conference or Workshop Item
Kaufhold, Marc-André ; Reuter, Christian
ed.: Reuter, Christian (2019)
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_17
Book Section
Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019)
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI
Article
Kaufhold, Marc-André ; Reuter, Christian
ed.: Reuter, Christian (2019)
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.-27.9.2019)
Conference or Workshop Item
Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019)
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (24.-27.02.2019)
Conference or Workshop Item
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
Kryptotag29: 29. Krypto-Tag @ Bosch. Renningen, Germany (06.-07.09.2018)
doi: 10.18420/cdm-2018-29-24
Conference or Workshop Item
Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; Radziewski, Elmar von
eds.: Dachselt, Raimund ; Weber, Gerhard (2018)
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Mensch und Computer 2018. Dresden, Germany (02.-05.09.2018)
doi: 10.18420/muc2018-ws12-0453
Conference or Workshop Item
Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018)
Web Application for Privacy-Preserving Scheduling (Poster).
27. USENIX Security Symposium: USENIX Security'18 : Poster Session. Baltimore, MD, USA (August 15–17, 2018)
Conference or Workshop Item
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018)
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
Incheon, Republic of Korea
doi: 10.1145/3196494.3196544
Conference or Workshop Item
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. Toronto, Canada (15.10.2018)
doi: 10.1145/3267323.3268963
Conference or Workshop Item
Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2018)
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Mensch und Computer 2018. Dresden, Germany (02.-05.09.2018)
doi: 10.18420/muc2018-mci-0356
Conference or Workshop Item
Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018)
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1)
doi: 10.4018/IJISCRAM.2018010101
Article
Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2018)
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
26th European Conference on Information Systems. Portsmouth, United Kingdom (23.-28.06.2018)
Conference or Workshop Item
Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018)
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), 27 (3)
doi: 10.1111/1468-5973.12249
Article
Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017)
CogniCrypt: Supporting Developers in using Cryptography.
Piscataway, NJ, USA
doi: 10.1109/ASE.2017.8115707
Conference or Workshop Item
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2017)
Coercion resistant proxy voting.
In: Computers & Security, 71
doi: 10.1016/j.cose.2017.06.007
Article
Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd (2017)
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
Singapore
Conference or Workshop Item
Kornhuber, Tim (2017)
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Technische Universität
Bachelor Thesis
Kümpel, Michael (2017)
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Technische Universität
Bachelor Thesis