Items in division
- TU Darmstadt (106997)
Article
Putz, Florentin ; Haesler, Steffen ; Hollick, Matthias (2024)
Sounds Good? Fast and Secure Contact Exchange in Groups.
In: Proceedings of the ACM on Human-Computer Interaction, 8 (CSCW2)
doi: 10.1145/3686964
Article, Bibliographie
Liu, Jing ; Zheng, Jing ; Zhang, Jing ; Xiang, Lin ; Ng, Derrick Wing Kwan ; Ge, Xiaohu (2024)
Delay-Aware Online Resource Allocation for Buffer-Aided Synchronous Federated Learning Over Wireless Networks.
In: IEEE Access, 12
doi: 10.1109/ACCESS.2024.3489657
Article, Bibliographie
Zhang, Xuzhong ; Xiang, Lin ; Wang, Jiaheng ; Gao, Xiqi (2024)
Massive MIMO Multicasting with Finite Block-length.
In: IEEE Transactions on Wireless Communications, 23 (10)
doi: 10.1109/TWC.2024.3423310
Article, Bibliographie
Garkisch, Moritz ; Lotter, Sebastian ; Zhou, Gui ; Jamali, Vahid ; Schober, Robert (2024)
User Tracking and Direction Estimation Codebook Design for IRS-Assisted mmWave Communication.
In: IEEE Transactions on Wireless Communications
doi: 10.1109/TWC.2024.3463211
Article, Bibliographie
Schroth, Christian A. ; Eckrich, Christian ; Kakouche, Ibrahim ; Fabian, Stefan ; Stryk, Oskar von ; Zoubir, Abdelhak M. ; Muma, Michael (2024)
Emergency Response Person Localization and Vital Sign Estimation Using a Semi-Autonomous Robot Mounted SFCW Radar.
In: IEEE Transactions on Biomedical Engineering, 71 (6)
doi: 10.1109/TBME.2024.3350789
Article, Bibliographie
Kurz, Konstantin ; Bock, Carolin ; Hanschur, Leonard (2024)
Flip the tweet - the two-sided coin of entrepreneurial empathy and its ambiguous influence on new product development.
In: Journal of Business Venturing, 39 (2)
doi: 10.1016/j.jbusvent.2023.106378
Article, Bibliographie
Ajam, Hedieh ; Najafi, Marzieh ; Jamali, Vahid ; Schober, Robert (2024)
Optical IRSs: Power Scaling Law, Optimal Deployment, and Comparison With Relays.
In: IEEE Transactions on Communications, 72 (2)
doi: 10.1109/TCOMM.2023.3327464
Article, Bibliographie
Salariseddigh, Mohammad Javad ; Jamali, Vahid ; Pereg, Uzi ; Boche, Holger ; Deppe, Christian ; Schober, Robert (2024)
Deterministic K-Identification for MC Poisson Channel With Inter-Symbol Interference.
In: IEEE Open Journal of the Communications Society, 5
doi: 10.1109/OJCOMS.2024.3359186
Article, Bibliographie
Mora, Edwin ; Steinke, Florian (2024)
Admissible Control Laws for Constrained Linear Power Flow: The General Case.
In: IEEE Transactions on Power Systems, 39 (1)
doi: 10.1109/TPWRS.2023.3263365
Article, Bibliographie
Zarembo, Kateryna ; Knodt, Michèle ; Kachel, Jannis (2024)
Smartphone resilience: ICT in Ukrainian civic response to the Russian full-scale invasion.
In: Media, War & Conflict
doi: 10.1177/17506352241236449
Article, Bibliographie
Taştan, A. ; Muma, Michael ; Zoubir, A. M. (2023)
Fast and Robust Sparsity-Aware Block Diagonal Representation.
In: IEEE Transactions on Signal Processing, 72
doi: 10.1109/TSP.2023.3343565
Article, Bibliographie
Tundis, Andrea ; Shams, Ahmed Ali ; Mühlhäuser, Max (2023)
From the detection towards a pyramidal classification of terrorist propaganda.
In: Journal of Information Security and Applications, 79
doi: 10.1016/j.jisa.2023.103646
Article, Bibliographie
Leštáková, Michaela ; Logan, Kevin ; Rehm, Imke-Sophie ; Pelz, Peter F. ; Friesen, John (2023)
Do resilience metrics of water distribution systems really assess resilience? A critical review.
In: Water Research, 248
doi: 10.1016/j.watres.2023.120820
Article, Bibliographie
Theodoridis, Theodoros M. ; Tegos, Sotiris A. ; Diamantoulakis, Panagiotis D. ; Jamali, Vahid ; Karagiannidis, George K. (2023)
Glucose Regulation Through Cooperative Molecular Communication.
In: IEEE Communications Letters, 27 (11)
doi: 10.1109/LCOMM.2023.3315012
Article, Bibliographie
Schmid, Stefka ; Guntrum, Laura Gianna ; Haesler, Steffen ; Schultheiß, Lisa ; Reuter, Christian (2023)
Digital Volunteers during the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience.
In: Weizenbaum Journal of the Digital Society, 3 (3)
doi: 10.34669/WI.WJDS/3.3.6
Article, Bibliographie
Salariseddigh, Mohammad Javad ; Jamali, Vahid ; Pereg, Uzi ; Boche, Holger ; Deppe, Christian ; Schober, Robert (2023)
Deterministic Identification for Molecular Communications Over the Poisson Channel.
In: IEEE Transactions on Molecular, Biological and Multi-Scale Communications, 9 (4)
doi: 10.1109/TMBMC.2023.3324487
Article, Bibliographie
Lotter, Sebastian ; Brand, Lukas ; Jamali, Vahid ; Schäfer, Maximilian ; Loos, Helene M. ; Unterweger, Harald ; Greiner, Sandra ; Kirchner, Jens ; Alexiou, Christoph ; Drummer, Dietmar ; Fischer, Georg ; Buettner, Andrea ; Schober, Robert (2023)
Experimental Research in Synthetic Molecular Communications – Part I.
In: IEEE Nanotechnology Magazine, 17 (3)
doi: 10.1109/MNANO.2023.3262100
Article, Bibliographie
Santos, Allan ; Steinke, Florian (2023)
Robust Placement and Control of Phase-Shifting Transformers Considering Redispatch Measures.
In: Energies, 16 (11)
doi: 10.3390/en16114438
Article, Bibliographie
Santos, Allan ; Rizk, Amr ; Steinke, Florian (2023)
Adaptive Global Coordination of Local Routing Policies for Communication Networks.
In: Computer Communications, 204
doi: 10.1016/j.comcom.2023.03.027
Article, Bibliographie
Lotter, Sebastian ; Brand, Lukas ; Jamali, Vahid ; Schäfer, Maximilian ; Loos, Helene M. ; Unterweger, Harald ; Greiner, Sandra ; Kirchner, Jens ; Alexiou, Christoph ; Drummer, Dietmar ; Fischer, Georg ; Buettner, Andrea ; Schober, Robert (2023)
Experimental Research in Synthetic Molecular Communications - Part II.
In: IEEE Nanotechnology Magazine, 17 (3)
doi: 10.1109/MNANO.2023.3262377
Article, Bibliographie
Eskandani, Nafise ; Salvaneschi, Guido (2023)
The Uphill Journey of FaaS in the Open-Source Community.
In: Journal of Systems and Software, 198
doi: 10.1016/j.jss.2022.111589
Article, Bibliographie
Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian (2023)
Preparedness nudging for warning apps? A mixed-method study investigating popularity and effects of preparedness alerts in warning apps.
In: International Journal of Human-Computer Studies, 172
doi: 10.1016/j.ijhcs.2023.102995
Article, Bibliographie
Jamali, Vahid ; Loos, Helene M. ; Buettner, Andreas ; Schober, Robert ; Poor, H. Vincent (2023)
Olfaction-Inspired MCs: Molecule Mixture Shift Keying and Cross-Reactive Receptor Arrays.
In: IEEE Transactions on Communications, 71 (4)
doi: 10.1109/TCOMM.2023.3242379
Article, Bibliographie
Platzer, Eva ; Knodt, Michèle (2023)
Krisenmanagement im Ahrtal 2021.
In: Transforming Cities, 8 (1)
Article, Bibliographie
Knodt, Michèle ; Stöckl, Anna ; Steinke, Florian ; Pietsch, Martin ; Hornung, Gerrit ; Stroscher, Jan-Philipp (2023)
Power blackout: Citizens’ contribution to strengthen urban resilience.
In: Energy Policy, 174
doi: 10.1016/j.enpol.2023.113433
Article, Bibliographie
Cao, Trang Ngoc ; Jamali, Vahid ; Wicke, Wayan ; Zlatanov, Nikola ; Yeoh, Phee Lep ; Evans, Jamie ; Schober, Robert (2023)
Chemical Reactions-Based Detection Mechanism for Molecular Communications.
In: IEEE Transactions on Molecular, Biological and Multi-Scale Communications, 9 (1)
doi: 10.1109/TMBMC.2023.3244649
Article, Bibliographie
Sattler, Bernhard Jonathan ; Friesen, John ; Tundis, Andrea ; Pelz, Peter F. (2023)
Modeling and Validation of Residential Water Demand in Agent-Based Models: A Systematic Literature Review.
In: Water, 15 (3)
doi: 10.3390/w15030579
Article, Bibliographie
Ghanem, Walid R. ; Jamali, Vahid ; Schellmann, Malte ; Cao, Hanwen ; Eichinger, Joseph ; Schober, Robert (2023)
Optimization-Based Phase-Shift Codebook Design for Large IRSs.
In: IEEE Communications Letters, 27 (2)
doi: 10.1109/LCOMM.2022.3225585
Article, Bibliographie
Pietsch, Martin ; Knodt, Michèle ; Hornung, Gerrit ; Stroscher, Jan-Philipp ; Steinke, Florian ; Stöckl, Anna (2023)
Power blackout: Citizens’ contribution to strengthen local resilience.
In: Elsevier
doi: 10.1016/j.enpol.2023.113433
Article, Bibliographie
Ye, Junliang ; Xiang, Lin ; Ge, Xiaohu (2023)
Spatial-Temporal Modeling and Analysis of Reliability and Delay in Urban V2X Networks.
In: IEEE Transactions on Network Science and Engineering, (Early Access)
doi: 10.1109/TNSE.2023.3234284
Article, Bibliographie
Fabian, C. ; Cui, K. ; Koeppl, H. (2023)
Mean Field Games on Weighted and Directed Graphs via Colored Digraphons.
In: IEEE Control Systems Letters, 7
doi: 10.1109/LCSYS.2022.3227453
Article, Bibliographie
Zarembo, Kateryna ; Martin, Eric (2023)
Civil society and sense of community in Ukraine: from dormancy to action.
In: European Societies, 2023
doi: 10.1080/14616696.2023.2185652
Article, Bibliographie
Knodt, Michèle ; Ringel, Marc (2023)
Energiesicherheit-Nachhaltigkeit-Nexus in Zeiten des Krieges: Krisengesteuerte Notfallmaßnahmen für den Green Deal?
In: integration, (3)
doi: 10.5771/0720-5120-2023-3-282
Article, Bibliographie
Platzer, Eva Katharina ; Knodt, Michèle (2023)
Resilience beyond insurance: coordination in crisis governance.
In: Environment Systems and Decisions
doi: 10.1007/s10669-023-09938-7
Article, Bibliographie
Muttach, Jan-Philipp ; Link, Hendrik (2023)
Verarbeitung personenbezogener Daten in KI-Reallaboren nach dem KI-VO-E – Eine Herausforderung für den datenschutzrechtlichen Zweckbindungsgrundsatz.
In: Computer und Recht
Article, Bibliographie
Muttach, Jan-Philipp ; Jacobi, Rosa (2023)
EU-Kommission: Verordnungsentwurf für ein interoperables Europa.
In: ZD-Aktuell, 13 (21)
Article, Bibliographie
Sterz, Artur ; Klose, Robin ; Sommer, Markus ; Höchst, Jonas ; Link, Jakob ; Simon, Bernd ; Klein, Anja ; Hollick, Matthias ; Freisleben, Bernd (2023)
Energy-Efficient Decentralized Broadcasting in Wireless Multi-Hop Networks.
In: Sensors, 23 (17)
doi: 10.3390/s23177419
Article, Bibliographie
Engels, Jens Ivo (2023)
Infrastruktursysteme: Wenn alles verbunden und verwoben ist.
In: Der Gemeinderat, 2023 (2)
Article, Bibliographie
Hünemohr, David ; Bauer, Maximilian ; Kleikemper, Jan ; Peukert, Markus (2022)
Analysis of Helicopter Flights in Urban Environments for UAV Traffic Management.
In: Engineering Proceedings, 28
doi: 10.3390/engproc2022028010
Article, Bibliographie
Knodt, Michèle ; Bock, Carolin ; Stöckl, Anna ; Kurz, Konstantin (2022)
A friend in need is a friend indeed? Analysis of willingness to share self-produced electricity during a long-lasting power outage.
In: Schmalenbach Journal of Business Research, 74 (4)
doi: 10.1007/s41471-022-00148-6
Article, Bibliographie
Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022)
Hypergraphon mean field games.
In: Chaos: An Interdisciplinary Journal of Nonlinear Science, 32 (11)
doi: 10.1063/5.0093758
Article, Bibliographie
Pietsch, Martin ; Steinke, Florian (2022)
The water energy nexus: Improved emergency grid restoration with DERs.
In: Electric Power Systems Research, 212
doi: 10.1016/j.epsr.2022.108468
Article, Bibliographie
Kemkemer-Böhmer, Julia ; Rudolph-Cleff, Annette (2022)
Zwischen Stadt und Land. Für eine neue Generation von Kulturlandschaften und Landschaftsräumen.
In: Die Architekt, 2022 (5)
Article, Bibliographie
Schmidt, Max ; Kirchhoff, Jérôme ; Stryk, Oskar von (2022)
A Modular and Portable Black Box Recorder for Increased Transparency of Autonomous Service Robots.
In: IEEE Robotics and Automation Letters, 7 (4)
doi: 10.1109/LRA.2022.3193633
Article, Bibliographie
Sanchez Guinea, Alejandro ; Heinrich, Simon ; Mühlhäuser, Max (2022)
Activity-Free User Identification Using Wearables Based on Vision Techniques.
In: Sensors, 22 (19)
doi: 10.3390/s22197368
Article, Bibliographie
Siebeneicher, Sven ; Yenice, Ilker ; Bock, Carolin (2022)
Financial-Return Crowdfunding for Energy and Sustainability in the German-Speaking Realm.
In: Sustainability, 14 (19)
doi: 10.3390/su141912239
Article, Bibliographie
Hessel, Frank ; Almon, Lars ; Hollick, Matthias (2022)
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation.
In: ACM Transactions on Sensor Networks
doi: 10.1145/3561973
Article, Bibliographie
Sterz, Artur ; Felka, Patrick ; Simon, Bernd ; Klos, Sabrina ; Klein, Anja ; Hinz, Oliver ; Freisleben, Bernd (2022)
Multi-Stakeholder Service Placement via Iterative Bargaining With Incomplete Information.
In: IEEE/ACM Transactions on Networking, 30 (4)
doi: 10.1109/TNET.2022.3157040
Article, Bibliographie
Hornung, Gerrit ; Schomberg, Sabrina (2022)
Datensouveränität im Spannungsfeld zwischen Datenschutz und Datennutzung: das Beispiel des Data Governance Acts.
In: Computer und Recht, 38 (8)
doi: 10.9785/cr-2022-380810
Article, Bibliographie
Bock, Carolin ; Kurz, Konstantin (2022)
Flip the Tweet - The Two-Sided Coin of Entrepreneurial Empathy.
In: Academy of Management Proceedings, 2022 (1)
doi: 10.5465/AMBPP.2022.14076abstract
Article, Bibliographie
Siebeneicher, Sven ; Bock, Carolin (2022)
Sustainable aim or personal gain? Effects of Personal and Sustainable Value on Crowdfunding Success.
In: Academy of Management proceedings, 22 (1)
doi: 10.5465/AMBPP.2022.14306abstract
Article, Bibliographie
Mauricio, Weskley V. F. ; Maciel, Tarcisio Ferreira ; Klein, Anja ; Marques Lima, Francisco Rafael (2022)
Scheduling for Massive MIMO with Hybrid Precoding using Contextual Multi-Armed Bandits.
In: IEEE Transactions on Vehicular Technology, 71 (7)
doi: 10.1109/TVT.2022.3166654
Article, Bibliographie
Böck, Leon ; Fejrskov, Martin ; Demetzou, Katerina ; Karuppayah, Shankar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2022)
Processing of botnet tracking data under the GDPR.
In: Computer law & security review, 45
doi: 10.1016/j.clsr.2021.105652
Article, Bibliographie
Hornung, Gerrit ; Söllner, Matthias ; Stroscher, Jan-Philipp ; Zahn, Eva-Maria (2022)
Kollaboration im Datenschutz: Collaboration Engineering als Instrument zur partizipativen und nachhaltigen Gestaltung von Datenschutzprozessen.
In: Datenschutz und Datensicherheit, 46 (6)
doi: 10.1007/s11623-022-1625-4
Article, Bibliographie
Geigle, Gregor ; Pfeiffer, Jonas ; Reimers, Nils ; Vulić, Ivan ; Gurevych, Iryna (2022)
Retrieve Fast, Rerank Smart: Cooperative and Joint Approaches for Improved Cross-Modal Retrieval.
In: Transactions of the Association for Computational Linguistics, 10
doi: 10.1162/tacl_a_00473
Article, Bibliographie
Li, Zipeng ; Xiang, Lin ; Ge, Xiaohu (2022)
Age of Information Modeling and Optimization for Fast Information Dissemination in Vehicular Social Networks.
In: IEEE Transactions on Vehicular Technology, 71 (5)
doi: 10.1109/TVT.2022.3154766
Article, Bibliographie
Himmel, Andreas ; Findeisen, Rolf ; Sundmacher, Kai (2022)
Closed-loop real-time optimization for unsteady operating production systems.
In: Journal of Process Control, 113
doi: 10.1016/j.jprocont.2022.03.002
Article, Bibliographie
Rudolph-Cleff, Annette ; Knodt, Michèle ; Schulze, Joachim ; Engel, Alice (2022)
Crisis communication in a blackout scenario - An assessment considering socio-spatial parameters and the vulnerabilities of the population.
In: International Journal of Disaster Risk Reduction, 72
doi: 10.1016/j.ijdrr.2022.102856
Article, Bibliographie
Cui, Kai ; KhudaBukhsh, Wasiur R. ; Koeppl, Heinz (2022)
Motif-based mean-field approximation of interacting particles on clustered networks.
In: Phys. Rev. E, 105
doi: 10.1103/PhysRevE.105.L042301
Article, Bibliographie
Tundis, Andrea ; Ruppert, Samuel ; Mühlhäuser, Max (2022)
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources.
In: Computers & Security, 113
doi: 10.1016/j.cose.2021.102576
Article, Bibliographie
Sanchez Guinea, Alejandro ; Sarabchian, Mehran ; Mühlhäuser, Max (2022)
Improving Wearable-Based Activity Recognition Using Image Representations.
In: Sensors, 22 (5)
doi: 10.3390/s22051840
Article, Bibliographie
Kurz, Konstantin ; Bock, Carolin ; Knodt, Michèle ; Stöckl, Anna (2022)
A Friend in Need Is a Friend Indeed? Analysis of the Willingness to Share Self-Produced Electricity During a Long-lasting Power Outage.
In: Schmalenbach Journal of Business Research, 74 (4)
doi: 10.1007/s41471-022-00148-6
Article, Bibliographie
Gazzari, Matthias ; Mattmann, Annemarie ; Maass, Max ; Hollick, Matthias (2021)
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5 (4)
doi: 10.1145/3494986
Article, Bibliographie
Tundis, Andrea ; Melnik, Maksim ; Naveed, Hashim ; Mühlhäuser, Max (2021)
A social media-based over layer on the edge for handling emergency-related events.
In: Computers & Electrical Engineering, 96 (Part B)
doi: 10.1016/j.compeleceng.2021.107570
Article, Bibliographie
Tundis, Andrea ; Uzair, Muhammad ; Mühlhäuser, Max (2021)
An IoT-based context-aware model for danger situations detection.
In: Computers & Electrical Engineering, 96 (Part B)
doi: 10.1016/j.compeleceng.2021.107571
Article, Bibliographie
Fraune, Cornelia ; Engel, Alice ; Knodt, Michèle (2021)
Local governance of critical infrastructure resilience: A survey of leadership, planning, and positive coordination in German cities.
In: Journal of Contingencies and Crisis Management (JCCM), (Early Access)
doi: 10.1111/1468-5973.12386
Article, Bibliographie
Götte, Jan Sebastian ; Scheuermann, Björn (2021)
Can’t Touch This: Inertial HSMs Thwart Advanced Physical Attacks.
In: Transactions on Cryptographic Hardware and Embedded Systems, 2022 (1)
doi: 10.46586/tches.v2022.i1.69-93
Article, Bibliographie
Haesler, Steffen ; Schmid, Stefka ; Vierneisel, Annemike Sophia ; Reuter, Christian (2021)
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic.
In: Proceedings of the ACM on Human Computer Interaction, 5 (CSCW2)
doi: 10.1145/3476045
Article, Bibliographie
Taştan, A. ; Muma, M. ; Zoubir, A. M. (2021)
Sparsity-aware Robust Community Detection (SPARCODE).
In: Signal Processing, 187
doi: 10.1016/j.sigpro.2021.108147
Article, Bibliographie
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2)
doi: 10.1515/icom-2021-0021
Article, Bibliographie
Rehm, Imke-Sophie ; Friesen, John ; Pouls, Kevin ; Busch, Christoph ; Taubenböck, Hannes ; Pelz, Peter F. (2021)
A Method for Modeling Urban Water Infrastructures Combining Geo-Referenced Data.
In: Water, 13 (16)
doi: 10.3390/w13162299
Article, Bibliographie
Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2021)
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD : Praxis der Wirtschaftsinformatik, 58 (5)
doi: 10.1365/s40702-021-00770-8
Article, Bibliographie
Hornung, Gerrit ; Stroscher, Jan-Philipp (2021)
Datenschutz in der Katastrophe.
In: Zeitschrift für das gesamte Sicherheitsrecht (GSZ), 4 (4)
Article, Bibliographie
Logan, Kevin ; Lestakova, Michaela ; Thiessen, Nadja ; Engels, Jens Ivo ; Pelz, Peter F. (2021)
Water Distribution in a Socio-Technical System: Resilience Assessment for Critical Events Causing Demand Relocation.
In: Water, 13 (15)
doi: 10.3390/w13152062
Article, Bibliographie
Zhang, Jing ; Zhang, Yanxia ; Xiang, Lin ; Sun, Yan ; Ng, Derrick Wing Kwan ; Jo, Minho (2021)
Robust Energy-Efficient Transmission for Wireless-Powered D2D Communication Networks.
In: IEEE Transactions on Vehicular Technology, 70 (8)
doi: 10.1109/TVT.2021.3095626
Article, Bibliographie
Schroth, C. A. ; Muma, M. (2021)
Real Elliptically Skewed Distributions and Their Application to Robust Cluster Analysis.
In: IEEE Transactions on Signal Processing, 69
doi: 10.1109/TSP.2021.3092373
Article, Bibliographie
Teklehaymanot, F. K. ; Muma, M. ; Zoubir, A. M. (2021)
Robust Bayesian Cluster Enumeration Based on the t Distribution.
In: Signal Processing, 182
doi: 10.1016/j.sigpro.2020.107870
Article, Bibliographie
Muma, M. ; Ollila, E. ; Pascal, F. (2021)
Special issue on statistical signal processing solutions and advances for data science: Complex, dynamic and large-scale settings.
In: Signal Processing, 182
doi: 10.1016/j.sigpro.2020.107892
Article, Bibliographie
Schroth, C. A. ; Muma, M. (2021)
Robust M-Estimation Based Bayesian Cluster Enumeration for Real Elliptically Symmetric Distributions.
In: IEEE Transactions on Signal Processing, 69
doi: 10.1109/TSP.2021.3072482
Article, Bibliographie
Saha, Swetank Kumar ; Assasa, Hany ; Loch, Adrian ; Prakash, Naveen Muralidhar ; Shyamsunder, Roshan ; Aggarwal, Shivang ; Steinmetzer, Daniel ; Koutsonikolas, Dimitrios ; Widmer, Joerg ; Hollick, Matthias (2021)
Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware.
In: IEEE Transactions on Mobile Computing, 20 (4)
doi: 10.1109/TMC.2020.2967386
Article, Bibliographie
Knauf, Alice (2021)
Wie vorbereitet sind deutsche Großstädte auf einen Blackout?
In: Bevölkerungsschutz : Magazin für Zivil- und Katastrophenschutz, 2021 (1)
Article, Bibliographie
Ortiz Jimenez, Andrea Patricia ; Weber, Tobias ; Klein, Anja (2021)
Multi-Agent Reinforcement Learning for Energy Harvesting Two-Hop Communications With a Partially Observable System State.
In: IEEE Transactions on Green Communications and Networking, 5 (1)
doi: 10.1109/TGCN.2020.3026453
Article, Bibliographie
Huck, Andreas ; Monstadt, Jochen ; Driessen, Peter P. J. ; Rudolph‐Cleff, Annette (2021)
Towards Resilient Rotterdam? Key conditions for a networked approach to managing urban infrastructure risks.
In: Journal of Contingencies and Crisis Management (JCCM), 29 (1)
doi: 10.1111/1468-5973.12295
Article, Bibliographie
Rudolph-Cleff, Annette ; Schulze, Joachim ; Dighe, Chaitali (2021)
Segregation oder Teilhabe - Soziale und städtebauliche Folgen der Digitalisierung.
In: Der Architekt, 21 (1)
Article, Bibliographie
Engels, Jens Ivo (2021)
Resiliente Infrastrukturen – gibt es das überhaupt?
In: ABI Technik, 41 (1)
doi: 10.1515/abitech-2021-0010
Article, Bibliographie
Mora, Edwin ; Steinke, Florian (2021)
On the minimal set of controllers and sensors for linear power flow.
In: Electric Power Systems Research, 190
doi: 10.1016/j.epsr.2020.106647
Article, Bibliographie
Hassan, Sohaib S. ; Reuter, Christian ; Bzhalava, Levan (2021)
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs.
In: International Journal of Innovation Management, 25 (1)
doi: 10.1142/S136391962150002X
Article, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Kornhuber, Tim ; Hollick, Matthias (2021)
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3)
doi: 10.2478/popets-2021-0045
Article, Bibliographie
Hornung, Gerrit ; Stroscher, Jan-Philipp (2021)
Datenschutz in der Katastrophe. Zulässigkeitstatbestände und Vorgaben für die Datenverarbeitung zur Katastrophenvorsorge und -bekämpfung - Teil 2.
In: Zeitschrift für das gesamte Sicherheitsrecht (GSZ), 4 (5)
Article, Bibliographie
Kulyk, Oksana ; Gerber, Nina ; Hilt, Annika ; Volkamer, Melanie (2020)
Has the GDPR hype affected users’ reaction to cookie disclaimers?
In: Journal of Cybersecurity, 6 (1)
doi: 10.1093/cybsec/tyaa022
Article, Bibliographie
Abanto-Leon, Luis F. ; Bäuml, Andreas ; Sim, Gek Hong ; Hollick, Matthias ; Asadi, Arash (2020)
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints.
In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4 (3)
doi: 10.1145/3428329
Article, Bibliographie
Nikolopoulos, Georgios M. ; Fischlin, Marc (2020)
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
In: Cryptography, 4 (4)
doi: 10.3390/cryptography4040031
Article, Bibliographie
Stute, Milan ; Kohnhäuser, Florian ; Baumgärtner, Lars ; Almon, Lars ; Hollick, Matthias ; Katzenbeisser, Stefan ; Freisleben, Bernd (2020)
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies.
In: Transactions on Dependable and Secure Computing
doi: 10.1109/TDSC.2020.3036224
Article, Bibliographie
Köhler, Mirko ; Eskandani, Nafise ; Weisenburger, Pascal ; Margara, Alessandro ; Salvaneschi, Guido (2020)
Rethinking Safe Consistency in Distributed Object-Oriented Programming.
In: Proceedings of the ACM on Programming Languages, 4 (OOPSLA)
doi: 10.1145/3428256
Article, Bibliographie
Sterz, Artur ; Eichholz, Matthias ; Mogk, Ragnar ; Baumgärtner, Lars ; Graubner, Pablo ; Hollick, Matthias ; Mezini, Mira ; Freisleben, Bernd (2020)
ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices.
In: The Art, Science, and Engineering of Programming, 5 (2)
doi: 10.22152/programming-journal.org/2021/5/4
Article, Bibliographie
Mora, Edwin ; Steinke, Florian (2020)
Minimal Control of Constrained, Partially Controllable & Observable Linear Systems.
In: IFAC-PapersOnLine, 53 (2)
doi: 10.1016/j.ifacol.2020.12.469
Article, Bibliographie
Kirchner, Jan ; Reuter, Christian (2020)
Countering Fake News: A Comparison of Possible Solutions Regarding User Acceptance and Effectiveness.
In: Proceedings of the ACM on Human-Computer Interaction PACMHCI, 4 (CSCW2)
doi: 10.1145/3415211
Article, Bibliographie
Morgen, Andreas ; Glombiewski, Nikolaus ; Götze, Philipp ; Körber, Michael ; Seeger, Bernhard (2020)
Designing an Event Store for a Modern Three-layer Storage Hierarchy.
In: Datenbank-Spektrum, 20 (3)
doi: 10.1007/s13222-020-00356-6
Article, Bibliographie
Lorenz, Imke ; Pelz, Peter F. (2020)
Optimal Resilience Enhancement of Water Distribution Systems.
In: Water, 12 (9)
doi: 10.3390/w12092602
Article, Bibliographie
Salvaneschi, Guido ; Wirth, Johannes ; Weisenburger, Pascal (2020)
A survey of multitier programming.
In: ACM Computing Surveys, 53 (4)
doi: 10.1145/3397495
Article, Bibliographie
Machkour, J. ; Muma, M. ; Alt, B. ; Zoubir, A. M. (2020)
A Robust Adaptive Lasso Estimator for the Independent Contamination Model.
In: Signal Processing, 174
doi: 10.1016/j.sigpro.2020.107608
Article, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2020)
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1)
doi: 10.1145/3406112
Article, Bibliographie
Grube, Tim ; Heinrich, Alexander ; Stroscher, Jan-Philipp ; Schomberg, Sabrina (2020)
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8)
doi: 10.1007/s11623-020-1314-0
Article, Bibliographie
Stute, Milan ; Agarwal, Pranay ; Kumar, Abhinav ; Asadi, Arash ; Hollick, Matthias (2020)
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems.
In: IEEE Internet of Things Journal, 7 (8)
doi: 10.1109/JIOT.2020.2985044
Article, Bibliographie
Yuan, Dingwen ; Lin, Hsuan-Yin ; Hollick, Matthias ; Widmer, Jörg (2020)
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks.
In: IEEE/ACM Transactions on Networking, 28 (5)
doi: 10.1109/TNET.2020.3006312
Article, Bibliographie
Rudolph-Cleff, Annette ; Schulze, Joachim (2020)
Transformation der Städte - Zur Resilienz digitaler Städte in Krisensituationen.
In: Transforming Cities, 2020 (02)
Article, Bibliographie
Mühlhäuser, Max ; Meurisch, Christian ; Stein, Michael ; Daubert, Jörg ; Willich, Julius von ; Riemann, Jan ; Wang, Lin (2020)
Street Lamps as a Platform.
In: Communications of the ACM, 63 (6)
doi: 10.1145/3376900
Article, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Spahr, Fabian ; Spielhofer, Thomas ; Hahne, Anna Sophie (2020)
Emergency service staff and social media – A comparative empirical study of the attitude by Emergency Services staff in Europe in 2014 and 2017.
In: International Journal of Disaster Risk Reduction (IJDRR), 46
doi: 10.1016/j.ijdrr.2020.101516
Article, Bibliographie
Oehler, Martin ; Kohlbrecher, Stefan ; Stryk, Oskar von (2020)
Optimization-Based Planning for Autonomous Traversal of Obstacles with Mobile Ground Robots.
In: International Journal of Mechanics and Control, 21 (1)
Article, Bibliographie
Nieminen, Raine ; Järvinen, Kimmo (2020)
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing
doi: 10.1109/TMC.2020.2990871
Article, Bibliographie
Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Article, Bibliographie
Schürmann, Tim ; Gerber, Nina ; Gerber, Paul (2020)
Benefits of formalized computational modeling for understanding user behavior in online privacy research.
In: Journal of Intellectual Capital, 21 (3)
doi: 10.1108/JIC-05-2019-0126
Article, Bibliographie
Schneider, Thomas ; Treiber, Amos (2020)
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, 31 (3)
doi: 10.1109/TPDS.2019.2939313
Article, Bibliographie
Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2)
doi: 10.1109/MSEC.2019.2947124
Article, Bibliographie
Weisenburger, Pascal ; Salvaneschi, Guido (2020)
Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala.
In: The Art, Science, and Engineering of Programming, 4 (3)
doi: 10.22152/programming-journal.org/2020/4/17
Article, Bibliographie
Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020)
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020
doi: 10.1109/TC.2020.2972549
Article, Bibliographie
Engels, Jens Ivo (2020)
Infrastrukturen als Produkte und Produzenten von Zeit.
In: NTM-Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin, 28 (1)
doi: 10.1007/s00048-019-00234-7
Article, Bibliographie
Kaufhold, Marc-André ; Bayer, Markus ; Reuter, Christian (2020)
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, 57 (1)
doi: 10.1016/j.ipm.2019.102132
Article, Bibliographie
Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2020)
Social media in conflicts and crises.
In: Behaviour & Information Technology (BIT), 39 (3)
doi: 10.1080/0144929X.2019.1629025
Article, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2020)
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen.
In: BBK Bevölkerungsschutz, 2020 (2)
Article, Bibliographie
Sarimbekov, Aibek ; Moret, Philippe ; Binder, Walter ; Sewe, Andreas ; Mezini, Mira (2020)
Complete and Platform-Independent Calling Context Profiling for the Java Virtual Machine.
In: Electronic Notes in Theoretical Computer Science, 279 (1)
doi: 10.1016/j.entcs.2011.11.006
Article, Bibliographie
Stute, Milan ; Maass, Max ; Schons, Tom ; Kaufhold, Marc-André ; Reuter, Christian ; Hollick, Matthias (2020)
Empirical insights for designing Information and Communication Technology for International Disaster Response.
In: International Journal of Disaster Risk Reduction, 47
doi: 10.1016/j.ijdrr.2020.101598
Article, Bibliographie
Ortiz Jimenez, Andrea Patricia ; Asadi, Arash ; Sim, Gek Hong ; Steinmetzer, Daniel ; Hollick, Matthias (2019)
SCAROS: A Scalable and Robust Self-backhauling Solution for Highly Dynamic Millimeter-Wave Networks.
In: IEEE Journal on Selected Areas in Communications, 37 (12)
doi: 10.1109/JSAC.2019.2947925
Article, Bibliographie
Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019)
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58
doi: 10.1016/j.csl.2019.06.001
Article, Bibliographie
Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019)
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication
doi: 10.1016/j.specom.2019.09.004
Article, Bibliographie
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security
doi: 10.1049/iet-ifs.2019.0125
Article, Bibliographie
Ortiz Jimenez, Andrea Patricia ; Asadi, Arash ; Engelhardt, Max ; Hollick, Matthias ; Klein, Anja (2019)
CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems.
In: IEEE Journal on Selected Areas in Communications, 37 (10)
doi: 10.1109/JSAC.2019.2933764
Article, Bibliographie
Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019)
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
Article, Bibliographie
Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2019)
Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol.
In: GetMobile: Mobile Computing and Communications, 23 (1)
doi: 10.1145/3351422.3351432
Article, Bibliographie
Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019)
Mitigating information overload in social media during conflicts and crises: design and evaluation of a cross-platform alerting system.
In: Behaviour & Information Technology (BIT), 38 (3)
doi: 10.1080/0144929X.2019.1620334
Article, Bibliographie
Saeed, Saqib ; Pipek, Volkmar ; Rohde, Markus ; Reuter, Christian ; Pinatti de Carvalho, Aparecido Fabiano ; Wulf, Volker (2019)
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, 7
doi: 10.1109/ACCESS.2019.2916903
Article, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick (2019)
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 28
doi: 10.1007/s10606-018-9339-8
Article, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019)
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI
Article, Bibliographie
Riebe, Thea ; Reuter, Christian (2019)
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, 2019 (1)
Article, Bibliographie
Salvaneschi, Guido ; Köhler, Mirko ; Sokolowski, Daniel ; Haller, Philipp ; Erdweg, Sebastian ; Mezini, Mira (2019)
Language-Integrated Privacy-Aware Distributed Queries.
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA)
doi: 10.1145/3360593
Article, Bibliographie
Mogk, Ragnar ; Drechsler, Joscha ; Salvaneschi, Guido ; Mezini, Mira (2019)
A Fault-Tolerant Programming Model for Distributed Interactive Applications.
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA)
doi: 10.1145/3360570
Article, Bibliographie
Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS)
Article, Bibliographie
Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Article, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018)
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2)
doi: 10.1145/3154794
Article, Bibliographie
Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018)
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94
Article, Bibliographie
Reuter, Christian ; Leopold, Inken (2018)
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1)
Article, Bibliographie
Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian (2018)
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, 2018 (3)
Article, Bibliographie
Reuter, Christian ; Pottebaum, Jens (2018)
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1)
doi: 10.4018/IJISCRAM.20180101
Article, Bibliographie
Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018)
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1)
doi: 10.4018/IJISCRAM.2018010101
Article, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2018)
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, 2018 (2)
Article, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas (2018)
Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 2018 (1)
Article, Bibliographie
Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018)
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4)
doi: 10.1080/10447318.2018.1427833
Article, Bibliographie
Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André (2018)
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4)
doi: 10.1080/10447318.2018.1427832
Article, Bibliographie
Reuter, Christian ; Mentler, Tilo (2018)
Human-computer interaction and social media in safety-critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1)
doi: 10.1111/1468-5973.12192
Article, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André (2018)
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1)
doi: 10.1111/1468-5973.12196
Article, Bibliographie
Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018)
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), 27 (3)
doi: 10.1111/1468-5973.12249
Article, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2017)
Coercion resistant proxy voting.
In: Computers & Security, 71
doi: 10.1016/j.cose.2017.06.007
Article, Bibliographie
Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017)
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1)
doi: 10.1109/COMST.2017.2748278
Article, Bibliographie
Reuter, Christian ; Pätsch, Katja ; Runft, Elena (2017)
IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, 16 (2)
doi: 10.1515/icom-2017-0013
Article, Bibliographie
Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017)
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4)
doi: 10.1515/popets-2017-0044
Article, Bibliographie
Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Article, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017)
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3)
doi: 10.1109/MSP.2017.70
Article, Bibliographie
Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit (2017)
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41
Article, Bibliographie
Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan (2017)
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation
Article, Bibliographie
Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Article, Bibliographie
Borges, Fábio ; Lara, Pedro ; Portugal, Renato (2017)
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292
doi: 10.1016/j.amc.2016.07.036
Article, Bibliographie
Pottebaum, Jens ; Reuter, Christian (2017)
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4)
Article, Bibliographie
Reinhold, Thomas (2017)
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden
Article, Bibliographie
Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar (2017)
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), 102
doi: 10.1016/j.ijhcs.2016.09.008
Article, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian (2017)
Integration von Flow in die Mensch-Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Wissenschaft trifft Praxis, 6 (1)
Article, Bibliographie
Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar (2017)
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6)
doi: 10.1007/s10606-017-9291-z
Article, Bibliographie
Reuter, Christian ; Spielhofer, Thomas (2017)
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Technological Forecasting and Social Change (TFSC), 121
doi: 10.1016/j.techfore.2016.07.038
Article, Bibliographie
Carvalho, Aparecido Fabiano Pinatti de ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017)
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
In: International reports on socio-informatics, 14 (3)
Article, Bibliographie
Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016)
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1)
doi: 10.1016/j.jisa.2016.10.003
Article, Bibliographie
Moschner, K. ; Blazhev, A. ; Jolie, J. ; Warr, N. ; Boutachkov, P. ; Bednarczyk, P. ; Sieja, K. ; Algora, A. ; Ameil, F. ; Bentley, M. A. ; Brambilla, S. ; Braun, N. ; Camera, F. ; Cederkaell, J. ; Corsi, A. ; Danchev, M. ; DiJulio, D. ; Fahlander, C. ; Gerl, J. ; Giaz, A. ; Golubev, P. ; Gorska, M. ; Grebosz, J. ; Habermann, T. ; Hackstein, M. ; Hoischen, R. ; Kojouharov, I. ; Kurz, N. ; Margincan, N. ; Merchan, E. ; Moeller, T. ; Naqvi, F. ; Singh, B. S. Nara ; Nociforo, C. ; Pietralla, N. ; Pietri, S. ; Podolyak, Zs. ; Prochazka, A. ; Reese, M. ; Reiter, P. ; Rudigier, M. ; Rudolph, D. ; Sava, T. ; Schaffner, H. ; Scruton, L. ; Taprogge, J. ; Thomas, T. ; Weick, H. ; Wendt, A. ; Wieland, O. ; Wollersheim, H.-J. (2016)
Relativistic Coulomb excitation of Kr-88.
In: PHYSICAL REVIEW C, 94 (5)
Article, Bibliographie
Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016)
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5)
Article, Bibliographie
Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016)
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4)
doi: 10.1108/ICS-06-2015-0024
Article, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016)
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4)
doi: 10.1108/ICS-07-2015-0032
Article, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016)
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications
doi: 10.1007/s12243-016-0520-0
Article, Bibliographie
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article, Bibliographie
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article, Bibliographie
Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016)
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
Article, Bibliographie
Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016)
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
doi: 10.1109/TIFS.2015.2512534
Article, Bibliographie
McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016)
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5)
doi: 10.1109/JPROC.2015.2512235
Article, Bibliographie
Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016)
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76
doi: 10.1016/j.comcom.2015.11.004
Article, Bibliographie
Halvani, Oren ; Winter, Christian ; Pflug, Anika (2016)
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement)
doi: 10.1016/j.diin.2016.01.006
Article, Bibliographie
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article, Bibliographie
Steinebach, Martin ; Schäfer, Marcel ; Winter, Christian (2015)
Datenschutz im Zeitalter von Big Data.
In: Wissensmanagement – Das Magazin für Führungskräfte, 17 (7)
Article, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015)
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11)
doi: 10.1007/s11623-015-0512-7
Article, Bibliographie
Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015)
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35)
Article, Bibliographie
Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015)
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
Article, Bibliographie
Nguyen Quang Do, Lisa ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015)
Toward a Just-in-Time Static Analysis.
Article, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558)
Article, Bibliographie
Othmane, Lotfi Ben ; Ranchal, Rohit ; Fernando, Ruchith ; Bhargava, Bharat ; Bodden, Eric (2015)
Incorporating Attacker Capabilities in Risk Estimation and Mitigation.
In: Computers & Security, 51
doi: 10.1016/j.cose.2015.03.001
Article, Bibliographie
Steinberger, Jessica ; Sperotto, Anna ; Golling, Mario ; Baier, Harald ; Pras, Aiko (2015)
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols.
Article, Bibliographie
Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015)
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie (2015)
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2)
doi: 10.1007/s11623-015-0375-y
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015)
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1)
doi: 10.1145/2738210.2738214
Article, Bibliographie
Tan, Feng ; Wang, Yufei ; Wang, Qixin ; Bu, Lei ; Suri, Neeraj (2015)
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking.
In: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Article, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article, Bibliographie
Zheng, Yao ; Schulz, Matthias ; Lou, Wenjing ; Hou, Thomas ; Hollick, Matthias (2015)
Highly Efficient Known-Plaintext Attacks against Orthogonal Blinding based Physical Layer Security.
In: IEEE Wireless Communications Letters, 4 (1)
doi: 10.1109/LWC.2014.2363176
Article, Bibliographie
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014)
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11)
doi: 10.1002/sec.748
Article, Bibliographie
Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat (2014)
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 11 (6)
Article, Bibliographie
Halvani, Oren ; Steinebach, Martin (2014)
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014)
Article, Bibliographie
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Article, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Article, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article, Bibliographie
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article, Bibliographie
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article, Bibliographie
Rasthofer, Siegfried ; Arzt, Steven ; Bodden, Eric (2014)
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS)
Article, Bibliographie
Rasthofer, Siegfried ; Arzt, Steven ; Lovat, Enrico ; Bodden, Eric (2014)
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES)
Article, Bibliographie
Winter, Christian ; Steinebach, Martin ; Yannikos, York (2014)
Fast Indexing Strategies for Robust Image Hashes.
In: Digital Investigation (Elsevier), 11 (Supplement 1)
doi: 10.1016/j.diin.2014.03.004
Article, Bibliographie
Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2014)
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4)
Article, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014)
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327
Article, Bibliographie
Roos, Stefanie ; Strufe, Thorsten (2014)
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165
Article, Bibliographie
Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014)
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP)
Article, Bibliographie
Riecker, Michael ; Biedermann, Sebastian ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2)
Article, Bibliographie
Buchmann, Johannes ; Neumann, Stephan (2014)
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2)
Article, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Article, Bibliographie
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias (2013)
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5)
Article, Bibliographie
Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013)
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37
doi: 10.1007/s11623-013-0300-1
Article, Bibliographie
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Article, Bibliographie
Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil (2013)
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article, Bibliographie
Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013)
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8)
doi: 10.1007/s11623-013-0209-8
Article, Bibliographie
Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013)
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
Article, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013)
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4)
doi: 10.1007/s00200-013-0190-3
Article, Bibliographie
Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013)
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464)
Article, Bibliographie
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013)
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1)
Article, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Article, Bibliographie
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234)
Article, Bibliographie
Carmo, Rodrigo do ; Hollick, Matthias (2013)
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
doi: 10.1145/2463183.2463187
Article, Bibliographie
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article, Bibliographie
Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Article, Bibliographie
Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013)
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
Article, Bibliographie
Loch, Adrian ; Frey, Hannes ; Hollick, Matthias (2013)
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing
doi: 10.1016/j.pmcj.2013.03.004
Article, Bibliographie
Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes (2013)
Instantiating Treeless Signature Schemes.
In: Cryptology ePrint Archive, 2013 (65)
Article, Bibliographie
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Article, Bibliographie
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2013)
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4)
Article, Bibliographie
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2013)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3)
Article, Bibliographie
Breitinger, Frank ; Petrov, Kaloyan (2013)
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9)
Article, Bibliographie
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela (2013)
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3)
Article, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2013)
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21
doi: 10.1108/09685221311314419
Article, Bibliographie
Popovici, C. ; Fischer, C. S. ; Smekal, L. von (2013)
Fermi velocity renormalization and dynamical gap generation in graphene.
In: Physical Review B, 88 (20)
doi: 10.1103/PhysRevB.88.205429
Article, Bibliographie
Smith, Dominik ; Dumitru, Adrian ; Pisarski, Robert ; Smekal, Lorenz von (2013)
Effective potential for SU(2) Polyakov loops and Wilson loop eigenvalues.
In: Physical Review D, 88 (5)
doi: 10.1103/PhysRevD.88.054020
Article, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013)
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering
Article, Bibliographie
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013)
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3)
doi: 10.1007/s10623-013-9840-5
Article, Bibliographie
Winter, Christian ; Schneider, Markus ; Yannikos, York (2013)
F2S2: Fast forensic similarity search through indexing piecewise hash signatures.
In: Digital Investigation (Elsevier), 10 (4)
doi: 10.1016/j.diin.2013.08.003
Article, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article, Bibliographie
Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013)
Ethical Considerations When Employing Fake Identities for Research in OSN.
Article, Bibliographie
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Article, Bibliographie
Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes (2013)
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
Article, Bibliographie
Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten (2013)
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2)
doi: 10.4230/DagRep.3.2.22
Article, Bibliographie
Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander (2013)
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), 7 (3)
doi: 10.4018/jisp.2013070102
Article, Bibliographie
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article, Bibliographie
Katzenbeisser, Stefan ; Schaller, André (2012)
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit
Article, Bibliographie
Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012)
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4)
Article, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
Article, Bibliographie
Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin (2012)
Privacy Risks in Named Data Networking: What is the Cost of Performance?
In: ACM SIGCOMM Computer Communication Review (CCR), 42 (5)
doi: 10.1145/2378956.2378966
Article, Bibliographie
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5)
Article, Bibliographie
Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article, Bibliographie
Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012)
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
Article, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
Article, Bibliographie
Seyfarth, Ulrich ; Ranade, Kedar S. (2012)
Cyclic mutually unbiased bases, Fibonacci polynomials and Wiedemann's conjecture.
In: Journal of Mathematical Physics, 53 (6)
doi: 10.1063/1.4723825
Article, Bibliographie
Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012)
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3)
Article, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2012)
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security
doi: 10.1108/09685221311314419
Article, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL)
Article, Bibliographie
Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article, Bibliographie
Pflug, Anika ; Hartung, Daniel ; Busch, Christoph (2012)
Feature Extraction from Vein Images using Spatial Information and Chain Codes.
In: ISTR, (17)
doi: 10.1016/j.istr.2012.02.003
Article, Bibliographie
Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet (2012)
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, 11 (1)
doi: 10.5381/jot.2012.11.1.a7
Article, Bibliographie
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012)
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18
doi: 10.1007/s11276-012-0505-5
Article, Bibliographie
Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2012)
Gabor Filters as Candidate Quality Measure for NFIQ 2.0.
In: The 5th IAPR International Conference on Biometrics
Article, Bibliographie
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph (2012)
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1)
doi: 10.1049/iet-bmt.2011.0013
Article, Bibliographie
Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Article, Bibliographie
Henriques, Joselito ; Lukas, Uwe Freiherr von ; Mesing, Benjamin (2012)
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2
Article, Bibliographie
Seyfarth, Ulrich ; Nikolopoulos, Georgios ; Alber, Gernot (2012)
Symmetries and security of a quantum-public-key encryption based on single-qubit rotations.
In: Phys. Rev. A, 85
doi: 10.1103/PhysRevA.85.022342
Article, Bibliographie
Sarimbekov, Aibek ; Sewe, Andreas ; Binder, Walter ; Moret, Philippe ; Mezini, Mira (2012)
JP2: Call-site aware calling context profiling for the Java Virtual Machine.
In: Science of Computer Programming
doi: 10.1016/j.scico.2011.11.003
Article, Bibliographie
Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012)
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
Article, Bibliographie
Bauer, C. ; Behrens, T. ; Bildstein, V. ; Blazhev, A. ; Bruyneel, B. ; Butterworth, J. ; Clément, E. ; Coquard, L. ; Egido, J. ; Ekström, A. ; Fitzpatrick, C. ; Fransen, C. ; Gernhäuser, R. ; Habs, D. ; Hess, H. ; Leske, J. ; Kröll, T. ; Krücken, R. ; Lutter, R. ; Marley, P. ; Möller, T. ; Otsuka, T. ; Patronis, N. ; Petts, A. ; Pietralla, N. ; Rodríguez, T. ; Shimizu, N. ; Stahl, C. ; Stefanescu, I. ; Stora, T. ; Thirolf, P. ; Voulot, D. ; Walle, J. van de ; Warr, N. ; Wenander, F. ; Wiens, A. (2012)
Prolate shape of ^{140}Ba from a first combined Doppler-shift and Coulomb-excitation measurement at the REX-ISOLDE facility.
In: Physical Review C, 86 (3)
doi: 10.1103/PhysRevC.86.034310
Article, Bibliographie
Ahn, T. ; Rainovski, G. ; Pietralla, N. ; Coquard, L. ; Möller, T. ; Costin, A. ; Janssens, R. V. ; Lister, C. ; Carpenter, M. ; Zhu, S. (2012)
Identification of the 2_{1,ms}^{+} mixed-symmetry state in ^{136}Ce.
In: Physical Review C, 86 (1)
doi: 10.1103/PhysRevC.86.014303
Article, Bibliographie
Endres, J. ; Savran, D. ; Butler, P. ; Harakeh, M. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Litvinova, E. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Schlüter, F. ; Sonnabend, K. ; Stoica, V. ; Wörtche, H. ; Zilges, A. (2012)
Structure of the pygmy dipole resonance in ^{124}Sn.
In: Physical Review C, 85 (6)
doi: 10.1103/PhysRevC.85.064331
Article, Bibliographie
Grieser, M. ; Litvinov, Yu. A. ; Raabe, R. ; Blaum, K. ; Blumenfeld, Y. ; Butler, P. A. ; Wenander, F. ; Woods, P. J. ; Aliotta, M. ; Andreyev, A. ; Artemyev, A. ; Atanasov, D. ; Aumann, T. ; Balabanski, D. ; Barzakh, A. ; Batist, L. ; Bernardes, A.-P. ; Bernhardt, D. ; Billowes, J. ; Bishop, S. ; Borge, M. ; Borzov, I. ; Bosch, F. ; Boston, A. J. ; Brandau, C. ; Catford, W. ; Catherall, R. ; Cederkäll, J. ; Cullen, D. ; Davinson, T. ; Dillmann, I. ; Dimopoulou, C. ; Dracoulis, G. ; Düllmann, Ch. E. ; Egelhof, P. ; Estrade, A. ; Fischer, D. ; Flanagan, K. ; Fraile, L. ; Fraser, M. A. ; Freeman, S. J. ; Geissel, H. ; Gerl, J. ; Greenlees, P. ; Grisenti, R. E. ; Habs, D. ; Hahn, R. von ; Hagmann, S. ; Hausmann, M. ; He, J. J. ; Heil, M. ; Huyse, M. ; Jenkins, D. ; Jokinen, A. ; Jonson, B. ; Joss, D. T. ; Kadi, Y. ; Kalantar-Nayestanaki, N. ; Kay, B. P. ; Kiselev, O. ; Kluge, H.-J. ; Kowalska, M. ; Kozhuharov, C. ; Kreim, S. ; Kröll, T. ; Kurcewicz, J. ; Labiche, M. ; Lemmon, R. C. ; Lestinsky, M. ; Lotay, G. ; Ma, X. W. ; Marta, M. ; Meng, J. ; Mücher, D. ; Mukha, I. ; Müller, A. ; Murphy, A. St. J. ; Neyens, G. ; Nilsson, T. ; Nociforo, C. ; Nörtershäuser, W. ; Page, R. D. ; Pasini, M. ; Petridis, N. ; Pietralla, N. ; Pfützner, M. ; Podolyák, Z. ; Regan, P. ; Reed, M. W. ; Reifarth, R. ; Reiter, P. ; Repnow, R. ; Riisager, K. ; Rubio, B. ; Sanjari, M. S. ; Savin, D. W. ; Scheidenberger, C. ; Schippers, S. ; Schneider, D. ; Schuch, R. ; Schwalm, D. ; Schweikhard, L. ; Shubina, D. ; Siesling, E. ; Simon, H. ; Simpson, J. ; Smith, J. ; Sonnabend, K. ; Steck, M. ; Stora, T. ; Stöhlker, T. ; Sun, B. ; Surzhykov, A. ; Suzaki, F. ; Tarasov, O. ; Trotsenko, S. ; Tu, X. L. ; Duppen, P. van ; Volpe, C. ; Voulot, D. ; Walker, P. M. ; Wildner, E. ; Winckler, N. ; Winters, D. F. A. ; Wolf, A. ; Xu, H. S. ; Yakushev, A. ; Yamaguchi, T. ; Yuan, Y. J. ; Zhang, Y. H. ; Zuber, K. (2012)
Storage ring at HIE-ISOLDE.
In: The European Physical Journal Special Topics, 207 (1)
doi: 10.1140/epjst/e2012-01599-9
Article, Bibliographie
Cooper, N. ; Reichel, F. ; Werner, V. ; Bettermann, L. ; Alikhani, B. ; Aslanidou, S. ; Bauer, C. ; Coquard, L. ; Fritzsche, M. ; Fritzsche, Y. ; Glorius, J. ; Goddard, P. ; Möller, T. ; Pietralla, N. ; Reese, M. ; Romig, C. ; Savran, D. ; Schnorrenberger, L. ; Siebenhühner, F. ; Simon, V. ; Sonnabend, K. ; Smith, M. ; Walz, C. ; Yates, S. ; Yevetska, O. ; Zweidinger, M. (2012)
Photoresponse of ^{76}Se below 9 MeV.
In: Physical Review C, 86 (3)
doi: 10.1103/PhysRevC.86.034313
Article, Bibliographie
Möller, T. ; Pietralla, N. ; Rainovski, G. ; Ahn, T. ; Bauer, C. ; Carpenter, M. ; Coquard, L. ; Janssens, R. ; Leske, J. ; Lister, C. ; McCutchan, E. ; Möller, O. ; Seweryniak, D. ; Zhu, S. (2012)
Absolute β-to-ground band transition strengths in ^{154}Sm.
In: Physical Review C, 86 (3)
doi: 10.1103/PhysRevC.86.031305
Article, Bibliographie
Robillard, Martin P. ; Bodden, Eric ; Kawrykow, David ; Mezini, Mira ; Ratchford, Tristan (2012)
Automated API Property Inference Techniques.
In: IEEE Transactions on Software Engineering (TSE)
Article, Bibliographie
Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012)
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
Article, Bibliographie
Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes (2012)
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
Article, Bibliographie
Kalabis, Lukas ; Selzer, Annika (2012)
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9)
doi: 10.1007/s11623-012-0224-1
Article, Bibliographie
Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef (2012)
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7)
Article, Bibliographie
Schreiner, Steffen ; Bagnasco, Stefano ; Banerjee, Subho Sankar ; Betev, Latchezar ; Carminati, Federico ; Datskova, Olga Vladimirovna ; Furano, Fabrizio ; Grigoras, Alina ; Grigoras, Costin ; Lorenzo, Patricia Mendez ; Peters, Andreas Joachim ; Saiz, Pablo ; Zhu, Jianlin (2011)
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations.
In: Journal of Physics: Conference Series (JPCS), 331:062044, International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2010
Article, Bibliographie
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2011)
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11)
doi: 10.1016/j.jss.2011.06.073
Article, Bibliographie
Wall, Josh ; Ward, John ; Castro, Luis ; Favela, Jesus ; Berkovsky, Shlomo ; Lueg, Christopher ; Pereira, Francisco ; Correia, Pedro ; Ferreira, Michel ; Gomes, Pedro ; Bolchini, Davide ; Weber, Stefan ; Park, Eunjeong ; Nam, Hyo Suk (2011)
Large-Scale Opportunistic Sensing.
In: IEEE Pervasive Computing, 10 (4)
doi: 10.1109/MPRV.2011.74
Article, Bibliographie
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2011)
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011)
Article, Bibliographie
Seyfarth, Ulrich ; Ranade, Kedar (2011)
Construction of mutually unbiased bases with cyclic symmetry for qubit systems.
In: Physical Review A, 84 (4)
doi: 10.1103/PhysRevA.84.042327
Article, Bibliographie
Steinebach, Martin (2011)
Robuste Hashverfahren zur forensischen Bilderkennung.
In: pvt - Polizei, Verkehr + Technik, 5
Article, Bibliographie
Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max (2011)
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services.
In: Journal of Information Processing, 19
doi: 10.2197/ipsjjip.19.317
Article, Bibliographie
Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Article, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011)
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
Article, Bibliographie
Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2011)
Location Privacy in RFID Systemen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (2)
Article, Bibliographie
Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011)
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy
Article, Bibliographie
Rothenberg, Christian Esteve ; Macapuna, Carlos A. B. ; Magalhães, Maurício F. ; Verdi, Fábio ; Wiesmaier, Alexander (2011)
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, 55 (6)
Article, Bibliographie
Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing (2011)
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD)
Article, Bibliographie
Seeger, Mark (2011)
Internetkonnektivität als Indikator für wirtschaftliche Stärke – Das Internet in Vergangenheit und Gegenwart.
In: Wirtschaftsinformatik und Management
Article, Bibliographie
Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes (2011)
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, (7)
Article, Bibliographie
Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. (2011)
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
Article, Bibliographie
Coquard, L. ; Rainovski, G. ; Pietralla, N. ; Ahn, T. ; Bettermann, L. ; Carpenter, M. ; Janssens, R. ; Leske, J. ; Lister, C. ; Möller, O. ; Möller, T. ; Rother, W. ; Werner, V. ; Zhu, S. (2011)
O(6)-symmetry breaking in the γ-soft nucleus ^{126}Xe and its evolution in the light stable xenon isotopes.
In: Physical Review C, 83 (4)
doi: 10.1103/PhysRevC.83.044318
Article, Bibliographie
Danchev, M. ; Rainovski, G. ; Pietralla, N. ; Gargano, A. ; Covello, A. ; Baktash, C. ; Beene, J. ; Bingham, C. ; Galindo-Uribarri, A. ; Gladnishki, K. ; Gross, C. ; Ponomarev, V. ; Radford, D. ; Riedinger, L. ; Scheck, M. ; Stuchbery, A. ; Wambach, J. ; Yu, C.-H. ; Zamfir, N. (2011)
One-phonon isovector 2_{1,MS}^{+} state in the neutron-rich nucleus ^{132}Te.
In: Physical Review C, 84 (6)
doi: 10.1103/PhysRevC.84.061306
Article, Bibliographie
Glorius, J. ; Knörzer, M. ; Müller, S. ; Pietralla, N. ; Sauerwein, A. ; Sonnabend, K. ; Wälzlein, C. ; Wiescher, M. (2011)
p-process nucleosynthesis: Activation experiments.
In: Progress in Particle and Nuclear Physics, 66 (2)
Article, Bibliographie
Isaak, J. ; Savran, D. ; Fritzsche, M. ; Galaviz, D. ; Hartmann, T. ; Kamerdzhiev, S. ; Kelley, J. ; Kwan, E. ; Pietralla, N. ; Romig, C. ; Rusev, G. ; Sonnabend, K. ; Tonchev, A. ; Tornow, W. ; Zilges, A. (2011)
Investigation of low-lying electric dipole strength in the semimagic nucleus ^{44}Ca.
In: Physical Review C, 83 (3)
doi: 10.1103/PhysRevC.83.034304
Article, Bibliographie
Jolos, R. ; Pietralla, N. ; Shirikova, N. ; Voronov, V. (2011)
Schematic microscopic approach to the description of M1 transitions between mixed-symmetry and fully symmetric collective states in γ-soft nuclei based on RPA-IBM boson mapping.
In: Physical Review C, 84 (1)
doi: 10.1103/PhysRevC.84.014315
Article, Bibliographie
Jungclaus, A. ; Walker, J. ; Leske, J. ; Speidel, K.-H. ; Stuchbery, A. E. ; East, M. ; Boutachkov, P. ; Cederkäll, J. ; Doornenbal, P. ; Egido, J. L. ; Ekström, A. ; Gerl, J. ; Gernhäuser, R. ; Goel, N. ; Górska, M. ; Kojouharov, I. ; Maier-Komor, P. ; Modamio, V. ; Naqvi, F. ; Pietralla, N. ; Pietri, S. ; Prokopowicz, W. ; Schaffner, H. ; Schwengner, R. ; Wollersheim, H.-J. (2011)
Evidence for reduced collectivity around the neutron mid-shell in the stable even-mass Sn isotopes from new lifetime measurements.
In: Physics Letters B, 695 (1-4)
doi: 10.1016/j.physletb.20https://doi.org/10.11.012
Article, Bibliographie
Walker, J. ; Jungclaus, A. ; Leske, J. ; Speidel, K.-H. ; Ekström, A. ; Boutachkov, P. ; Cederkäll, J. ; Doornenbal, P. ; Gerl, J. ; Gernhäuser, R. ; Goel, N. ; Górska, M. ; Kojouharov, I. ; Maier-Komor, P. ; Modamio, V. ; Naqvi, F. ; Pietralla, N. ; Pietri, S. ; Prokopowicz, W. ; Schaffner, H. ; Schwengner, R. ; Wollersheim, H.-J. (2011)
Magnetic moments of the first excited 2^{+} states in the semi-magic ^{112,114,116,122,124}Sn isotopes.
In: Physical Review C, 84 (1)
doi: 10.1103/PhysRevC.84.014319
Article, Bibliographie
Shoufan, Abdulhadi ; Arul, Tolga (2011)
A benchmarking environment for performance evaluation of tree-based rekeying algorithms.
In: Journal of Systems and Software
Article, Bibliographie
Shoufan, Abdulhadi ; Huber, Nico ; Molter, Gregor (2011)
A Novel Cryptoprocessor Architecture for Chained Merkle Signature Scheme.
In: Microprocessors and Microsystems, Embedded Hardware Design, Elsevier, 35 (1)
doi: 10.1016/j.micpro.2010.07.002
Article, Bibliographie
Molter, Gregor ; Stoettinger, Marc ; Shoufan, Abdulhadi ; Strenzke, Falko (2011)
A Simple Power Analysis Attack on a McEliece Cryptoprocessor.
In: Journal of Cryptographic Engineering
Article, Bibliographie
Bodden, Eric ; Hendren, Laurie (2011)
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer)
Article, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes (2011)
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive
Article, Bibliographie
Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011)
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1)
Article, Bibliographie
Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet
(Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2)
Article, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011)
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3)
Article, Bibliographie
Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. (2010)
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing
Article, Bibliographie
Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten (2010)
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom
Article, Bibliographie
Müller, Jürgen ; Massoth, Michael (2010)
Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony.
In: International Journal on Advances in Telecommunications, 3 (3&4)
Article, Bibliographie
Enders, J. ; Litvinova, E. ; Savran, D. ; Butler, P. A. ; Harakeh, M. N. ; Harissopulos, S. ; Herzberg, R.-D. ; Krücken, R. ; Lagoyannis, A. ; Pietralla, N. ; Ponomarev, V. Yu. ; Popescu, L. ; Ring, P. ; Scheck, M. ; Sonnabend, K. ; Stoica, V. I. ; Wörtche, H. J. ; Zilges, A. (2010)
Isospin Character of the Pygmy Dipole Resonance in 124Sn.
In: Physical Review Letters, 105 (21)
doi: 10.1103/PhysRevLett.105.212503
Article, Bibliographie
Geibig, Joanna ; Bradler, Dirk (2010)
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10)
Article, Bibliographie
Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro (2010)
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2)
Article, Bibliographie
Gladnishki, K. A. ; Rainovski, G. ; Petkov, P. ; Jolie, J. ; Pietralla, N. ; Blazhev, A. ; Damyanova, A. ; Danchev, M. ; Dewald, A. ; Fransen, C. ; Hackstein, M. ; Karagyozov, D. ; Möller, O. ; Pissulla, T. ; Reese, M. ; Rother, W. ; Topchiyska, R. (2010)
Search for one-phonon mixed-symmetry states in the radioactive nucleus 140Nd.
In: Physical Review C, 82 (3)
doi: 10.1103/PhysRevC.82.037302
Article, Bibliographie
Roßnagel, Alexander (2010)
Das Bundesverfassungsgericht und die Vorratsdatenspeicherung in Europa.
In: DuD, 8
Article, Bibliographie
Heinson, Dennis ; Schmidt, Bernd (2010)
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8)
Article, Bibliographie
Halvani, Oren ; Steinebach, Martin (2010)
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 61 (5)
Article, Bibliographie
Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato (2010)
The uncertainty principle in the presence of quantum memory.
In: Nature Physics
Article, Bibliographie
Kern, Oliver ; Ranade, Kedar S. ; Seyfarth, Ulrich (2010)
Complete sets of cyclic mutually unbiased bases in even prime-power dimensions.
In: Journal of Physics A: Mathematical and Theoretical, 43 (27)
doi: 10.1088/1751-8113/43/27/275305
Article, Bibliographie
Seeger, Mark (2010)
Three Years Hacker Paragraph - A review.
In: Datenschutz und Datensicherheit (DuD), 34 (7)
doi: 10.1007/s11623-010-0133-0
Article, Bibliographie
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk (2010)
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, 5 (Special Issue)
Article, Bibliographie
Roßnagel, Alexander ; Jandt, Silke (2010)
Datenschutzkonformes Energieinformationsnetz.
In: DuD, 6
Article, Bibliographie
Shoufan, Abdulhadi ; Wink, Thorsten ; Molter, Gregor ; Huss, Sorin ; Kohnert, Eike (2010)
A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem.
In: IEEE Transactions on Computers
doi: 10.1109/TC.2010.115
Article, Bibliographie
Shoufan, Abdulhadi ; Huss, Sorin (2010)
A Course on Reconfigurable Computing.
In: ACM Transactions on Computing Education, 10
Article, Bibliographie
Bedner, Mark (2010)
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR)
Article, Bibliographie
Buchmann, Johannes ; Wiesmaier, Alexander (2010)
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17)
Article, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias (2010)
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2
doi: 10.3390/fi2020096
Article, Bibliographie
Serrano, P. ; Hollick, Matthias ; Banchs, A. (2010)
On the Trade-Off between Throughput Maximization and Energy Consumption Minimization in IEEE 802.11 WLANs.
In: Journal of Communications and Networks (JCN), 12 (2)
Article, Bibliographie
Bulygin, Stanislav ; Brickenstein, Michael (2010)
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3)
doi: 10.1007/s11786-009-0020-y
Article, Bibliographie
Anderl, Reiner ; Henriques, Joselito Rodrigues (2010)
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2)
Article, Bibliographie
Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus (2010)
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2)
doi: 10.1007/s11623-010-0039-x
Article, Bibliographie
Yannikos, York ; Winter, Christian ; Franke, Frederik ; Schneider, Markus (2010)
Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge.
In: Datenschutz und Datensicherheit, 34 (2)
doi: 10.1007/s11623-010-0042-2
Article, Bibliographie
Massoth, Michael ; Acker, Robin ; Moore, Ronald (2010)
Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen.
In: Querschnitt
Article, Bibliographie
Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010)
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
Article, Bibliographie
Implementation of Binary Edwards Curves for very-constrained Devices.
In: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)
Article, Bibliographie
Sadeghi, Ahmad-Reza ; Stüble, Christian ; Cabuk, Serdar ; Dalton, Chris ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramasamy, Hari Govind ; Ramunno, Gianluca ; Schunter, Matthias (2010)
Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers.
In: Journal of Computer Security, 18 (1)
Article, Bibliographie
Volkamer, Melanie (2010)
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, 52 (3)
doi: 10.1524/itit.2010.0587
Article, Bibliographie
Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter (2010)
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2)
Article, Bibliographie
Rossberg, Michael ; Schäfer, Günter ; Strufe, Thorsten (2010)
Distributed Automatic Configuration of Complex IPsec-Infrastructures.
In: IEEE Journal of Network and Systems Management
Article, Bibliographie
Mogre, Parag S. ; D'Heureuse, N. ; Hollick, Matthias ; Steinmetz, R. (2010)
CORE: Centrally Optimized Routing Extensions for Efficient Bandwidth Management and Network Coding in the IEEE 802.16 MeSH Mode.
In: Wireless Communications and Mobile Computing
Article, Bibliographie
Mogre, Parag S. ; Graffi, K. ; Hollick, Matthias ; Steinmetz, R. (2010)
A Security Framework for Wireless Mesh Networks.
In: Wireless Communications and Mobile Computing
Article, Bibliographie
Bedner, Mark ; Ackermann, Tobias (2010)
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
doi: 10.1007/s11623-010-0096-1
Article, Bibliographie
Roßnagel, Alexander ; Hornung, Gerrit ; Knopp, Michael ; Wilke, Daniel (2009)
De-Mail und Bürgerportale.
In: DuD, 12
Article, Bibliographie
Bras-Amoros, Maria ; Bulygin, Stanislav (2009)
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3)
doi: 10.1007/s00233-009-9175-8
Article, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud (2009)
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12)
doi: 10.1016/j.jsc.2007.12.003
Article, Bibliographie
Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas (2009)
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10)
doi: 10.4304/jnw.4.10.968-975
Article, Bibliographie
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6)
Article, Bibliographie
Shoufan, Abdulhadi ; Huss, Sorin (2009)
High-Performance Rekeying Processor Architecture for Group Key Management.
In: IEEE Transactions on Computers, 58
Article, Bibliographie
Busch, Christoph ; Reimer, Helmut (2009)
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5)
Article, Bibliographie
Busch, Christoph (2009)
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Busch, Christoph (2009)
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung
Article, Bibliographie
Buchmann, Johannes ; Roßnagel, Alexander (2009)
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9
Article, Bibliographie
Steinebach, Martin ; Zmudzinski, Sascha (2009)
Individuell gestempelt - Die Technik hinter digitalen Audio-Wasserzeichen.
In: c't-Magazin, 2009 (9)
Article, Bibliographie
Roßnagel, Alexander (2009)
Die Novellen zum Datenschutzrecht - Scoring und Adresshandel.
In: Neue Juristische Wochenschrift (NJW), 2009 (Heft 37)
Article, Bibliographie
Freiling, Felix ; Heinson, Dennis (2009)
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9)
Article, Bibliographie
Buchmann, Johannes ; Karatsiolis, Vangelis (2009)
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5)
doi: 10.4236/ijcns.2009.25042
Article, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4
Article, Bibliographie
Ranade, Kedar (2009)
Symmetric extendibility for a class of qudit states.
In: J. Phys. A 42, 425302
Article, Bibliographie
Roßnagel, Alexander (2009)
Der elektronische Personalausweis als sichere Signaturerstellungseinheit - Können Signaturkarten kontaktlos genutzt werden?
In: Datenschutz und Datensicherheit (DuD), Juli 2009
Article, Bibliographie
Steinebach, Martin (2009)
Watermarking-Schutz digitaler Medien.
In: Science Allemagne: Die sichere digitale Identität, Französische Botschaft in Deutschland (Hrsg.), 3
Article, Bibliographie
Nickel, Claudia (2009)
Authentisierung an mobilen Geräten mittels Gangerkennung.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009)
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4)
doi: 10.4134/BKMS.2009.46.4.803
Article, Bibliographie
Hornung, Gerrit ; Schnabel, Christoph (2009)
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2)
Article, Bibliographie
Hornung, Gerrit ; Schnabel, Christoph (2009)
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1)
Article, Bibliographie
Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max (2009)
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1)
Article, Bibliographie
Roßnagel, Alexander (2009)
Digitale Rechteverwaltung – Eine gelungene Allianz von Recht und Technik?
In: Schriftenreihe des Instituts für Europäisches Medienrecht (EMR)
Article, Bibliographie
Hartung, Daniel (2009)
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten (2009)
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1)
Article, Bibliographie
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99
Article, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12)
Article, Bibliographie
Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009)
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
Article, Bibliographie
Bedner, Mark (2009)
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009
Article, Bibliographie
Roßnagel, Alexander ; Bedner, Mark ; Knopp, Michael (2009)
Rechtliche Anforderungen an die Aufbewahrung von Vorratsdaten.
In: Datenschutz und Datensicherheit (DuD), Septembere 2009
Article, Bibliographie
Roßnagel, Alexander ; Hornung, Gerrit (2009)
Ein Ausweis für das Internet. Der neue Personalausweis erhält einen "elektronischen Identitätsnachweis".
In: Die öffentliche Verwaltung (DÖV), 2009 (Heft 8)
Article, Bibliographie
Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9
Article, Bibliographie
Ranade, Kedar (2009)
Symmetric extendibility for qudits and tolerable error rates in quantum.
In: Phys. Rev. A 80, 022301
Article, Bibliographie
Myhr, Geir Ove ; Renes, Joseph ; Doherty, Andrew ; Lütkenhaus, Norbert (2009)
Symmetric extension in two-way quantum key distribution.
In: Phys. Rev. A 79, 042329
Article, Bibliographie
Novotny, J. ; Alber, G. ; Jex, I. (2009)
Random unitary dynamics of quantum networks.
In: Journal of Physics A: Mathematical and Theoretical, 42 (28)
doi: 10.1088/1751-8113/42/28/282003
Article, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
Article, Bibliographie
Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph (2009)
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel (2008)
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR
Article, Bibliographie
Schindler, Werner (2008)
Advanced Stochastic Methods in Side Channel Analysis on Block Ciphers in the Presence of Masking.
In: Journal of Mathematical Cryptology, 2
Article, Bibliographie
Roßnagel, Alexander ; Hornung, Gerrit (2008)
Forschung à la Card? Grenzen und Vorschläge für eine Nutzung der elektronischen Gesundheitskarte zur medizinischen Forschung.
In: Medizinrecht, 26
Article, Bibliographie
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2008)
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
In: Cryptology ePrint Archive, 2008 (022)
Article, Bibliographie
Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008)
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6)
Article, Bibliographie
Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair (2008)
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008
Article, Bibliographie
Bodden, Eric ; Havelund, Klaus (2008)
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008)
Article, Bibliographie
König, A. ; Hollick, Matthias ; Krop, T. ; Steinmetz, R. (2008)
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
In: Security and Communication Networks (SCN), 2
Article, Bibliographie
Volkamer, Melanie ; Vogt, Roland (2008)
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008)
Article, Bibliographie
Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007)
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4)
doi: 10.1108/10650740710834626
Article, Bibliographie
Schmitt, J. ; Hecker, T. ; Hollick, Matthias ; Steinmetz, Ralf (2007)
Dynamische Authentifizierung für Provider-übergreifende VoIP-Kommunikation.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), Special edition on Internet-Telefonie and Voice over IP, 30
Article, Bibliographie
Schmitt, J. ; Hollick, Matthias ; Steinmetz, R. (2007)
Der Assistent in Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), Special edition on Current Trends in Network and Service Management, 30
Article, Bibliographie
Backes, Michael ; Basin, David ; Waidner, Michael (2007)
Preface.
In: Journal of Computer Security, 15 (6)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007)
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12)
Article, Bibliographie
Volkamer, Melanie ; Hauff, Harald (2007)
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10
Article, Bibliographie
Volkamer, Melanie ; Hauff, Harald (2007)
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9
Article, Bibliographie
Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007)
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6)
Article, Bibliographie
Alkassar, Ammar ; Volkamer, Melanie (2007)
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
Article, Bibliographie
Bulygin, Stanislav (2006)
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10)
doi: 10.1109/TIT.2006.881831
Article, Bibliographie
Masip-Bruin, X. ; Yannuzzi, M. ; Domingo-Pascual, J. ; Fonte, A. ; Curado, M. ; Monteiro, E. ; Kuipers, F. ; Mieghem, P. van ; Avallone, S. ; Ventre, G. ; Aranda-Gutierrez, P. ; Hollick, Matthias ; Steinmetz, R. ; Iannone, L. ; Salamatian, K. (2006)
QoS Routing Open Agenda.
In: Computer Communications, 29
Article, Bibliographie
Volkamer, Melanie ; Krimmer, Robert (2006)
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4)
Article, Bibliographie
Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005)
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004)
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4)
Article, Bibliographie
Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004)
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1)
Article, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2004)
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer
Society, 27 (1)
Article, Bibliographie
Karjoth, Günter ; Waidner, Michael (2004)
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1)
Article, Bibliographie
Waidner, Michael (2004)
Preface.
In: Int. J. Inf. Sec., 3 (1)
Article, Bibliographie
Bulygin, Stanislav (2003)
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6)
Article, Bibliographie
Camenisch, Jan ; Waidner, Michael (2001)
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für
den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
Article, Bibliographie
Steiner, Michael ; Buhler, Peter ; Eiricha, Thomas ; Waidner, Michael (2001)
Secure Password-based Cipher Suite for TLS.
In: ACM Transactions on Information and System Security, 4 (2)
Article, Bibliographie
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000)
Design, Implementation and Deployment of the iKP Secure Electronic
Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4)
Article, Bibliographie
Field, Simon ; Waidner, Michael (2000)
Electronic Commerce.
In: Computer Networks, 32 (6)
Article, Bibliographie
Lacoste, Gérard ; Waidner, Michael (2000)
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press
Article, Bibliographie
Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (2000)
Key Agreement in Dynamic Peer Groups.
In: IEEE Transactions on Parallel and Distributed Systems, 11 (8)
Article, Bibliographie
Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998)
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1998)
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph
Urban and Partha Dasgupta, Kluwer Academic Publishers
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1998)
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection
by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1998)
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1)
Article, Bibliographie
Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale (1998)
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, 30
Article, Bibliographie
Schlotterbeck, G. ; Pasch, H. ; Albert, K. (1997)
On-line HPLC1H NMR coupling for the analysis of fatty alcohol ethoxylates.
In: Polymer Bulletin, 38 (6)
doi: 10.1007/s002890050104
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1997)
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1997)
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2)
Article, Bibliographie
Janson, Phil ; Waidner, Michael (1996)
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6)
Article, Bibliographie
Waidner, Michael (1996)
Development of a Secure Electronic Marketplace for Europe.
In: EDI Forum, 9 (2)
Article, Bibliographie
Waidner, Michael (1996)
Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs
im Internet.
In: Neue Zürcher Zeitung (NZZ), 234
Article, Bibliographie
Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995)
Refinement and Extension of Encrypted Key Exchange.
In: ACM Operating Systems Review, 29 (3)
Article, Bibliographie
Waidner, Michael ; Weber, Arnd (1994)
Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges
Zahlungsverfahren.
In: Datenschutz-Berater, 18 (10)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1993)
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation
Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München
Article, Bibliographie
Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1992)
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im
Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11)
Article, Bibliographie
Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael (1991)
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1990)
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1989)
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1988)
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis der Informationsverarbeitung und Kommunikation, 11 (1)
Article, Bibliographie
Waidner, Michael (1988)
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
In: Datenschutz und Datensicherung DuD, 12 (9)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1987)
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6)
Article, Bibliographie
Waidner, Michael ; Pfitzmann, Birgit (1987)
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10)
Article, Bibliographie
Pfitzmann, Andreas ; Waidner, Michael (1986)
Networks without user observability - design options.
In: Computer & Security, 6 (2)
Article, Bibliographie
Pfitzmann, Andreas ; Waidner, Michael (1986)
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, 10 (1)
Article, Bibliographie
Book Section
Hekmati, Björn ; Rudolph-Cleff, Annette (2023)
Mobilität als Schlüssel zur lebenswerten Stadt.
In: Mobility Design: Die Zukunft der Mobilität gestalten Band 2: Forschung, Edition: 1. Auflage
doi: 10.1515/9783868597936
Book Section, Bibliographie
Platzer, Eva ; Knodt, Michèle
ed.: Europäischen Zentrum für Föderalismus-Forschung Tübingen (EZFF) (2023)
Mangelnde Koordination beim Hochwasserschutz im deutschen Mehrebenensystem. Das Beispiel der Hochwasserkatastrophe im Ahrtal im Sommer 2021.
In: Jahrbuch des Föderalismus 2023
doi: 10.5771/9783748918776
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
ed.: Yan, Zheng (2022)
Crisis Informatics.
In: Cambridge Handbook of Cyber Behavior
Book Section, Bibliographie
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2022)
Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots.
In: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, Edition: 1st Edition
doi: 10.4324/9781003110224-5
Book Section, Bibliographie
Hartwig, Katrin ; Reuter, Christian
eds.: Klimczak, Peter ; Zoglauer, Thomas (2021)
Fake News technisch begegnen - Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen.
In: Wahrheit und Fake im postfaktisch-digitalen Zeitalter: Distinktionen in den Geistes- und IT-Wissenschaften, Edition: 1.Auflage
doi: 10.1007/978-3-658-32957-0_7
Book Section, Bibliographie
Reuter, Christian
ed.: Ückert, Sandra (2020)
Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen
Book Section, Bibliographie
Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André
ed.: Reuter, Christian (2019)
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_2
Book Section, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian
ed.: Reuter, Christian (2019)
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_17
Book Section, Bibliographie
Reinhold, Thomas ; Reuter, Christian
ed.: Reuter, Christian (2019)
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_7
Book Section, Bibliographie
Riebe, Thea ; Reuter, Christian
ed.: Reuter, Christian (2019)
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_7
Book Section, Bibliographie
Reinhold, Thomas ; Reuter, Christian
ed.: Reuter, Christian (2019)
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_12
Book Section, Bibliographie
Reuter, Christian
ed.: Reuter, Christian (2019)
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_1
Book Section, Bibliographie
Reuter, Christian ; Riebe, Thea ; Aldehoff, Larissa ; Kaufhold, Marc-André ; Reinhold, Thomas
ed.: Werkner, Ines-Jacqueline (2019)
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?
doi: 10.1007/978-3-658-27713-0_2
Book Section, Bibliographie
Reuter, Christian
eds.: Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019)
Fake News und manipulierte Meinungsbildung.
In: Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen
Book Section, Bibliographie
Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker
ed.: Reuter, Christian (2019)
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
doi: 10.1007/978-3-658-25652-4_19
Book Section, Bibliographie
Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
eds.: Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (2018)
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018
Book Section, Bibliographie
Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
ed.: Reuter, Christian (2018)
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Edition: 1. Auflage
doi: 10.1007/978-3-658-19523-6_30
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
ed.: Reuter, Christian (2018)
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Edition: 1. Auflage
doi: 10.1007/978-3-658-19523-6_19
Book Section, Bibliographie
Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018)
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion
Book Section, Bibliographie
Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
eds.: Ojendal, Joakim ; Swain, Ashok (2018)
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding
Book Section, Bibliographie
Reuter, Christian
ed.: Reuter, Christian (2018)
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_1
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
ed.: Reuter, Christian (2018)
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_28
Book Section, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar
ed.: Reuter, Christian (2018)
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_22
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
ed.: Reuter, Christian (2018)
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
doi: 10.1007/978-3-658-19523-6_2
Book Section, Bibliographie
Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus
ed.: Wiemeyer, Josef (2018)
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas
eds.: Paterno, Fabio ; Wulf, Volker (2017)
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development
doi: 10.1007/978-3-319-60291-2_12
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker
eds.: Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (2017)
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38)
doi: 10.14220/digo.2017.38.1.207
Book Section, Bibliographie
Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian
eds.: Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (2017)
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation
doi: 10.1007/978-3-319-44711-7_7
Book Section, Bibliographie
Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario
eds.: Curry, Edward ; Wahlster, Wolfgang (2016)
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe
doi: 10.1007/978-3-319-21569-3
Book Section, Bibliographie
Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016)
Computational Security of Quantum Encryption.
In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016
Book Section, Bibliographie
Steinebach, Martin ; Yannikos, York ; Zmudzinski, Sascha ; Winter, Christian
eds.: Ho, Anthony ; Li, Shujun (2015)
Advanced Multimedia File Carving.
In: Handbook of Digital Forensics of Multimedia Data and Devices
Book Section, Bibliographie
Baluda, Mauro (2015)
EvoSE: Evolutionary Symbolic Execution.
In: 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015): Proceedings
Book Section, Bibliographie
Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
eds.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Book Section, Bibliographie
Othmane, Lotfi Ben ; Weffers, Harold ; Mohamad, Mohd Murtadha ; Wolf, Marko
eds.: Benhaddou, Driss ; Al-Fuqaha, Ala (2015)
Wireless Sensor and Mobile Ad-Hoc Networks.
Book Section, Bibliographie
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
eds.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Book Section, Bibliographie
Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014)
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Book Section, Bibliographie
Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
eds.: Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (2014)
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich
Book Section, Bibliographie
Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Book Section, Bibliographie
Neumann, Stephan ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
A Holistic Framework for the Evaluation of Internet Voting Systems.
Book Section, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
doi: 10.1145/2508859.2516738
Book Section, Bibliographie
Volkamer, Melanie ; Renaud, Karen
eds.: Fischlin, Marc ; Katzenbeisser, Stefan (2013)
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography
doi: 10.1007/978-3-642-42001-6_18
Book Section, Bibliographie
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section, Bibliographie
Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013)
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security
Book Section, Bibliographie
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
eds.: Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (2013)
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing
doi: 10.1007/s00200-013-0199-7
Book Section, Bibliographie
Olembo, Maina ; Volkamer, Melanie
eds.: Saeed, Saqib ; Reddick, Christopher (2013)
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
doi: 10.4018/978-1-4666-3640-8.ch011
Book Section, Bibliographie
Steinberger, Jessica ; Schehlmann, Lisa ; Abt, Sebastian ; Baier, Harald
eds.: Doyen, Guillaume ; Waldburger, Martin ; Čeleda, Pavel ; Sperotto, Anna ; Stiller, Burkhard (2013)
Anomaly Detection and Mitigation at Internet Scale: A Survey.
In: Emerging Management Mechanisms for the Future Internet
doi: 10.1007/978-3-642-38998-6_7
Book Section, Bibliographie
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Book Section, Bibliographie
Steinberger, Jessica ; Baier, Harald
ed.: Horster, Patrick (2013)
CADEMI - Cooperative Anomaly Detection and Mitigation.
In: D-A-CH Security 2013
Book Section, Bibliographie
Christin, Delphine ; Hollick, Matthias
eds.: Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (2013)
European Data Protection: Coming of Age.
Book Section, Bibliographie
Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
ed.: Buchmann, Johannes (2012)
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE)
Book Section, Bibliographie
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
eds.: Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (2012)
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP)
Book Section, Bibliographie
Zheng, Yudi ; Ansaloni, Danilo ; Marek, Lukas ; Sewe, Andreas ; Binder, Walter ; Villazón, Alex ; Tuma, Petr ; Qi, Zhengwei ; Mezini, Mira (2012)
Turbo DiSL: Partial Evaluation for High-level Bytecode Instrumentation.
In: Objects, Models, Components, Patterns
doi: 10.1007/978-3-642-30561-0_24
Book Section, Bibliographie
Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2012)
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications
Book Section, Bibliographie
Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
eds.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Book Section, Bibliographie
Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
eds.: Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von ; Max-Planck Institut für ausländisches und internationales Strafrecht (2012)
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie
Book Section, Bibliographie
Halvani, Oren ; Steinebach, Martin
eds.: Schartner, Peter ; Taeger, Jürgen (2012)
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven
Book Section, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Social Informatics 4th International Conference, SocInfo 2012, proceedings
doi: 10.1007/978-3-642-35386-4_15
Book Section, Bibliographie
Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
eds.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Book Section, Bibliographie
Martucci, Leonardo ; Fischer-Hübner, Simone
ed.: Poblet, Marta (2011)
Privacy for Reporters of Human Rights Abuses [to appear].
In: Mobile Technologies for Conflict Management. New Avenues for Online Dispute Resolution
Book Section, Bibliographie
Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
eds.: Bishop, Judith ; Vallecillo, Antonio (2011)
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
In: Objects, Models, Components, Patterns
doi: 10.1007/978-3-642-21952-8_11
Book Section, Bibliographie
Hamacher, Kay ; Katzenbeisser, Stefan (2011)
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011)
Book Section, Bibliographie
Paul, Thomas ; Buchegger, Sonja ; Strufe, Thorsten
ed.: Bianchi, Giuseppe (2011)
Handbook on the Trustworthy Internet.
Book Section, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Book Section, Bibliographie
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian (2011)
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems
Book Section, Bibliographie
Weber, Stefan ; Mühlhäuser, Max
eds.: Caballé, Santi ; Xhafa, Fatos ; Abraham, Ajith (2010)
Multilaterally Secure Ubiquitous Auditing.
In: Intelligent Networking, Collaborative Systems and Applications
doi: 10.1007/978-3-642-16793-5_10
Book Section, Bibliographie
Schindler, Werner
eds.: Biedermann, Alexander ; Molter, Gregor (2010)
Side-Channel Analysis - Mathematics has Met Engineering.
In: Design Methodologies for Secure Embedded Systems
Book Section, Bibliographie
Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
ed.: Li, Chang-Tsun (2010)
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
Book Section, Bibliographie
Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
In: Towards Hardware-Intrinsic Security: Foundations and Practice
Book Section, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (2010)
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory
Book Section, Bibliographie
Müller, Sascha ; Katzenbeisser, Stefan (2010)
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010)
Book Section, Bibliographie
Baier, Harald ; Busch, Christoph
ed.: Hochschule Darmstadt (3094) (2010)
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung
Book Section, Bibliographie
Volkamer, Melanie
eds.: Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (2010)
Data Protection in a Profiled World.
Book Section, Bibliographie
Khelil, Abdelmajid ; Germanus, Daniel ; Suri, Neeraj (2010)
Protection of SCADA Communication Channels.
Book Section, Bibliographie
Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie
Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie
Strufe, Thorsten (2010)
Profile Popularity in a Business-oriented Online Social Network.
In: Proceedings of the EuroSys Conference
Book Section, Bibliographie
Stoettinger, Marc ; Madlener, Felix ; Huss, Sorin
eds.: Platzner, Marco ; Teich, Jürgen ; Wehn, Norbert (2009)
Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications.
Book Section, Bibliographie
Charnes, Christopher
eds.: Atallah, Mikhail ; Blanton, Marina (2009)
Algorithms and Theory of Computation Handbook.
Book Section, Bibliographie
Schindler, Werner
ed.: Koc, Cetin (2009)
Random Number Generators for Cryptographic Applications.
In: Cryptographic Engineering
Book Section, Bibliographie
Schindler, Werner
ed.: Koc, Cetin (2009)
Evaluation Criteria for Physical Random Number Generators.
In: Cryptographic Engineering
Book Section, Bibliographie
Mogre, Parag S. ; Hollick, Matthias ; Schwingenschlögl, C. ; Ziller, A. ; Steinmetz, R.
eds.: Katz, Marcos ; Fitzek, Frank (2009)
WiMAX Mesh Architectures and Network Coding.
In: WiMAX Evolution: Emerging Technologies and Applications
Book Section, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (2009)
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography
Book Section, Bibliographie
Langer, Lucie (2009)
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement
Book Section, Bibliographie
Seberry, J. ; Charnes, C. ; Pieprzyk, J. ; Safavi-Naini, R.
eds.: Atallah, M. J. ; Blandon, M. (2009)
Crypto topics and applications II.
In: Algorithms and Theory of Computation Handbook
Book Section, Bibliographie
Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj (2009)
Threat Modeling and Dynamic Profiling.
Book Section, Bibliographie
Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006)
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections
doi: 10.5445/IR/1000081833
Book Section, Bibliographie
Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
eds.: Krimmer, Robert ; LNI, GI (2006)
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006
Book Section, Bibliographie
Book
Reuter, Christian (2022)
A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ Attitudes Towards Social Media for Public Safety and Security.
doi: 10.1007/978-3-658-39720-3
Book, Bibliographie
Pelz, P. F. ; Groche, Peter ; Pfetsch, Marc E. ; Schäffner, Maximilian Frederic (2021)
Mastering Uncertainty in Mechanical Engineering.
doi: 10.1007/978-3-030-78354-9
Book, Bibliographie
Bock, Carolin ; Kurz, Konstantin ; Madina, Iliyana ; Bejan, Julia ; Bürger, Robin ; Rockel, Jens (2021)
Crowdfunding in Zeiten von COVID-19: Ein geeignetes Finanzinstrument in der Krise?
doi: 10.24406/publica-fhg-301034
Book, Bibliographie
Kaufhold, Marc-André (2021)
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps.
Book, Bibliographie
ed.: Reuter, Christian (2021)
Sicherheitskritische Mensch-Computer-Interaktion : Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
doi: 10.1007/978-3-658-32795-8
Book, Bibliographie
Knauf, Alice (2020)
Urbane Resilienz gegenüber Stromausfällen in deutschen Großstädten.
doi: 10.1007/978-3-658-31254-1
Book, Bibliographie
ed.: Reuter, Christian (2019)
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
doi: 10.1007/978-3-658-25652-4
Book, Bibliographie
Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019)
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen.
Book, Bibliographie
Reuter, Christian (2019)
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Book, Bibliographie
ed.: Reuter, Christian (2018)
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
doi: 10.1007/978-3-658-19523-6
Book, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Homomorphic Signature Schemes - A survey.
doi: 10.1007/978-3-319-32115-8
Book, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Book, Bibliographie
Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015)
Automated Software Diversity.
doi: 10.2200/S00686ED1V01Y201512SPT014
Book, Bibliographie
Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015)
Certification of ICTs in Elections.
Book, Bibliographie
Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014)
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
doi: 10.2200/S00622ED1V01Y201412SPT012
Book, Bibliographie
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Book, Bibliographie
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book, Bibliographie
ed.: Buchmann, Johannes (2013)
Internet Privacy: Options for adequate realization.
Book, Bibliographie
eds.: Effelsberg, Wolfgang ; Steinmetz, Ralf ; Strufe, Thorsten (2013)
Benchmarking Peer-to-Peer Systems - Understanding Quality of Service in Large-Scale Distributed Systems.
Book, Bibliographie
Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012)
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
doi: 10.1007/978-3-642-30921-2
Book, Bibliographie
ed.: Buchmann, Johannes (2012)
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme - A multidisciplinary analysis.
Book, Bibliographie
Weber, Stefan (2012)
Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing.
doi: 10.3233/978-1-61499-157-1-i
Book, Bibliographie
Buchmann, Johannes (2010)
Einführung in die Kryptographie / Introduction to Cryptography.
Book, Bibliographie
Bulygin, Stanislav (2009)
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Book, Bibliographie
Volkamer, Melanie (2009)
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Book, Bibliographie
ed.: Fischlin, Marc (2009)
Topics in cryptology : proceedings / CT RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20 - 24, 2009.
Book, Bibliographie
Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000)
SEMPER - Secure Electronic Marketplace for Europe.
Book, Bibliographie
Conference or Workshop Item
Putz, Florentin ; Haesler, Steffen ; Völkl, Thomas ; Gehring, Maximilian ; Rollshausen, Nils ; Hollick, Matthias (2024)
PairSonic: Helping Groups Securely Exchange Contact Information.
27th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2024). San Jose, Costa Rica (09.11.2024-13.11.2024)
doi: 10.1145/3678884.3681818
Conference or Workshop Item, Bibliographie
Leierzopf, Ernst ; Mayrhofer, René ; Roland, Michael ; Studier, Wolfgang ; Dean, Lawrence ; Seiffert, Martin ; Putz, Florentin ; Becker, Lucas ; Thomas, Daniel (2024)
A Data-Driven Evaluation of the Current Security State of Android Devices.
2024 IEEE Conference on Communications and Network Security (CNS). Taipei, Taiwan (30.09.2024 - 03.10.2024)
doi: 10.1109/CNS62487.2024.10735682
Conference or Workshop Item, Bibliographie
Gölz, Martin ; Baudenbacher, Luca O. ; Zoubir, Abdelhak M. ; Koivunen, Visa (2024)
Spatial Inference Network: Indoor Proximity Detection via Multiple Hypothesis Testing.
32nd European Signal Processing Conference (EUSIPCO 2024). Lyon, France (26.08.2024 - 30.08.2024)
Conference or Workshop Item, Bibliographie
Doula, Achref ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2024)
AR-CP: Uncertainty-Aware Perception in Adverse Conditions with Conformal Prediction and Augmented Reality For Assisted Driving.
2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW 2024). Seattle, USA (17.06.2024-18.06.2024)
doi: 10.1109/CVPRW63382.2024.00026
Conference or Workshop Item, Bibliographie
Cao, Zhengxin ; Zhang, Jing ; Xiang, Lin ; Ge, Xiaohu (2024)
Outage Probability Analysis of Multi-Connectivityin UAV-Assisted Urban mmWave Communication.
35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'24). Valencia, Spain (02.09.2024 - 05.09.2024)
Conference or Workshop Item, Bibliographie
Gan, S. ; Chen, K. ; Zhang, J. ; Xiang, Lin ; Ng, W. K. ; Ge, Xiaohu (2024)
Completion Time Minimization for Adaptive Semi-Asynchronous Federated Learning over Wireless Networks,.
35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'24). Valencia, Spain (02.09.2024 - 05.09.2024)
Conference or Workshop Item, Bibliographie
Khazaeiathar, Mahshid ; Schmalz, Britta
eds.: Park, Jeehyun ; ETH Zürich (2024)
Enhancing Short-Term Discharge Predictions: An innovative ARIMA-iGARCH Model for Improved Flood Forecasting and Disaster Resilience.
5th International Conference on Resilient Systems (ICRS 2024). Singapore, Singapore (28.08.2024-30.08.2024)
doi: 10.3929/ethz-b-000696625
Conference or Workshop Item, Bibliographie
Dongare, Sumedh Jitendra ; Jovovich, Aleksandar ; De Sombre, Wanja ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2024)
Minimizing the Age of Incorrect Information for Status Update Systems with Energy Harvesting.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
doi: 10.1109/ICC51166.2024.10622719
Conference or Workshop Item, Bibliographie
Pei, Fengcheng ; Xiang, Lin ; Klein, Anja (2024)
Joint Optimization of Beamforming and 3D Array-Steering for UAV-Aided ISAC.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
doi: 10.1109/ICC51166.2024.10622806
Conference or Workshop Item, Bibliographie
Dongare, Sumedh Jitendra ; Simon, Bernd ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2024)
Two-Sided Learning: A Techno-Economic View of Mobile Crowdsensing under Incomplete Information.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
Conference or Workshop Item, Bibliographie
Wang, Yi ; Krantzik, Markus ; Xiang, Lin ; Klein, Anja (2024)
Joint Communication and Computing Optimization for Digital Twin Synchronization with Aerial Relay.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
doi: 10.1109/ICC51166.2024.10622630
Conference or Workshop Item, Bibliographie
Pyttel, Friedrich ; De Sombre, Wanja ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2024)
Age of Information Minimization in Status Update Systems with Imperfect Feedback Channel.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
doi: 10.1109/ICC51166.2024.10622227
Conference or Workshop Item, Bibliographie
Stenglein, Hans ; Faulwasser, Timm ; Steinke, Florian (2024)
Robust and Chance-Constrained Dispatch Policies for Linear Power Systems.
The 12th IFAC Symposium on Control of Power & Energy Systems. Rabat, Marokko (10.07.2024 - 12.07.2024)
doi: 10.1016/j.ifacol.2024.07.463
Conference or Workshop Item, Bibliographie
Wirth, Maximilian ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2024)
Risk-Aware Bandits for Digital Twin Placement in Non-Stationary Mobile Edge Computing.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
doi: 10.1109/ICCWorkshops59551.2024.10615914
Conference or Workshop Item, Bibliographie
Yilmaz, Burak ; Xiang, Lin ; Klein, Anja (2024)
Joint Beamforming and Trajectory Optimization for UAV-Enabled ISAC under a Finite Energy Budget.
59th IEEE Internartional Conference on Communications (ICC'24). Denver, USA (09.06.2024 - 13.06.2024)
doi: 10.1109/ICCWorkshops59551.2024.10615353
Conference or Workshop Item, Bibliographie
Pastorek, Andrej ; Tundis, Andrea (2024)
Navigating the landscape of IoT security and associated risks in critical infrastructures.
19th International Conference on Availability, Reliability and Security (ARES2024). Vienna, Austria (30.07.2024 - 02.08.2024)
doi: 10.1145/3664476.3669979
Conference or Workshop Item, Bibliographie
Xiang, Lin ; Pei, Fengcheng ; Klein, Anja (2024)
Joint Optimization of Beamforming and 3D Array Steering for Multi-antenna UAV Communications.
25th IEEE Wireless Communications and Networking Conference (WCNC2024). Dubai, UAE (21.04.2024 - 24.04.2024)
doi: 10.1109/WCNC57260.2024.10570943
Conference or Workshop Item, Bibliographie
Delbari, Mohamadreza ; Neuder, Robin ; Jiménez-Sáez, Alejandro ; Asadi, Arash ; Jamali, Vahid (2024)
Fast Transition-Aware Reconfiguration of Liquid Crystal-based RISs.
IEEE 2024 International Conference on Communications. Denver, USA (09.06.2024 - 13.06.2024)
Conference or Workshop Item, Bibliographie
Mechler, Vincenz ; Wiegand, Felix ; Hollick, Matthias ; Bloessl, Bastian (2024)
Always On Air: Adaptive Physical Layer Switching For Uninterrupted UAV Air-to-Ground Communication.
22nd Annual International Conference on Mobile Systems, Applications and Services (MOBISYS '24). Tokyo, Japan (03.06.2024 - 07.06.2024)
doi: 10.1145/3661810.3663467
Conference or Workshop Item, Bibliographie
Granzow, Max ; Heinrich, Alexander ; Hollick, Matthias ; Zimmerling, Marco (2024)
Leveraging Apple's Find My Network for Large-Scale Distributed Sensing.
22nd Annual International Conference on Mobile Systems, Applications and Services. Tokyo, Japan (03.06.2024 - 07.06.2024)
doi: 10.1145/3643832.3661412
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Gilcher, Jan ; Govinden, Jérôme ; Paterson, Kenneth G. (2024)
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
45th IEEE Symposium on Security and Privacy. San Francisco, USA (19.05.2024-23.05.2024)
doi: https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00132
Conference or Workshop Item, Bibliographie
Yilmaz, Mustafa Burak ; Xiang, Lin ; Klein, Anja (2024)
Joint Beamforming and Trajectory Optimization for UAV-Aided ISAC with Dipole Antenna Array.
27th International Workshop on Smart Antennas (WSA2024). Dresden, Germany (17.05.2024 - 19.05.2024)
Conference or Workshop Item, Bibliographie
Fabian, Christian ; Cui, Kai ; Koeppl, Heinz (2024)
Learning Mean Field Games on Sparse Graphs: A Hybrid Graphex Approach.
12th International Conference on Learning Representations (ICLR 2024). Vienna, Austria (07.05.2024 - 11.05.2024)
Conference or Workshop Item, Bibliographie
Cui, Kai ; Hauck, Sascha ; Fabian, Christian ; Koeppl, Heinz (2024)
Learning Decentralized Partially Observable Mean Field Control for Artificial Collective Behavior.
12th International Conference on Learning Representations (ICLR 2024). Vienna, Austria (07.05.2024 - 11.05.2024)
Conference or Workshop Item, Bibliographie
Cui, Kai ; Dayanikli, Gökce ; Laurière, Mathieu ; Geist, Matthieu ; Pietquin, Oliver ; Koeppl, Heinz (2024)
Learning Discrete-Time Major-Minor Mean Field Games.
38th AAAI Conference on Artificial Intelligence. Vancouver, Canada (20.02.2024 - 27.02.2024)
doi: 10.1609/aaai.v38i9.28818
Conference or Workshop Item, Bibliographie
Kreutz, Thomas ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2024)
Common Sense Initialization of Mixture Density Networks for Motion Planning with Overestimated Number of Components.
12th International Conference on Learning Representations (ICLR 2024). Vienna, Austria (07.05.2024-11.05.2024)
Conference or Workshop Item, Bibliographie
Bhaumik, Ritam ; Chakraborty, Bishwajit ; Choi, Wonseok ; Dutta, Avijit ; Govinden, Jérôme ; Shen, Yaobin (2024)
The Committing Security of MACs with Applications to Generic Composition.
44th Annual International Cryptology Conference (CRYPTO 2024). Santa Barbara, USA (18.-22.08.2024)
Conference or Workshop Item, Bibliographie
Tundis, Andrea ; Ramirez Agudelo, Oscar Hernan (2024)
Safeguarding Critical Infrastructures with Digital Twins and AI.
23rd International Conference on Modelling and Applied Simulation. Tenerife, Spain (18.09.2924 - 20.09.2024)
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme (2023)
The Indifferentiability of the Duplex and Its Practical Applications.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.12.2023-08.12.2023)
doi: 10.1007/978-981-99-8742-9_8
Conference or Workshop Item, Bibliographie
Machkour, Jasin ; Muma, Michael ; Palomar, Daniel P. (2023)
The Informed Elastic Net for Fast Grouped Variable Selection and FDR Control in Genomics Research.
9th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. Herradura, Costa Rica (10.12. - 13.12.2023)
doi: 10.1109/CAMSAP58249.2023.10403489
Conference or Workshop Item, Bibliographie
Scheidt, Fabian ; Machkour, Jasin ; Muma, Michael (2023)
Solving FDR-Controlled Sparse Regression Problems with Five Million Variables on a Laptop.
9th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. Herradura, Costa Rica (10.12.2023 - 13.12.2023)
doi: 10.1109/CAMSAP58249.2023.10403478
Conference or Workshop Item, Bibliographie
Biri, Andreas ; Zimmerling, Marco ; Thiele, Lothar (2023)
Demos: Robust Orchestration for Autonomous Networking.
2023 International Conference on Embedded Wireless Systems and Networks. Rende, Italien (25.09.2023 - 27.09.2023)
Conference or Workshop Item, Bibliographie
Dongare, Sumedh ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2023)
Federated Deep Reinforcement Learning for Task Participation in Mobile Crowdsensing.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.12.2023-08.12.2023)
doi: 10.1109/GLOBECOM54140.2023.10436786
Conference or Workshop Item, Bibliographie
Wang, Yi ; Xiang, Lin ; Klein, Anja (2023)
Energy-Constrained UAV Trajectory Design for Sensing Information Maximization.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.12.2023-08.12.2023)
Conference or Workshop Item, Bibliographie
De Sombre, Wanja ; Marques, Felipe ; Pyttel, Friedrich ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2023)
A Unified Approach to Learn Transmission Strategies Using Age-Based Metrics in Point-to-Point Wireless Communication.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.12.2023-08.12.2023)
Conference or Workshop Item, Bibliographie
Xiang, Lin ; Zhang, Mengshuai ; Klein, Anja (2023)
Robust Dynamic Trajectory Optimization for UAV-Aided Localization of Ground Target.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.12.2023-08.12.2023)
doi: 10.1109/GLOBECOM54140.2023.10437337
Conference or Workshop Item, Bibliographie
Wirth, Maximilian ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2023)
Contextual Multi-Armed Bandits for Non-Stationary Heterogeneous Mobile Edge Computing.
2023 IEEE Global Communications Conference. Kuala Lumpur, Malaysia (04.12.2023-08.12.2023)
doi: 10.1109/GLOBECOM54140.2023.10437572
Conference or Workshop Item, Bibliographie
Doula, Achref ; Schmidt, Lennart ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2023)
"Can You Handle the Truth?": Investigating the Effects of AR-Based Visualization of the Uncertainty of Deep Learning Models on Users of Autonomous Vehicles.
22nd IEEE International Symposium on Mixed and Augmented Reality (ISMAR 2023 ). Sydney, Australia (16.10.2023 - 20.10.2023)
doi: 10.1109/ismar59233.2023.00040
Conference or Workshop Item, Bibliographie
Bark, Frederik ; Daun, Kevin ; Stryk, Oskar von (2023)
Affordance-based Actionable Semantic Mapping and Planning for
Mobile Rescue Robots.
2023 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR'23). Fukushima, Japan (13.11.-15.11.2023)
doi: 10.1109/SSRR59696.2023.10499938
Conference or Workshop Item, Bibliographie
Daun, Kevin ; Stryk, Oskar von (2023)
Requirements and challenges for autonomy and assistance functions for ground rescue robots in reconnaissance missions.
2023 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR'23). Fukushima, Japan (13.11.-15.11.2023)
doi: 10.1109/SSRR59696.2023.10499930
Conference or Workshop Item, Bibliographie
Süß, Jonas ; Volz, Martin ; Daun, Kevin ; Stryk, Oskar von (2023)
Online 2D-3D Radiation Mapping and Source Localization using Gaussian Processes with Mobile Ground Robots.
2023 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR'23). Fukushima, Japan (13.11.-15.11.2023)
doi: 10.1109/SSRR59696.2023.10499940
Conference or Workshop Item, Bibliographie
Fabian, Stefan ; Stryk, Oskar von (2023)
Hector UI: A Flexible Human-Robot User Interface for (Semi-)Autonomous Rescue and Inspection Robots.
2023 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR'23). Fukushima, Japan (13.11.-15.11.2023)
doi: 10.1109/SSRR59696.2023.10499954
Conference or Workshop Item, Bibliographie
Taştan, Aylin ; Muma, Michael ; Ollila, Esa ; Zoubir, Abdelhak M. (2023)
Sparsity-Aware Block Diagonal Representation for Subspace Clustering.
31st European Signal Processing Conference (EUSIPCO 2023). Helsinki, Finland (04.09.2023-08.09.2023)
doi: 10.23919/EUSIPCO58844.2023.10289969
Conference or Workshop Item, Bibliographie
Emrich, Jonas ; Koka, Taulant ; Wirth, Sebastian ; Muma, Michael (2023)
Accelerated Sample-Accurate R-Peak Detectors Based on Visibility Graphs.
31st European Signal Processing Conference (EUSIPCO). Helsinki, Finland (04.09.2024 - 08.09.2023)
doi: 10.23919/EUSIPCO58844.2023.10290007
Conference or Workshop Item, Bibliographie
Oehler, Martin ; Stryk, Oskar von (2023)
Accurate Pose Prediction on Signed Distance Fields for Mobile Ground Robots in Rough Terrain.
2023 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR'23). Fukushima, Japan (13.11. - 15.11.2023)
doi: 10.1109/SSRR59696.2023.10499944
Conference or Workshop Item, Bibliographie
Zivkovic, Marco ; Franken, Jonas ; Thiessen, Nadja ; Engels, Jens Ivo ; Reuter, Christian
ed.: Disaster Competence Network Austria (DCNA) (2023)
Infrastrukturen und historisches Wissen: Eine interdisziplinäre Analyse der Resilienz von Schienen- und Kabelnetzen.
Fachtagung Katastrophenforschung 2023. Montanuniversität Leoben (11.09.2023-12.09.2023)
Conference or Workshop Item, Bibliographie
Ishtiaq, Afifa ; Asadi, Arash ; Khaloopour, Ladan ; Ahmed, Waqar ; Jamali, Vahid ; Hollick, Matthias (2023)
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries.
Conference on Communications and Network Security (CNS 2023). Orlando, USA (02.10.2023-05.10.2023)
doi: 10.1109/CNS59707.2023.10289003
Conference or Workshop Item, Bibliographie
De Sombre, Wanja ; Ortiz Jimenez, Andrea Patricia ; Aurzada, Frank ; Klein, Anja (2023)
Risk-Sensitive Optimization and Learning for Minimizing Age of Information in Point-to-Point Wireless Communications.
2023 IEEE International Conference on Communications Workshop. Rome, Italy (28.05.2023-01.06.2023)
doi: 10.1109/ICCWorkshops57953.2023.10283567
Conference or Workshop Item, Bibliographie
Mehler, Helena ; Simon, Bernd ; Klein, Anja (2023)
Online Learning in Matching Games for Task Offloading in Multi-Access Edge Computing.
58th International Conference on Communications. Rome, Italy (28.05.2023-01.06.2023)
doi: 10.1109/ICC45041.2023.10279031
Conference or Workshop Item, Bibliographie
Wang, Yi ; Xiang, Lin ; Klein, Anja (2023)
Completion Time Minimization for UAV-Based Communications with a Finite Buffer.
IEEE International Conference on Communication. Rome, Italy (28.05.2023-01.06.2023)
doi: 10.1109/ICC45041.2023.10278804
Conference or Workshop Item, Bibliographie
Salariseddigh, Mohammad J. ; Jamali, Vahid ; Pereg, Uzi ; Boche, Holger ; Deppe, Christian ; Schober, Robert (2023)
Deterministic Identification for MC ISI-Poisson Channel.
ICC 2023 - IEEE International Conference on Communications. Rome, Italy (28.05.2023 - 01.06.2023)
doi: 10.1109/ICC45041.2023.10278856
Conference or Workshop Item, Bibliographie
Willich, Julius von ; Günther, Sebastian ; Matviienko, Andrii ; Schmitz, Martin ; Müller, Florian ; Mühlhäuser, Max (2023)
DensingQueen: Exploration Methods for Spatial Dense Dynamic Data.
11th ACM Symposium on Spatial User Interaction. Sydney, Australia (13.10.2023-15.10.2023)
doi: 10.1145/3607822.3614535
Conference or Workshop Item, Bibliographie
Leinweber, Hermann ; Crystall, Jonatan ; Hessel, Frank ; Putz, Florentin ; Hollick, Matthias (2023)
Introducing FreeSpeaker - A Modular Smart Home Hub Prototyping Platform.
29th Annual International Conference on Mobile Computing and Networking (ACM MobiCom '23). Madrid, Spain (02.10.2023-05.10.2023)
doi: 10.1145/3570361.3614080
Conference or Workshop Item, Bibliographie
Volz, David ; Koch, Andreas ; Bloessl, Bastian (2023)
Software-Defined Wireless Communication Systems for Heterogeneous Architectures.
29th Annual International Conference on Mobile Computing and Networking (ACM MobiCom '23). Madrid, Spain (02.10.2023 - 06.10.2023)
doi: 10.1145/3570361.3614084
Conference or Workshop Item, Bibliographie
Leierzopf, Ernst ; Roland, Michael ; Mayrhofer, René ; Putz, Florentin (2023)
A Large-Scale Data Collection and Evaluation Framework for Android Device Security Attributes.
31st Interdisciplinary Information Management Talks. Hradec Králové, Czech Republic (06.09.2023-08.09.2023)
doi: 10.35011/IDIMT-2023-63
Conference or Workshop Item, Bibliographie
Sterz, Artur ; Klose, Robin ; Sommer, Markus ; Höchst, Jonas ; Link, Jakob ; Simon, Bernd ; Klein, Anja ; Hollick, Matthias ; Freisleben, Bernd (2023)
Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks.
48th Conference on Local Computer Networks. Daytona Beach, USA (02.10.2023-05.10.2023)
doi: 10.1109/LCN58197.2023.10223400
Conference or Workshop Item, Bibliographie
Cui, Kai ; Baumgärtner, Lars ; Yilmaz, Mustafa Burak ; Li, Mengguang ; Fabian, Christian ; Becker, Benjamin ; Xiang, Lin ; Bauer, Maximilian ; Koeppl, Heinz (2023)
UAV Swarms for Joint Data Ferrying and Dynamic Cell Coverage via Optimal Transport Descent and Quadratic Assignment.
48th Conference on Local Computer Networks. Daytona Beach, USA (02.10.2023 - 05.10.2023)
doi: 10.1109/LCN58197.2023.10223388
Conference or Workshop Item, Bibliographie
Zhang, Jing ; Zheng, Jinke ; Xiang, Lin ; Ge, Xiaohu (2023)
Risk-aware Online Optimization of Cross-Layer Resource Allocation in Next-Generation WLANs.
2023 IEEE/CIC International Conference on Communications in China. Dalian, Peoples Repuplic of CHina (10.08.2023 - 12.08.2023)
doi: 10.1109/ICCC57788.2023.10233666
Conference or Workshop Item, Bibliographie
López Díaz, María ; Tundis, Andrea (2023)
Combining TAPAS and SUMO towards crises management based on traffic data.
22nd International Conference on Modeling and Applied Simulation. Athens, Greece (18.09.2023-20.09.2023)
doi: 10.46354/i3m.2023.mas.005
Conference or Workshop Item, Bibliographie
Gargari, Amir Ashtari ; Ortiz Jimenez, Andrea Patricia ; Pagin, Matteo ; Klein, Anja ; Hollick, Matthias ; Zorzi, Michele ; Asadi, Arash (2023)
Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks.
42nd IEEE Conference on Computer Communications (INFOCOM 2023). New York City, USA (17.05.2023 - 20.05.2023)
doi: 10.1109/INFOCOM53939.2023.10228969
Conference or Workshop Item, Bibliographie
Salariseddigh, Mohammad Javad ; Jamali, Vahid ; Boche, Holger ; Deppe, Christian ; Schober, Robert (2023)
Deterministic Identification for MC Binomial Channel.
2023 IEEE International Symposium on Information Theory (ISIT). Taipei, Taiwan (25.06.2023 - 30.06.2023)
doi: 10.1109/ISIT54713.2023.10206627
Conference or Workshop Item, Bibliographie
Zhang, Jing ; Liu, Jing ; Xiang, Lin ; Ge, Xiaohu (2023)
Full-Link AoI Analysis of Uplink Transmission in Next-Generation FTTR WLAN.
97th Vehicular Technology Conference. Florence, Italy (20.06.2023 - 23.06.2023)
doi: 10.1109/VTC2023-Spring57618.2023.10200633
Conference or Workshop Item, Bibliographie
Machkour, Jasin ; Muma, Michael ; Palomar, Daniel P. (2023)
False Discovery Rate Control for Fast Screening of Large-Scale Genomics Biobanks.
22nd IEEE Statistical Signal Processing Workshop. Hanoi, Vietnam (02.07. - 05.07.2023)
doi: 10.1109/SSP53291.2023.10207957
Conference or Workshop Item, Bibliographie
Ahmed, Sajeel ; Esbel, Ousama ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2023)
Towards Continual Knowledge Learning of Vehicle CAN-data.
IEEE Intelligent Vehicles Symposium (IV 2023). Anchorage, Alaska (04.06.2023 – 07.06.2023)
doi: 10.1109/iv55152.2023.10186715
Conference or Workshop Item, Bibliographie
Haesler, Steffen ; Wendelborn, Marc ; Reuter, Christian (2023)
Getting the Residents' Attention: The Perception of Warning Channels in Smart Home Warning Systems.
2023 Designing Interactive Systems Conference. Pittsburgh, USA (10.07.2023-14.07.2023)
doi: 10.1145/3563657.3596076
Conference or Workshop Item, Bibliographie
Schroth, Christian A. ; Vlaski, Stefan ; Zoubir, Abdelhak M. (2023)
Attacks on Robust Distributed Learning Schemes via Sensitivity Curve Maximization.
24th International Conference on Digital Signal Processing. Rhodes, Greece (11.06.2023-13.06.2023)
doi: 10.1109/DSP58604.2023.10167919
Conference or Workshop Item, Bibliographie
Eckrich, Christian ; Schroth, Christian A. ; Jamali, Vahid ; Zoubir, Abdelhak M. (2023)
Radar Based Humans Localization with Compressed Sensing and Sparse Reconstruction.
24th International Conference on Digital Signal Processing. Rhodes, Greece (11.06.2023-13.06.2023)
doi: 10.1109/DSP58604.2023.10167990
Conference or Workshop Item, Bibliographie
Cui, K. ; Li, M. ; Fabian, C. ; Koeppl, H. (2023)
Scalable Task-Driven Robotic Swarm Control via Collision Avoidance and Learning Mean-Field Control.
40th IEEE International Conference on Robotics and Automation (ICRA2023). London, United Kingdom (29.05.2023 - 02.06.2023)
doi: 10.1109/ICRA48891.2023.10161498
Conference or Workshop Item, Bibliographie
Doula, Achref ; Güdelhöfer, Tobias ; Matviienko, Andrii ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2023)
PointCloudLab: An Environment for 3D Point Cloud Annotation with Adapted Visual Aids and Levels of Immersion.
40th IEEE International Conference on Robotics and Automation (ICRA2023). London, United Kingdom (29.05.2023 - 02.06.2023)
doi: 10.1109/icra48891.2023.10160225
Conference or Workshop Item, Bibliographie
Schurig, Roland ; Himmel, Andreas ; Mešanović, Amer ; Braatz, Richard D. ; Findeisen, Rolf (2023)
Estimating Parameter Regions for Structured Parameter Tuning via Reduced Order Subsystem Models.
2023 American Control Conference. San Diego, USA (31.05.2023-02.06.2023)
doi: 10.23919/ACC55779.2023.10156542
Conference or Workshop Item, Bibliographie
Jamali, Vahid ; Ghanem, Walid ; Schober, Robert ; Poor, H. Vincent (2023)
Impact of Channel Models on Performance Characterization of RIS-Assisted Wireless Systems.
17th European Conference on Antennas and Propagation (EuCAP 2023). Florence, Italy (26.03.2023-31.03.2023)
doi: 10.23919/EuCAP57121.2023.10133758
Conference or Workshop Item, Bibliographie
Biri, Andreas ; Da Forno, Reto ; Kuonen, Tobias ; Mager, Fabian ; Zimmerling, Marco ; Thiele, Lothar (2023)
Hydra: Concurrent Coordination for Fault-tolerant Networking.
22nd International Conference on Information Processing in Sensor Networks (IPSN'23). San Antonio, USA (09.05.2023. - 12.05.2023)
doi: 10.1145/3583120.3587047
Conference or Workshop Item, Bibliographie
Geissdörfer, Kai ; Splitt, Ingmar ; Zimmerling, Marco (2023)
Demo Abstract: Building Battery-free Devices with Riotee.
22nd International Conference on Information Processing in Sensor Networks. San Antonio, USA (09.05.2023 - 12.05.2023)
doi: 10.1145/3583120.3589808
Conference or Workshop Item, Bibliographie
Schroth, Christian A. ; Vlaski, Stefan ; Zoubir, Abdelhak M. (2023)
Robust M-Estimation Based Distributed Expectation Maximization Algorithm with Robust Aggregation.
2023 IEEE International Conference on Acoustics, Speech and Signal Processing. Rhodes Island, Greece (04.06.2023-10.06.2023)
doi: 10.1109/ICASSP49357.2023.10096191
Conference or Workshop Item, Bibliographie
Liu, Chen ; Pfeiffer, Jonas ; Korhonen, Anna ; Vulic, Ivan ; Gurevych, Iryna (2023)
Delving Deeper into Cross-lingual Visual Question Answering.
17th Conference of the European Chapter of the Association for Computational Linguistics. Dubrovnik, Croatia (02.05.2023-06.05.2023)
doi: 10.18653/v1/2023.findings-eacl.186
Conference or Workshop Item, Bibliographie
Bohlender, B. ; Mühlhäuser, M. ; Sanchez Guinea, A. (2023)
Quick-Pro-Build: A Web-based Approach for Quick Procedural 3D Reconstructions of Buildings.
44th Annual Conference of the European Assocoation for Computer Graphics (EUROGRAPHICS 2023). Saarbrücken, Germany (08.05.2023 - 12.05.2023)
doi: 10.2312/egs.20231001
Conference or Workshop Item, Bibliographie
Würsching, Leon ; Putz, Florentin ; Haesler, Steffen ; Hollick, Matthias (2023)
FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones.
ACM 2023 CHI Conference on Human Factors in Computing Systems. Hamburg, Germany (23.04.2023-28.04.2023)
doi: 10.1145/3544548.3580993
Conference or Workshop Item, Bibliographie
Koopaeidar, Mehdi ; Schmalz, Britta (2023)
Concept of a smart environmental monitoring and flood warning system.
Tag der Hydrologie 2023: Nachhaltiges Wassermanagement - Regionale und Globale Strategien. Bochum, Germany (21.03.-23.03.2023)
Conference or Workshop Item, Bibliographie
Böck, Leon ; Levin, Dave ; Padmanabhan, Ramakrishna ; Doerr, Christian ; Mühlhäuser, Max (2023)
How to Count Bots in Longitudinal Datasets of IP Addresses.
Conference or Workshop Item, Bibliographie
Kreutz, Thomas ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2023)
Unsupervised 4D LiDAR Moving Object Segmentation in Stationary Settings with Multivariate Occupancy Time Series.
2023 IEEE/CVF Winter Conference on Applications of Computer Vision. Hawaii, USA (03.01.2023-07.01.2023)
doi: 10.1109/WACV56688.2023.00169
Conference or Workshop Item, Bibliographie
Tahir, A. ; Cui, K. ; Koeppl, H. (2023)
Learning Mean-Field Control for Delayed Information Load Balancing in Large Queuing Systems.
51st International Conference on Parallel Processing. Bordeaux, France (29.08.2022 - 01.09.2022)
doi: 10.1145/3545008.3545025
Conference or Workshop Item, Bibliographie
eds.: Schulze, Joachim ; Rudolph-Cleff, Annette (2023)
Designing Resilience Global (DRG) - International Symposium and Competition - Documentation.
Designing Resilience Global (DRG) International Symposium and Competition. Virtuell (20.06.2022-24.06.2022)
doi: 10.26083/tuprints-00023774
Conference or Workshop Item, Primary publication, Publisher's Version
Scheck, Markus ; Putz, Florentin ; Hessel, Frank ; Leinweber, Hermann ; Crystall, Jonatan ; Hollick, Matthias (2023)
DEMO: Secure Bootstrapping of Smart Speakers Using Acoustic Communication.
WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Guildford, Surrey, United Kingdom (29.05.2023-01.06.2023)
doi: 10.26083/tuprints-00024180
Conference or Workshop Item, Primary publication, Publisher's Version
Schulze, Joachim ; Sauer, Tom ; Rudolph-Cleff, Annette ; Knodt, Michèle
ed.: Haahr, Mads (2023)
Knowledge Transfer in Disaster Risk Management (DRM): Design of a Serious Game.
9th Joint International Conference on Serious Games (JCSG 2023). Dublin, Ireland (October 26–27, 2023)
doi: 10.1007/978-3-031-44751-8_35
Conference or Workshop Item, Bibliographie
Bauer, Maximilian ; Alhamwy, Yasin ; Geihs, Kurt (2023)
Persistent UAV formation flight by dynamic agent replacement and leader selection.
2023 2nd International Conference on Intelligent Systems Design and Engineering Applications (ISDEA 2023). Okayama (12.05.2023 - 14.05.2023)
doi: 10.1007/978-981-99-6303-4_9
Conference or Workshop Item, Bibliographie
Schmidt, Daniel ; Kuntke, Franz ; Bauer, Maximilian ; Baumgärtner, Lars (2023)
BPoL: a disruption-tolerant LoRa network for disaster communication.
IEEE Global Humanitarian Technology Conference (GHTC). Radnor, PA, USA (12.10.2023 - 15.10.2023)
doi: 10.1109/ghtc56179.2023.10354717
Conference or Workshop Item, Bibliographie
Baumgärtner, Lars ; Bauer, Maximilian ; Bloessl, Bastian (2023)
SUN: a simulated UAV network testbed with hardware-in-the-loop SDR support.
IEEE Wireless Communications and Networking Conference (WCNC). Glasgow, United Kingdom (26.03.2023 - 29.03.2023)
doi: 10.1109/wcnc55385.2023.10119014
Conference or Workshop Item, Bibliographie
Fabian, Christian ; Cui, Kai ; Koeppl, Heinz
eds.: Ruiz, Francisco ; Dy, Jennifer ; van de Meent, Jan-Willem (2023)
Learning Sparse Graphon Mean Field Games.
26th International Conference on Artificial Intelligence and Statistics. Valencia, Spain (25.04.2023 - 27.04.2023)
Conference or Workshop Item, Bibliographie
Franken, Jonas ; Zivkovic, Marco ; Thiessen, Nadja ; Engels, Jens Ivo ; Reuter, Christian (2023)
Das Netz hat Geschichte.
INFORMATIK 2023 - 53. Jahrestagung der Gesellschaft für Informatik e.V.. Berlin, Germany (26.09.2023 - 29.09.2023)
doi: 10.18420/inf2023_159
Conference or Workshop Item, Bibliographie
Sattler, Bernhard Jonathan ; Stadler, Jannik ; Tundis, Andrea ; Friesen, John ; Pelz, Peter F. (2023)
A framework for the simulation-based selection of social models for socio-technical models of infrastructures using technical requirements analysis.
International Conference on Modelling and Applied Simulation (MAS 2023). Athens, Greece (18.09.2023 - 20.09.2023)
doi: 10.46354/i3m.2023.mas.010
Conference or Workshop Item, Bibliographie
Yilmaz, Burak ; Xiang, Lin ; Klein, Anja (2022)
UAV-Assisted Delay-Sensitive Communications with Uncertain User Locations: A Cost Minimization Approach.
33rd International Symposium on Personal, Indoor and Mobile Radio Communications. virtual Conference (12.09.2022-15.09.2022)
doi: 10.1109/PIMRC54779.2022.9977912
Conference or Workshop Item, Bibliographie
Wang, Yi ; Xiang, Lin ; Zhang, Jing ; Ge, Xiaohu (2022)
Connectivity Analysis for Large-Scale Intelligent Reflecting Surface Aided mmWave Cellular Networks.
33rd International Symposium on Personal, Indoor and Mobile Radio Communications. virtual Conference (12.09.2022-15.09.2022)
doi: 10.1109/PIMRC54779.2022.9977979
Conference or Workshop Item, Bibliographie
Doula, Achref ; Schmidt, Lennart ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Visualization of Machine Learning Uncertainty in AR-Based See-Through Applications.
2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). virtual Conference (12.12.2022-14.12.2022)
doi: 10.1109/AIVR56993.2022.00022
Conference or Workshop Item, Bibliographie
Dongare, Sumedh ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2022)
Deep Reinforcement Learning for Task Allocation in Energy Harvesting Mobile Crowdsensing.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference. Rio de Janeiro, Brazil (04.12.2022-08.12.2022)
doi: 10.1109/GLOBECOM48099.2022.10001204
Conference or Workshop Item, Bibliographie
Quispe, Jaime ; Maciel, Tarcisio Ferreira ; Silva, Yuri Carvalho Barbosa ; Klein, Anja (2022)
RIS-assisted beamforming for energy efficiency in multiuser downlink transmissions.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference. Rio de Janeiro, Brazil (04.12.2022-08.12.2022)
doi: 10.1109/GCWkshps56602.2022.10008573
Conference or Workshop Item, Bibliographie
Götte, Jan Sebastian ; Katzir, Liran ; Scheuermann, Björn (2022)
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation.
38th Annual Computer Security Applications Conference. Austin, USA (05.12.2022-09.12.2022)
doi: 10.1145/3564625.3564640
Conference or Workshop Item, Bibliographie
Pramanick, Aniket ; Beck, Tilman ; Stowe, Kevin ; Gurevych, Iryna (2022)
The challenges of temporal alignment on Twitter during crisis.
2022 Conference on Empirical Methods in Natural Language Processing. Abu Dhabi, UAE (07.12.2022-11.12.2022)
Conference or Workshop Item, Bibliographie
Gebhard, Tobias ; Steinke, Florian ; Brucherseifer, Eva (2022)
Monitoring Electricity Demand Synchronization Using Copulas.
IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022). Novi Sad, Serbia (10.10.2022-12.10.2022)
doi: 10.1109/ISGT-Europe54678.2022.9960369
Conference or Workshop Item, Bibliographie
Heise, Michael ; Pietsch, Martin ; Steinke, Florian ; Bauer, Maximilian ; Yilmaz, Burak (2022)
Optimized UAV Placement for Resilient Crisis Communication and Power Grid Restoration.
IEEE PES Innovative Smart Grid Technology (ISGT Europe 2022). Novi Sad, Serbia (10.10.2022-12.10.2022)
doi: 10.1109/ISGT-Europe54678.2022.9960494
Conference or Workshop Item, Bibliographie
Becker, Katrin ; Oehler, Martin ; Stryk, Oskar von (2022)
3D Coverage Path Planning for Efficient Construction Progress Monitoring.
25th IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR 2021). Sevilla, Spain (08.11.2022-10.11.2022)
doi: 10.1109/SSRR56537.2022.10018726
Conference or Workshop Item, Bibliographie
Süß, Jasper ; Schnaubelt, Marius ; Stryk, Oskar von (2022)
Multi-Cam ARM-SLAM: Robust Multi-Modal State Estimation Using Truncated Signed Distance Functions for Mobile Rescue Robots.
25th IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR 2021). Sevilla, Spain (08.11.2022-10.11.2022)
doi: 10.1109/SSRR56537.2022.10018752
Conference or Workshop Item, Bibliographie
Kreutz, Thomas ; Esbel, Ousama ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Unsupervised Driving Event Discovery Based on Vehicle CAN-data.
25th International Conference on Intelligent Transportation Systems. Macau, Peoples Republik of China (08.10.2022-12.10.2022)
doi: 10.1109/ITSC55140.2022.9922158
Conference or Workshop Item, Bibliographie
Vlaski, Stefan ; Schroth, Christian ; Muma, Michael ; Zoubir, Abdelhak M. (2022)
Robust and Efficient Aggregation for Distributed Learning.
30th European Signal Processing Conference. Belgrade, Serbia (29.08.2022-02.09.2022)
doi: 10.23919/EUSIPCO55093.2022.9909822
Conference or Workshop Item, Bibliographie
Machkour, Jasin ; Muma, Michael ; Palomar, Daniel P. (2022)
False Discovery Rate Control for Grouped Variable Selection in High-Dimensional Linear Models Using the T-Knock Filter.
30th European Signal Processing Conference. Belgrade, Serbia (29.08.2022-02.09.2022)
doi: 10.23919/EUSIPCO55093.2022.9909883
Conference or Workshop Item, Bibliographie
Friesen, John ; Pietsch, Martin (2022)
Slums in Smart Cities - Rethink the Standard.
12th IEEE Global Humanitarian Technology Conference (GHTC 2022). Santa Clara, USA (08.09.2022-11.09.2022)
doi: 10.1109/GHTC55712.2022.9911052
Conference or Workshop Item, Bibliographie
Willich, Julius von ; Matviienko, Andrii ; Günther, Sebastian ; Mühlhäuser, Max (2022)
Comparing VR Exploration Support for Ground-Based Rescue Robots.
24th International Conference on Human-Computer Interaction with Mobile Devices and Services. Vancouver, Canada (28.09.2022-01.10.2022)
doi: 10.1145/3528575.3551440
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Haunschild, Jasmin ; Kaufhold, Marc-André (2022)
Perceptions and Use of Warning Apps - Did Recent Crises Lead to Changes in Germany?
Mensch und Computer 2022: Facing Realities. Darmstadt, Germany (04.09.2022-07.09.2022)
doi: 10.1145/3543758.3543770
Conference or Workshop Item, Bibliographie
Koka, Taulant ; Muma, Michael (2022)
Fast and Sample Accurate R-Peak Detection for Noisy ECG Using Visibility Graphs.
44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society. Glasgow, United Kingdom (11.07.2022-15.07.2022)
doi: 10.1109/EMBC48229.2022.9871266
Conference or Workshop Item, Bibliographie
Leštáková, Michaela ; Alhamwy, Yasin ; Hessel, Frank ; Logan, Kevin ; Morgen, Andreas ; Pietsch, Martin (2022)
Resilient data platforms for smart cities.
ISNGI - the International Symposium for Next Generation Infrastructure. Rotterdam (07.09.2022 - 09.09.2022)
Conference or Workshop Item, Bibliographie
Bugliarello, Emanuele ; Liu, Fangyu ; Pfeiffer, Jonas ; Reddy, Siva ; Elliott, Desmond ; Ponti, Edoardo M. ; Vulić, Ivan
eds.: Chaudhuri, Kamalika ; Jegelka, Stefanie ; Song, Le ; Szepesvari, Csaba ; Niu, Gang ; Sabato, Sivan ; University of Copenhagen, Mila – Quebec Artificial Intelligence Institute, University of Cambridge, TU Darmstadt, New York University, McGill University (2022)
IGLUE: A Benchmark for Transfer Learning across Modalities, Tasks, and Languages.
The 39th International Conference on Machine Learning. Baltimore, Maryland USA (17.07.2022-23.07.2022)
Conference or Workshop Item, Bibliographie
Lampe, Patrick ; Sommer, Markus ; Sterz, Artur ; Höchst, Jonas ; Uhl, Christian ; Freisleben, Bernd (2022)
ForestEdge: Unobtrusive Mechanism Interception in Environmental Monitoring.
47th Conference on Local Computer Networks. Edmonton, Canada (26.09.2022-29.09.2022)
doi: 10.1109/LCN53696.2022.9843426
Conference or Workshop Item, Bibliographie
Simon, Bernd ; Dongare, Sumedh ; Mahn, Tobias ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2022)
Delay- and Incentive-Aware Crowdsensing: A Stable Matching Approach for Coverage Maximization.
2022 IEEE International Conference on Communications. Seoul, South Korea (16.05.2022-20.05.2022)
doi: 10.1109/ICC45855.2022.9838603
Conference or Workshop Item, Bibliographie
Lu, Guangping ; Zhang, Jing ; Xiang, Lin ; Ge, Xiaohu (2022)
A Global Optimization Method for Energy-Minimal UAV-Aided Data Collection over Fixed Flight Path.
2022 IEEE International Conference on Communications. Seoul, Republic of Korea (16.05.2022-20.05.2022)
doi: 10.1109/ICC45855.2022.9838554
Conference or Workshop Item, Bibliographie
Geihs, Kurt ; Jakob, Stefan ; Opfer, Stephan ; Alhamwy, Yasin (2022)
Commonsense Knowledge for Human-Robot Collaboration in Hybrid Search and Rescue Teams.
2nd International Workshop on Human-Robot Interaction new Trends in Service and Industry (HRI-SI2022). Napoli, Italy (29.08.2022-29.08.2022)
Conference or Workshop Item, Bibliographie
Doula, Achref ; Güdelhöfer, Tobias ; Matviienko, Andrii ; Mühlhäuser, Max ; Sanchez Guinea, Alejandro (2022)
Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality.
SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference. Vancouver, Canada (08.08.2022-11.08.2022)
doi: 10.1145/3532719.3543249
Conference or Workshop Item, Bibliographie
Sokolowski, Daniel ; Weisenburger, Pascal ; Salvaneschi, Guido (2022)
Change is the Only Constant: Dynamic Updates for Workflows.
44th International Conference on Software Engineering. Pittsburgh, Pennsylvania (21.05.2022-29.05.2022)
doi: 10.1145/3510003.3510065
Conference or Workshop Item, Bibliographie
Audrito, Giorgio ; Casadei, Roberto ; Damiani, Ferruccio ; Salvaneschi, Guido ; Viroli, Mirko
eds.: Ali, Karim ; Vitek, Jan (2022)
Functional Programming for Distributed Systems with XC.
36th European Conference on Object-Oriented Programming. Berlin, Germany (06.06.2022-10.06.2022)
doi: 10.4230/LIPIcs.ECOOP.2022.20
Conference or Workshop Item, Bibliographie
Logan, Kevin ; Meck, Marvin ; Preuß, N. ; Wetterich, Philipp ; Pelz, P. F.
ed.: Schmitz, Katharina (2022)
Data Management as an Enabler of Sustainability – Discussion Using the Example of a Digital Data Sheet.
Fluid Power: Digital, Reliable, Sustainable - 13th International Fluid Power Conference. Aachen (13.06.2022-15.06.2022)
doi: 10.18154/RWTH-2023-04624
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Kundel, Ralf ; Steinmetz, Ralf (2022)
CAMON: Aerial-Ground Cooperation System for Disaster Network Detection.
19th International Conference on Information: Systems for Crisis Response and Management (ISCRAM 2022). Tarbes, France (22.05.2022-25.05.2022)
Conference or Workshop Item, Bibliographie
Pfeiffer, Jonas ; Geigle, Gregor ; Kamath, Aishwarya ; Steitz, Jan-Martin ; Roth, Stefan ; Vulić, Ivan ; Gurevych, Iryna (2022)
xGQA: Cross-Lingual Visual Question Answering.
60th Annual Meeting of the Association for Computational Linguistics. Dublin, Ireland (22.05.2022-27.05.2022)
Conference or Workshop Item, Bibliographie
Baumgärtner, Tim ; Wang, Kexin ; Sachdeva, Rachneet ; Geigle, Gregor ; Eichler, Max ; Poth, Clifton ; Sterz, Hannah ; Puerto, Haritz ; Ribeiro, Leonardo F. R. ; Pfeiffer, Jonas ; Reimers, Nils ; Şahin, Gözde Gül ; Gurevych, Iryna (2022)
UKP-SQUARE: An Online Platform for Question Answering Research.
60th Annual Meeting of the Association for Computational Linguistics. Dublin, Ireland (22.05.2022-27.05.2022)
Conference or Workshop Item, Bibliographie
Beck, Tilman ; Bohlender, Bela ; Viehmann, Christina ; Hane, Vincent ; Adamson, Yanik ; Khuri, Jaber ; Brossmann, Jonas ; Pfeiffer, Jonas ; Gurevych, Iryna (2022)
AdapterHub Playground: Simple and Flexible Few-Shot Learning with Adapters.
60th Annual Meeting of the Association for Computational Linguistics. Dublin, Ireland (22.05.2022-27.05.2022)
Conference or Workshop Item, Bibliographie
Höchst, Jonas ; Bellafkir, Hicham ; Lampe, Patrick ; Vogelbacher, Markus ; Mühling, Markus ; Schneider, Daniel ; Lindner, Kim ; Rösner, Sascha ; Schabo, Dana G. ; Farwig, Nina ; Freisleben, Bernd (2022)
Bird@Edge: Bird Species Recognition at the Edge.
10th Edition of the International Conference on Networked Systems (NETYS 2022). virtual Conference (17.05.2022-19.05.2022)
doi: 10.1007/978-3-031-17436-0_6
Conference or Workshop Item, Bibliographie
Pietsch, Martin ; Steinke, Florian (2022)
The Water Energy Nexus: Improved Emergency Grid Restoration with DERs.
22nd Power Systems Computation Conference (PSCC 2022). Porto, Portugal (27.06.2022-01.07.2022)
Conference or Workshop Item, Bibliographie
Matviienko, Andrii ; Müller, Florian ; Schmitz, Martin ; Fendrich, Marco ; Mühlhäuser, Max (2022)
SkyPort: Investigating 3D Teleportation Methods in Virtual Environments.
CHI '22: CHI Conference on Human Factors in Computing Systems. New Orleans, USA (29.04.2022-05.05.2022)
doi: 10.1145/3491102.3501983
Conference or Workshop Item, Bibliographie
Matviienko, Andrii ; Müller, Florian ; Schön, Dominik ; Seesemann, Paul ; Günther, Sebastian ; Mühlhäuser, Max (2022)
BikeAR: Understanding Cyclists' Crossing Decision-Making at Uncontrolled Intersections using Augmented Reality.
2022 CHI Conference on Human Factors in Computing Systems. New Orleans, USA (29.04.2022-05.05.2022)
doi: 10.1145/3491102.3517560
Conference or Workshop Item, Bibliographie
Doula, Achref ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022)
VR-Surv: A VR-Based Privacy Preserving Surveillance System.
2022 CHI Conference on Human Factors in Computing Systems. New Orleans, USA (29.04.2022-05.05.2022)
doi: 10.1145/3491101.3519645
Conference or Workshop Item, Bibliographie
Doula, Achref ; Kaufmann, Philipp ; Sanchez Guinea, Alejandro ; Mühlhäuser, Max (2022)
Effects of the Level of Detail on the Recognition of City Landmarks in Virtual Environments.
2022 IEEE Conference on Virtual Reality and 3D User Interfaces. virtual Conference (12.03.2022-16.03.2022)
doi: 10.1109/VRW55335.2022.00281
Conference or Workshop Item, Bibliographie
Cui, K. ; Koeppl, H. (2022)
Learning Graphon Mean Field Games and Approximate Nash Equilibria.
10th International Conference on Learning Representations (ICLR 2022). virtual Conference (25.04.2022-29.04.2022)
Conference or Workshop Item, Bibliographie
István, Zsolt ; Rosero, Paul ; Bonnet, Philippe (2022)
Always-trusted IoT - Making IoT Devices Trusted with Minimal Overhead.
5th Workshop on System Software for Trusted Execution (SysTEX'22). Lausanne, Switzerland (28.03.2022-04.03.2022)
Conference or Workshop Item, Bibliographie
Schmitt, Martin (2022)
Ethik der Digitalstadt - Herausforderung der Datensouveränität.
Ethik der Digitalstadt - Herausforderung der Datensouveränität. virtual Conference (03.12.2021-03.12.2021)
Conference or Workshop Item, Bibliographie
Kurz, Konstantin ; Bock, Carolin ; Hanschur, Leonard (2022)
Hope this E-Mail finds you well – How empathic entrepreneurs succeed during times of adversity.
JPIM Research Forum 2022. virtual Conference (13.01.2022-15.01.2022)
Conference or Workshop Item, Bibliographie
eds.: Kaufhold, Marc-André ; Reuter, Christian ; Comes, Tina ; Mirbabaie, Milad ; Stieglitz, Stefan ; Technische Universität Darmstadt, Delft University of Technology, Maastricht University, Universität Paderborn, Universität Duisburg-Essen (2022)
Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response.
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response. (27.09.2021-27.09.2021)
doi: 10.26083/tuprints-00020092
Conference or Workshop Item, Primary publication, Publisher's Version
Richter, David ; Kretzler, David ; Weisenburger, Pascal ; Salvaneschi, Guido ; Faust, Sebastian ; Mezini, Mira (2022)
Prisma: A tierless language for enforcing contract-client protocols in decentralized apps.
35th European Conference on Object-Oriented Programming. Berlin, Germany (06.07.2022-07.07.2022)
doi: 10.4230/LIPIcs.ECOOP.2022.35
Conference or Workshop Item, Bibliographie
Ourari, Ramzi ; Cui, Kai ; Elshamanhory, Ahmed ; Koeppl, Heinz (2022)
Nearest-Neighbor-based Collision Avoidance for Quadrotors via Reinforcement Learning.
doi: 10.1109/ICRA46639.2022.9812221
Conference or Workshop Item, Bibliographie
Orlov, Denis ; Möller, Simon ; Düfer, Sven ; Haesler, Steffen ; Reuter, Christian
eds.: Marky, Karola ; Grünefeld, Uwe ; Kosch, Thomas (2022)
Detecting a Crisis: Comparison of Self-Reported vs. Automated Internet Outage Measuring Methods.
Mensch und Computer 2022: Facing Realities. Darmstadt, Germany (04.09.2022-07.09.2022)
doi: 10.18420/muc2022-mci-ws10-321
Conference or Workshop Item, Bibliographie
Taştan, Aylin ; Muma, Michael ; Zoubir, Abdelhak M. (2022)
Eigenvalue-Based Block Diagonal Representation and Application to p-Nearest Neighbor Graphs.
30th European Signal Processing Conference. Belgrade, Serbia (29.08.2022-02.09.2022)
doi: 10.23919/EUSIPCO55093.2022.9909832
Conference or Workshop Item, Bibliographie
Cui, K. ; Yilmaz, M. B. ; Tahir, A. ; Klein, A. ; Koeppl, H. (2022)
Optimal Offloading Strategies for Edge-Computing via Mean-Field Games and Control.
Rio de Janeiro, Brazil
doi: 10.1109/GLOBECOM48099.2022.10001412
Conference or Workshop Item, Bibliographie
Leštáková, Michaela ; Hessel, Frank ; Logan, Kevin ; Alhamwy, Yasin ; Morgen, Andreas ; Pietsch, Martin (2022)
Urban data platforms and urban critical infrastructure.
DeSIRE Conference 2022. Delft, Netherlands (03.11.2022 - 04.11.2022)
Conference or Workshop Item, Bibliographie
Logan, Kevin ; Stürmer, Marius ; Müller, Tim ; Meck, Tobias ; Pelz, Peter F. (2022)
Multi-agent control of fluid systems – comparison of approaches.
DeSIRE Conference 2022. Delft, Netherlands (03.11.2022 - 04.11.2022)
Conference or Workshop Item, Bibliographie
Quispe, Jaime ; Maciel, Tarcisio Ferreira ; Silva, Yuri Carvalho Barbosa ; Klein, Anja (2021)
Beamforming and link activation methods for energy efficient RIS-aided transmissions in C-RANs.
IEEE Global Communications Conference 2021. virtual Conference and Madrid, Spain (07.12.2021-11.12.2021)
doi: 10.1109/GLOBECOM46510.2021.9685593
Conference or Workshop Item, Bibliographie
Quispe, Jaime ; Maciel, Tarcisio Ferreira ; Silva, Yuri Carvalho Barbosa ; Klein, Anja (2021)
Joint Beamforming and BS Selection for Energy-Efficient Communications via Aerial-RIS.
IEEE Global Communications Conference 2021. virtual Conference and Madrid, Spain (07.12.2021-11.12.2021)
doi: 10.1109/GCWkshps52748.2021.9681981
Conference or Workshop Item, Bibliographie
Lin, Xinhua ; Zhang, Jing ; Xiang, Lin ; Ge, Xiohu (2021)
Energy Consumption Optimization for UAV Assisted Private Blockchain-based IIoT Networks.
94th Vehicular Technology Conference (VTC2021-Fall). virtual Conference (27.09.2021-30.09.2021)
doi: 10.1109/VTC2021-Fall52928.2021.9625316
Conference or Workshop Item, Bibliographie
Kiekenap, Kilian ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2021)
Energy-Optimal Short Packet Transmission for Time-Critical Control.
94th Vehicular Technology Conference (VTC2021-Fall). virtual Conference (27.09.2021-30.09.2021)
doi: 10.1109/VTC2021-Fall52928.2021.9625205
Conference or Workshop Item, Bibliographie
Taştan, A. ; Muma, M. ; Zoubir, A. M. (2021)
Robust Spectral Clustering: A Locality Preserving Feature Mapping Based on M-estimation.
29th European Signal Processing Conference (EUSIPCO). virtual Conference (23.08.2021-27.08.2021)
doi: 10.23919/EUSIPCO54536.2021.9616292
Conference or Workshop Item, Bibliographie
Baumgärtner, Lars ; Meuser, Tobias ; Bloessl, Bastian (2021)
coreemu-lab: An Automated Network Emulation and Evaluation Environment.
11th IEEE Global Humanitarian Technology Conference (GHTC 2021). virtual Conference (19.10.2021-23.10.2021)
doi: 10.1109/GHTC53159.2021.9612475
Conference or Workshop Item, Bibliographie
Meuser, Tobias ; Baumgärtner, Lars ; Becker, Benjamin (2021)
NetSkylines: Digital Twins for Evaluating Disaster Communication.
11th IEEE Global Humanitarian Technology Conference (GHTC 2021). virtual Conference (19.10.2021-23.10.2021)
doi: 10.1109/GHTC53159.2021.9612413
Conference or Workshop Item, Bibliographie
Almon, Lars ; Krause, Arno ; Fietze, Oliver ; Hollick, Matthias (2021)
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
19th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’21). virtual Conference (22.11.2021-26.11.2021)
doi: 10.1145/3479241.3486689
Conference or Workshop Item, Bibliographie
Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2021)
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes.
17th International Conference on distributed Computing in sensor systems (DCOSS 2021). virtual Conference (14.07.2021-16.07.2021)
doi: 10.1109/DCOSS52077.2021.00014
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Govinden, Jérôme ; Günther, Felix ; Paterson, Kenneth G. (2021)
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484814
Conference or Workshop Item, Bibliographie
Ansell, Alan ; Edoardo, Maria Ponti ; Pfeiffer, Jonas ; Ruder, Sebastian ; Glavaš, Goran ; Vulić, Ivan ; Korhonen, Anna (2021)
MAD-G: Multilingual Adapter Generation for Efficient Cross-Lingual Transfer.
Conference on Empirical Methods in Natural Language Processing (EMNLP 2021). Punta Cana, Dominican Republic (07.11.2021-11.11.2021)
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Frommelt, Paul ; Lieser, Patrick ; Höchst, Jonas ; Lampe, Patrick ; Freisleben, Bernd ; Steinmetz, Ralf (2021)
Energy-efficient Mobile Sensor Data Offloading via WiFi using LoRa-based Connectivity Estimations.
51. Jahrestagung der Gesellschaft für Informatik (INFORMATIK 2021). virtual conference (27.09.2021-01.10.2021)
doi: 10.18420/informatik2021-037
Conference or Workshop Item, Bibliographie
Haesler, Steffen ; Mogk, Ragnar ; Putz, Florentin ; Logan, Kevin ; Thiessen, Nadja ; Kleinschnitger, Katharina ; Baumgärtner, Lars ; Stroscher, Jan-Philipp ; Reuter, Christian ; Knodt, Michèle ; Hollick, Matthias (2021)
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods.
2021 Conference on Computer Supported Cooperative Work and Social Computing. virtual Conference (23.10.2021-27.10.2021)
doi: 10.1145/3462204.3481749
Conference or Workshop Item, Bibliographie
Günther, Jonas ; Oehler, Martin ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021)
Industrial Manometer Detection and Reading for Autonomous Inspection Robots.
5th European Conference on Mobile Robots. virtual Conference (31.08.2021-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568833
Conference or Workshop Item, Bibliographie
Oehler, Martin ; Stryk, Oskar von (2021)
A Flexible Framework for Virtual Omnidirectional Vision to Improve Operator Situation Awareness.
5th European Conference on Mobile Robots. virtual Conference (31.08.2021-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568840
Conference or Workshop Item, Bibliographie
Fabian, Stefan ; Stryk, Oskar von (2021)
Open-Source Tools for Efficient ROS and ROS2-based 2D Human-Robot Interface Development.
5th European Conference on Mobile Robots. virtual Conference (31.08.2021-03.09.2021)
doi: 10.1109/ECMR50962.2021.9568801
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Meuser, Tobias ; Steinmetz, Ralf (2021)
Calling Ground Support: Cooperative DTNs for Improved Aerial Monitoring Systems.
11th IEEE Global Humanitarian Technology Conference (GHTC 2021). virtual conference (19.10.2021-23.10.2021)
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Meneely, Andy ; Arnouts, Dorian ; Mühlhäuser, Max (2021)
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21). virtual conference (11.10.2021 - 15.10.2021)
doi: 10.1145/3475716.3475783
Conference or Workshop Item, Bibliographie
Putz, Florentin ; Schön, Steffen ; Hollick, Matthias (2021)
Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions.
4th International Workshop on Emerging Technologies for Authorization and Authentication. Darmstadt, Germany (08.10.2021-08.10.2021)
doi: 10.1007/978-3-030-93747-8_2
Conference or Workshop Item, Bibliographie
Wickert, Anna-Katharina ; Baumgärtner, Lars ; Breitfelder, Florian ; Mezini, Mira (2021)
Python Crypto Misuses in the Wild.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21). virtual Conference (11.10.2021-15.10.2021)
doi: 10.6084/m9.figshare.16499085.v1
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Reuter, Christian
ed.: ACM (2021)
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas.
24th ACM Conference on Computer-Supported Cooperative Work and Social Computing. virtual Conference (23.10.2021-27.10.2021)
doi: 10.1145/3462204.3481745
Conference or Workshop Item, Bibliographie
Fejrskov, Martin ; Pedersen, Jens Myrup ; Böck, Leon ; Vasilomanolakis, Emmanouil (2021)
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
IEEE Conference on Communications and Network Security. Tempe, AZ, USA (04.10.2021-06.10.2021)
doi: 10.1109/CNS53000.2021.9705029
Conference or Workshop Item, Bibliographie
Stroscher, Jan-Philipp ; Schnaubelt, Marius ; Sanchez Guinea, Alejandro ; Fabian, Stefan ; Willich, Julius von ; Alhamwy, Yasin ; Bauer, Maximilian ; Stryk, Oskar von ; Mühlhäuser, Max ; Geihs, Kurt ; Hornung, Gerrit (2021)
Technical & Data Protection Aspects of a Smart Digital Control Center for Smart Cities.
INFORMATIK 2021: 51. Jahrestagung der Gesellschaft für Informatik. virtual Conference (27.09.2021-01.10.2021)
doi: 10.18420/informatik2021-086
Conference or Workshop Item, Bibliographie
Sanchez Guinea, Alejandro ; Heinrich, Simon ; Mühlhäuser, Max (2021)
VIDENS: Vision-based User Identification from Inertial Sensors.
UbiComp '21: The 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing. virtual Conference (21.09.2021-26.09.2021)
doi: 10.1145/3460421.3480426
Conference or Workshop Item, Bibliographie
Steitz, Jan-Martin O. ; Pfeiffer, Jonas ; Gurevych, Iryna ; Roth, Stefan (2021)
TxT: Crossmodal End-to-End Learning with Transformers.
43rd DAGM German Conference on Pattern Recognition 2021. virtual Conference (28.09.2021-01.10.2021)
doi: 10.1007/978-3-030-92659-5_26
Conference or Workshop Item, Bibliographie
Alhamwy, Yasin (2021)
Information Management for Multi-Agent Systems.
NetSys 2021. Lübeck (13.09.2021-16.09.2021)
Conference or Workshop Item, Bibliographie
Ribeiro, Leonardo F. R. ; Pfeiffer, Jonas ; Zhang, Yue ; Gurevych, Iryna (2021)
Smelting Gold and Silver for Improved Multilingual AMR-to-Text Generation.
2021 Conference on Empirical Methods in Natural Language Processing. virtual Conference and Punta Cana, Dominican Republic (07.11.2021-11.11.2021)
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian
ed.: ACM (2021)
Citizens' Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic.
Conference on Information Technology for Social Good. Roma, Italy (09.09.2021-11.09.2021)
doi: 10.1145/3462203.3475886
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Pauli, Selina ; Haunschild, Jasmin (2021)
Citizens‘ Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic.
ACM International Conference on Information Technology for Social Good. Roma, Italy (09.09.2021-11.09.2021)
doi: 10.1145/3462203.3475886
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Stöhr, Niklas ; Kundel, Ralf ; Lieser, Patrick ; Steinmetz, Ralf (2021)
Dynamic Monitoring Area Allocation for Aerial Post-Disaster Situation Monitoring.
International Conference on Networked Systems (NetSys2021). Lübeck, Germany (13.09.2021-16.09.2021)
Conference or Workshop Item, Bibliographie
Poth, Clifton ; Pfeiffer, Jonas ; Rücklé, Andreas ; Gurevych, Iryna (2021)
What to Pre-Train on? Efficient Intermediate Task Selection.
The 2021 Conference on Empirical Methods in Natural Language Processing. virtual Conference and Punta Cana, Dominican Republic (07.11.2021-11.11.2021)
Conference or Workshop Item, Bibliographie
Pfeiffer, Jonas ; Vulić, Ivan ; Gurevych, Iryna ; Ruder, Sebastian (2021)
UNKs Everywhere: Adapting Multilingual Language Models to New Scripts.
The 2021 Conference on Empirical Methods in Natural Language Processing. virtual Conference and Punta Cana, Dominican Republic (07.11.2021-11.11.2021)
Conference or Workshop Item, Bibliographie
Rücklé, Andreas ; Geigle, Gregor ; Glockner, Max ; Beck, Tilman ; Pfeiffer, Jonas ; Reimers, Nils ; Gurevych, Iryna (2021)
AdapterDrop: On the Efficiency of Adapters in Transformers.
The 2021 Conference on Empirical Methods in Natural Language Processing. virtual Conference and Punta Cana, Dominican Republic (07.11.2021-11.11.2021)
Conference or Workshop Item, Bibliographie
Sokolowski, Daniel ; Weisenburger, Pascal ; Salvaneschi, Guido (2021)
Automating serverless deployments for DevOps organizations.
29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Athens, Greece (23.08.2021-28.08.2021)
doi: 10.1145/3468264.3468575
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.08.2021-13.08.2021)
Conference or Workshop Item, Bibliographie
Mora, Edwin ; Steinke, Florian (2021)
Robust voltage regulation for active distribution networks with imperfect observability.
14th IEEE PowerTech Conference. virtual Conference (28.06.2021-02.07.2021)
doi: 10.1109/PowerTech46648.2021.9495084
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2021)
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.2021-01.07.2021)
doi: 10.1145/3448300.3468251
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.2021-01.07.2021)
doi: 10.1145/3448300.3468252
Conference or Workshop Item, Bibliographie
Alhamwy, Yasin ; Watson, Simon ; Carrasco, Joaquin ; Cooper, Glen ; Geihs, Kurt (2021)
A Feasibility Analysis of Tether
Localisation for Mobile Robots.
1st European Workshop on Maritime Systems Resilience and Security (MARESEC 2021). virtual Conference (14.06.2021-14.06.2021)
Conference or Workshop Item, Bibliographie
Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.06.2021-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Conference or Workshop Item, Bibliographie
Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.06.2021-11.06.2021)
Conference or Workshop Item, Bibliographie
Lorenz, Imke ; Pouls, Kevin ; Pelz, Peter F.
eds.: Pelz, Peter F. ; Groche, Peter (2021)
Comparability of Water Infrastructure Resilience of Different Urban Structures.
4th International Conference on Uncertainty in Mechanical Engineering. virtual Conference (07.06.2021-08.06.2021)
doi: 10.1007/978-3-030-77256-7_8
Conference or Workshop Item, Bibliographie
Meuser, Tobias ; Baumgärtner, Lars ; Lieser, Patrick (2021)
Pandemic Skylines: Digital Twins for More Realism in Epidemic Simulations.
18th International Conference on Information Systems for Crisis Response and Management (ISCRAM). Blacksburg, USA (23.05.2021-26.05.2021)
Conference or Workshop Item, Bibliographie
Stöver, Alina ; Gerber, Nina ; Kaushik, Sushma ; Mühlhäuser, Max ; Marky, Karola (2021)
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps.
CHI '21: CHI Conference on Human Factors in Computing Systems. virtual Conference (08.05.2021-13.05.2021)
doi: 10.1145/3411763.3451791
Conference or Workshop Item, Bibliographie
Rust, Phillip ; Pfeiffer, Jonas ; Vulić, Ivan ; Ruder, Sebastian ; Gurevych, Iryna (2021)
How Good is Your Tokenizer? On the Monolingual Performance of Multilingual Language Models.
59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (ACL-IJCNLP 2021). virtual Conference (01.08.2021-06.08.2021)
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Lieser, Patrick ; Meuser, Tobias ; Baumgärtner, Lars ; Mezini, Mira ; Steinmetz, Ralf (2021)
Modeling Civilian Mobility in Large-Scale Disasters.
18th International Conference on Information Systems for Crisis Response and Management (ISCRAM). virtual Conference (23.05.2021-27.05.2021)
Conference or Workshop Item, Bibliographie
Schnaubelt, Marius ; Ullrich, Tobias ; Torchalla, Moritz ; Diegelmann, Jonas ; Hoffmann, Matthias ; Stryk, Oskar von
eds.: Bertram, Torsten ; Corves, Burkhard ; Janschek, Klaus ; Rinderknecht, Stephan (2021)
Entwicklung eines autonomiefokussierten hochmobilen
Bodenrobotersystems für den Katastrophenschutz.
14. VDI/VDE Mechatronik‐Tagung 2021. virtual Conference (24.03.2021-25.03.2021)
Conference or Workshop Item, Bibliographie
Kiekenap, Kilian ; Klein, Anja (2021)
Optimum Sensor Value Transmission Scheduling for Linear Wireless Networked Control Systems.
92nd Vehicular Technology Conference. virtual Conference (18.12.2020-16.12.2020)
doi: 10.1109/VTC2020-Fall49728.2020.9348559
Conference or Workshop Item, Bibliographie
Yilmaz, Burak ; Ortiz Jimenez, Andrea Patricia ; Klein, Anja (2021)
Delay Minimization for Edge Computing with Dynamic Server Computing Capacity: a learning approach.
GLOBECOM 2020 - Global Communications Conference. virtual Conference (07.12.2020-11.12.2020)
doi: 10.1109/GLOBECOM42002.2020.9322420
Conference or Workshop Item, Bibliographie
Pfeiffer, Jonas ; Kamath, Aishwarya ; Rücklé, Andreas ; Cho, Kyunghyun ; Gurevych, Iryna (2021)
AdapterFusion: Non-Destructive Task Composition for Transfer Learning.
16th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2021). virtual conference (19.04.2021-23.04.2021)
Conference or Workshop Item, Bibliographie
Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). virtual Conference (21.02.2021-24.02.2021)
doi: 10.14722/ndss.2021.23159
Conference or Workshop Item, Bibliographie
Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium 2021. Vancouver, Canada (11.08.2021-13.08.2021)
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.10.2021-21.10.2021)
Conference or Workshop Item, Bibliographie
Schmitz, Martin ; Müller, Florian ; Mühlhäuser, Max ; Riemann, Jan ; Le, Huy Viet (2021)
Itsy-Bits: Fabrication and Recognition of 3D-Printed Tangibles with Small Footprints on Capacitive Touchscreens.
2021 CHI Conference on Human Factors in Computing Systems. virtual conference (08.05.2021-13.05.2021)
doi: 10.1145/3411764.3445502
Conference or Workshop Item, Bibliographie
Cui, Kai ; Koeppl, Heinz (2021)
Approximately Solving Mean Field Games via Entropy-Regularized Deep Reinforcement Learning.
24th International Conference on Artificial Intelligence and Statistics. Virtual Conference (13.04.2021-15.04.2021)
Conference or Workshop Item, Bibliographie
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Conference or Workshop Item, Bibliographie
Stute, Milan ; Heinrich, Alexander ; Lorenz, Jannik ; Hollick, Matthias (2021)
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi.
30th USENIX Security Symposium. virtual Conference (11.08.2021-13.08.2021)
Conference or Workshop Item, Bibliographie
Eskandani, Nafise ; Salvaneschi, Guido (2021)
The Wonderless Dataset for Serverless Computing.
18th International Conference on Mining Software Repositories (MSR). virtual Conference (22.05.2021-30.05.2021)
doi: 10.1109/MSR52588.2021.00075
Conference or Workshop Item, Bibliographie
Sindt, Johannes ; Santos, Allan ; Pfetsch, Marc E. ; Steinke, Florian (2021)
Evaluation of Multiparametric Linear Programming for Economic Dispatch under Uncertainty.
2021 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). virtual Conference (18.10.2021-21.10.2021)
Conference or Workshop Item, Bibliographie
Cui, K. ; Tahir, A. ; Sinzger, M. ; Koeppl, H. (2021)
Discrete-Time Mean Field Control with Environment States.
60th Conference on Decision and Control (CDC2021). virtual Conference (13.12.2021-15.12.2021)
Conference or Workshop Item, Bibliographie
Börner, Johannes ; Steinke, Florian (2021)
Measuring LTI System Resilience against Adversarial Disturbances based on Efficient Generalized Eigenvalue Computations.
60th IEEE Conference on Decision and Control (CDC 2021). virtual Conference (13.12.2021-15.12.2021)
Conference or Workshop Item, Bibliographie
Araslanov, Nikita ; Roth, Stefan (2021)
Self-supervised Augmentation Consistency for Adapting Semantic Segmentation.
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2021). virtual Conference (19.06.2021-25.06.2021)
doi: 10.1109/CVPR46437.2021.01513
Conference or Workshop Item, Bibliographie
Janke, Tim ; Ghanmi, Mohamed ; Steinke, Florian (2021)
Implicit Generative Copulas.
35th International Conference on Neural Information Processing Systems (NeurIPS 2021). virtual Conference (07.12.2021-10.12.2021)
Conference or Workshop Item, Bibliographie
Daun, Kevin ; Schnaubelt, Marius ; Kohlbrecher, Stefan ; Stryk, Oskar von (2021)
HectorGrapher: Continuous-time Lidar SLAM with Multi-resolution Signed Distance Function Registration for Challenging Terrain.
2021 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). New York, USA (25.10.2021-27.10.2021)
Conference or Workshop Item, Bibliographie
Torchalla, Moritz ; Schnaubelt, Marius ; Daun, Kevin ; Stryk, Oskar von (2021)
Robust Multisensor Fusion for Reliable Mapping and Navigation in Degraded Visual Conditions.
2021 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). New York, USA (25.10.2021-27.10.2021)
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Reuter, Christian (2021)
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.09.2021-08.09.2021)
doi: 10.18420/muc2021-mci-ws08-255
Conference or Workshop Item, Bibliographie
Araslanov, Nikita ; Schaub-Meyer, Simone ; Roth, Stefan
eds.: Ranzato, Marc'Aurelio ; Beygelzimer, Alina ; Dauphin, Yann N. ; Liang, Percy ; Vaughan, Jennifer Wortman (2021)
Dense Unsupervised Learning for Video Segmentation.
(06.12.2021-14.12.2021)
Conference or Workshop Item, Bibliographie
Fabian, Stefan ; Kohlbrecher, Stefan ; Stryk, Oskar von (2020)
Pose Prediction for Mobile Ground Robots in Uneven Terrain Based on Difference of Heightmaps.
2020 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). virtual Conference (04.11.2020-06.11.2020)
doi: 10.1109/SSRR50563.2020.9292574
Conference or Workshop Item, Bibliographie
Becker, Benjamin ; Oberli, Christian ; Lieser, Patrick ; Steinmetz, Ralf
eds.: Hölscher, Christoph ; Comes, Tina (2020)
A Survey about Resilience in Communication Networks.
2020 Joint International Resilience Conference. virtual Conference (23.11.2020-27.11.2020)
Conference or Workshop Item, Bibliographie
Lestakova, Michaela ; Logan, Kevin ; Lorenz, Imke ; Pietsch, Martin ; Friesen, John ; Steinke, Florian ; Pelz, Peter F.
eds.: Comes, Tina ; Hölscher, Christoph (2020)
Towards a Common Ontology for Investigating Resilience of Interdependent Urban Systems.
Online Event
doi: 10.3990/1.9789036550956
Conference or Workshop Item, Bibliographie
Taştan, A. ; Muma, M. ; Zoubir, A. M. (2020)
An Unsupervised Approach for Graph-based Robust Clustering of Human Gait Signatures.
IEEE Radar Conference. virtual Conference (21.09.2020-25.09.2020)
doi: 10.1109/RadarConf2043947.2020.9266313
Conference or Workshop Item, Bibliographie
Lauinger, Johannes ; Baumgärtner, Lars ; Wickert, Anna-Katharina ; Mezini, Mira (2020)
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
TrustCom 2020. virtual Conference (29.12.2020-01.01.2021)
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Becker, Benjamin ; Kundel, Ralf ; Lieser, Patrick ; Steinmetz, Ralf (2020)
Topology-aware Path Planning for In-Transit Coverage of Aerial Post-Disaster Communication Assistance Systems.
45th Local Computer Networks Symposium on Emerging Topics in Networking. virtual Conference (17.11.2020-19.11.2020)
doi: 10.1109/LCNSymposium50271.2020.9363268
Conference or Workshop Item, Bibliographie
Köhler, Mirko ; Eskandani, Nafise ; Margara, Alessandro ; Salvaneschi, Guido (2020)
ConSysT: Tunable, Safe Consistency Meets Object-Oriented Programming.
SPLASH '20: Conference on Systems, Programming, Languages, and Applications, Software for Humanity. virtual Conference (23.07.2020-23.07.2020)
doi: 10.1145/3427761.3428346
Conference or Workshop Item, Bibliographie
Mora, Edwin ; Steinke, Florian (2020)
Computing sparse affine-linear control policies for linear power flow in microgrids.
10th IEEE PES Innovative Smart Grid Technologies Europe. virtual Conference (26.10.2020-28.10.2020)
doi: 10.1109/ISGT-Europe47291.2020.9248947
Conference or Workshop Item, Bibliographie
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419417
Conference or Workshop Item, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419425
Conference or Workshop Item, Bibliographie
Schneider, Thomas (2020)
Engineering Privacy-Preserving Machine Learning Protocols.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-09.11.2020)
doi: 10.1145/3411501.3418607
Conference or Workshop Item, Bibliographie
Pietsch, Martin ; Klein, Anja ; Steinke, Florian (2020)
Merging Microgrids for Optimal Distribution Grid Restoration under Explicit Communication Constraints.
Resilience Week 2020 Symposium. virtual Conference (19.10.2020-23.10.2020)
doi: 10.1109/RWS50334.2020.9241251
Conference or Workshop Item, Bibliographie
Sokolowski, Daniel ; Lehr, Jan-Patrick ; Bischof, Christian ; Salvaneschi, Guido (2020)
Leveraging Hybrid Cloud HPC with Multitier Reactive Programming.
3rd International Workshop on Interoperability of Supercomputing and Cloud Technologies. Virtual Conference (11.11.2020-11.11.2020)
doi: 10.1109/SuperCompCloud51944.2020.00010
Conference or Workshop Item, Bibliographie
Höchst, Jonas ; Penning, Alvar ; Lampe, Patrick ; Freisleben, Bernd (2020)
PIMOD: A Tool for Configuring Single-Board Computer Operating System Images.
10th IEEE Global Humanitarian Technology Conference (GHTC 2020). virtual Conference (29.10.2020-01.11.2020)
doi: 10.1109/GHTC46280.2020.9342928
Conference or Workshop Item, Bibliographie
Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira (2020)
Modular Collaborative Program Analysis in OPAL.
28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020). Virtual Conference (06.11.2020-16.11.2020)
doi: 10.1145/3368089.3409765
Conference or Workshop Item, Bibliographie
Baumgärtner, Lars ; Lieser, Patrick ; Zobel, Julian ; Bloessl, Bastian ; Steinmetz, Ralf ; Mezini, Mira (2020)
LoRAgent: A DTN-based Location-aware Communication System using LoRa.
10th IEEE Global Humanitarian Technology Conference. virtual Conference (29.10.2020-01.11.2020)
doi: 10.1109/GHTC46280.2020.9342886
Conference or Workshop Item, Bibliographie
Fraune, Cornelia ; Knodt, Michèle (2020)
Crisis Informatics Challenges from a Political Science Perpsective.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3406324.3424585
Conference or Workshop Item, Bibliographie
Sim, Gek Hong ; Mousavi, Mahdi ; Wang, Lin ; Klein, Anja ; Hollick, Matthias (2020)
Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks.
21st IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM 2020). virtual Conference (31.08.2020-03.09.2020)
doi: 10.1109/WoWMoM49955.2020.00033
Conference or Workshop Item, Bibliographie
Haesler, Steffen ; Schmid, Stefka ; Reuter, Christian (2020)
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon #WirVsVirus.
MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services. Oldenburg, Germany (05.10.2020-08.10.2020)
doi: 10.1145/3406324.3424584
Conference or Workshop Item, Bibliographie
Pfeiffer, Jonas ; Vulić, Ivan ; Gurevych, Iryna ; Ruder, Sebastian (2020)
MAD-X: An Adapter-based Framework for Multi-task Cross-lingual Transfer.
2020 Conference on Empirical Methods in Natural Language Processing. virtual Conference (16.11.2020-20.11.2020)
doi: 10.18653/v1/2020.emnlp-main.617
Conference or Workshop Item, Bibliographie
Pfeiffer, Jonas ; Rücklé, Andreas ; Poth, Clifton ; Kamath, Aishwarya ; Vulić, Ivan ; Ruder, Sebastian ; Cho, Kyunghyun ; Gurevych, Iryna (2020)
AdapterHub: A Framework for Adapting Transformers.
EMNLP 2020 : Conference on Empirical Methods in Natural Language Processing. virtual Conference (16.11.2020-20.11.2020)
doi: 10.18653/v1/2020.emnlp-demos.7
Conference or Workshop Item, Bibliographie
Rücklé, Andreas ; Pfeiffer, Jonas ; Gurevych, Iryna (2020)
MultiCQA: Zero-Shot Transfer of Self-Supervised Text Matching Models on a Massive Scale.
2020 Conference on Empirical Methods in Natural Language Processing. virtual Conference (16.11.2020-20.11.2020)
doi: 10.18653/v1/2020.emnlp-main.194
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (01.06.2020-05.06.2020)
Conference or Workshop Item, Bibliographie
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.10.2020-22.10.2020)
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André ; Comes, Tina ; Knodt, Michèle ; Mühlhäuser, Max (2020)
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3406324.3424590
Conference or Workshop Item, Bibliographie
Ruppel, F. ; Muma, M. ; Zoubir, A. M. (2020)
Globally Optimal Robust Matrix Completion Based on M-estimation.
30th International Workshop on Machine Learning for Signal Processing (MLSP 2020). Espoo, Finland (virtual Conference) (21.09.2020-24.09.2020)
doi: 10.1109/MLSP49062.2020.9231573
Conference or Workshop Item, Bibliographie
Bloessl, Bastian ; Baumgärtner, Lars ; Hollick, Matthias (2020)
Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio.
14th International Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization. London, United Kingdom (25.09.2020-25.09.2020)
doi: 10.1145/3411276.3412184
Conference or Workshop Item, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.08.2020-28.08.2020)
doi: 10.1145/3407023.3407045
Conference or Workshop Item, Bibliographie
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Conference or Workshop Item, Bibliographie
Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Conference or Workshop Item, Bibliographie
Araslanov, N. ; Roth, S. (2020)
Single-stage semantic segmentation from image labels.
2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition. virtual Conference (13.06.2020-19.06.2020)
doi: 10.1109/CVPR42600.2020.00431
Conference or Workshop Item, Bibliographie
Tillmanns, Jörn ; Classen, Jiska ; Rohrbach, Felix ; Hollick, Matthias (2020)
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020). virtual Conference (11.08.2020-11.08.2020)
Conference or Workshop Item, Bibliographie
Putz, Florentin ; Álvarez, Flor ; Classen, Jiska (2020)
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3399420
Conference or Workshop Item, Bibliographie
Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020)
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. VIRTUAL (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3399343
Conference or Workshop Item, Bibliographie
Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020)
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3399423
Conference or Workshop Item, Bibliographie
Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020)
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. virtual Conference (08.07.2020-10.07.2020)
doi: 10.1145/3395351.3401796
Conference or Workshop Item, Bibliographie
Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020)
A Programming Model for Semi-implicit Parallelization of Static Analyses.
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis. virtual Conference (18.07.2020-22.07.2020)
doi: 10.1145/3395363.3397367
Conference or Workshop Item, Bibliographie
Himmelmann, Nicolás ; Yuan, Dingwen ; Almon, Lars ; Hollick, Matthias (2020)
Concurrent Wireless Cut-Through Forwarding: Ultra Low-Latency Multi-Hop Communication for the IoT.
IEEE DCOSS 2020: International Conference on Distributed Computing in Sensor Systems. Virtual Conference (15.06.2020-17.06.2020)
Conference or Workshop Item, Bibliographie
Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020)
TACAI: An Intermediate Representation Based on Abstract Interpretation.
SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis. London, UK (15.06.2020-19.06.2020)
doi: 10.1145/3394451.3397204
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Haunschild, Jasmin ; Reuter, Christian (2020)
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
28th European Conference on Information Systems. Marrakech, Morocco (15.06.2020-17.06.2020)
Conference or Workshop Item, Bibliographie
Höchst, Jonas ; Baumgärtner, Lars ; Kuntke, Franz ; Penning, Alvar ; Sterz, Artur ; Freisleben, Bernd (2020)
LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios.
17th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2020). Blacksburg, Virginia, USA (24.05.2020-27.05.2020)
Conference or Workshop Item, Bibliographie
Meurisch, Christian ; Bayrak, Bekir ; Mühlhäuser, Max (2020)
Privacy-preserving AI Services Through Data Decentralization.
29th World Wide Web Conference (WWW'20). virtual Conference (20.04.2020-24.04.2020)
doi: 10.1145/3366423.3380106
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020)
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
15. Internationale Tagung Wirtschaftsinformatik - Community Tracks. Potsdam, Germany (08.03.2020-11.03.2020)
doi: 10.30844/wi_2020_o2-haunschild
Conference or Workshop Item, Bibliographie
Müller, Florian ; Schmitz, Martin ; Schmitt, Daniel ; Günther, Sebastian ; Funk, Markus ; Mühlhäuser, Max (2020)
Walk The Line: Leveraging Lateral Shifts of the Walking Path as an Input Modality for Head-Mounted Displays.
2020 CHI Conference on Human Factors in Computing Systems. virtual Conference (25.04.2020-30.04.2020)
doi: 10.1145/3313831.3376852
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020)
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020. Boston, USA (05.04.2020-07.04.2020)
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020)
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20). virtual Conference (30.03.2020-03.04.2020)
doi: 10.1145/3341105.3374020
Conference or Workshop Item, Bibliographie
Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19.10.2020-22.10.2020)
Conference or Workshop Item, Bibliographie
Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09.03.2020-13.03.2020)
Conference or Workshop Item, Bibliographie
Spörk, Michael ; Classen, Jiska ; Boano, Carlo Alberto ; Hollick, Matthias ; Römer, Kay (2020)
Improving the Reliability of Bluetooth Low Energy Connections.
Embedded Wireless Systems and Networks (EWSN). Lyon, France (17.02.2020-19.02.2020)
Conference or Workshop Item, Bibliographie
Brunner, Hannah ; Hofmann, Rainer ; Schuss, Markus ; Link, Jakob ; Hollick, Matthias ; Boano, Carlo Alberto ; Römer, Kay (2020)
Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices.
International Conference on Embedded Wireless Systems and Networks (EWSN 2020). Lyon, France (17.02.2020-19.02.2020)
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Spörk, Michael ; Boano, Carlo Alberto ; Römer, Kay ; Hollick, Matthias (2020)
Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
International Conference on Embedded Wireless Systems and Networks (EWSN 2020). Lyon, France (17.02.2020-19.02.2020)
Conference or Workshop Item, Bibliographie
Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20). Santiago de Compostela (08.06.2020-12.06.2020)
Conference or Workshop Item, Bibliographie
Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020)
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium. Boston, USA (12.08.2020-14.08.2020)
Conference or Workshop Item, Bibliographie
Mora, Edwin ; Steinke, Florian (2020)
On the minimal set of controllers and sensors for linear power flow.
21st Power Systems Computation Conference (PSCC 2020). virtual Conference (29.06.2020-03.07.2020)
Conference or Workshop Item, Bibliographie
Willich, Julius von ; Schmitz, Martin ; Müller, Florian ; Schmitt, Daniel ; Mühlhäuser, Max (2020)
Podoportation: Foot-Based Locomotion in Virtual Reality.
2020 CHI Conference on Human Factors in Computing Systems (CHI '20). virtual Conference (25.04.2020-30.04.2020)
doi: 10.1145/3313831.3376626
Conference or Workshop Item, Bibliographie
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020)
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020). San Diego, USA (23.02.2020-26.02.2020)
Conference or Workshop Item, Bibliographie
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Conference or Workshop Item, Bibliographie
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Conference or Workshop Item, Bibliographie
Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020)
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Conference or Workshop Item, Bibliographie
Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020)
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks. virtual Conference (29.06.2020-02.07.2020)
Conference or Workshop Item, Bibliographie
Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security. virtual Conference (14.09.2020-18.09.2020)
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Haunschild, Jasmin ; Hollick, Matthias ; Mühlhäuser, Max ; Vogt, Joachim ; Kreutzer, Michael (2020)
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities.
Mensch und Computer 2020 - Digitaler Wandel im Fluss der Zeit. virtual Conference (06.09.2020-09.09.2020)
doi: 10.18420/muc2020-ws117-408
Conference or Workshop Item, Bibliographie
Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020)
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Annual Computer Security Applications Conference (ACSAC 2020). virtual Conference (07.12.2020-11.12.2020)
Conference or Workshop Item, Bibliographie
Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020)
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20). virtual Conference (14.12.2020-16.12.2020)
Conference or Workshop Item, Bibliographie
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.12.2020-11.12.2020)
Conference or Workshop Item, Bibliographie
Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.12.2020-11.12.2020)
Conference or Workshop Item, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384749
Conference or Workshop Item, Bibliographie
Thiessen, Nadja
ed.: Disaster Competence Network Austria (DCNA) (2020)
Politische Naturkatastrophen - Wie Ideologien den Umgang mit Hochwasser prägten.
Disaster Research Days 2020. Innsbruck, Austria (13.10.2020-22.10.2020)
Conference or Workshop Item, Bibliographie
Baumgärtner, Lars ; Lieser, Patrick ; Mezini, Mira (2020)
The Buschfunk Project : Offline Communication for Everyone.
10th IEEE Global Humanitarian Technology Conference. virtual Conference (29.10.2020-01.11.2020)
Conference or Workshop Item, Bibliographie
Beilschmidt, Christian ; Drönner, Johannes ; Glombiewski, Nikolaus ; Körber, Michael ; Mattig, Michael ; Morgen, Andreas ; Seeger, Bernhard (2019)
VAT to the Future: Extrapolating Visual Complex Event Processing.
7th OpenSky Workshop. Zurich, Switzerland (21.11.2019-22.11.2019)
doi: 10.29007/wz4w
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Marzougui, Soundes (2019)
Post-Quantum Cryptography in Embedded Systems.
14th International Conference on Availability, Reliability and Security. Canterbury, United Kingdom (26.08.2019-29.08.2019)
doi: 10.1145/3339252.3341475
Conference or Workshop Item, Bibliographie
Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Conference or Workshop Item, Bibliographie
Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019-15.11.2019)
Conference or Workshop Item, Bibliographie
Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
26th ACM Conference on Computer and Communications Security. London, United Kingdom (11.11.2019-15.11.2019)
doi: 10.1145/3319535.3363251
Conference or Workshop Item, Bibliographie
Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019)
Efficiently Stealing your Machine Learning Models.
WPES'19 - 18. Workshop on Privacy in the Electronic Society. London, UK (11.11.2019-11.11.2019)
Conference or Workshop Item, Bibliographie
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (11.11.2019-11.11.2019)
Conference or Workshop Item, Bibliographie
Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (11.11.2019-11.11.2019)
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max
eds.: Cavallaro, Lorenzo ; Kinder, Johannes ; Wang, XiaoFeng ; Katz, Jonathan (2019)
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
ACM SIGSAC Conference on Computer and Communications Security, CCS 2019. London, UK (11.11.2019-15.11.2019)
doi: 10.1145/3319535.3363285
Conference or Workshop Item, Bibliographie
Köhler, Mirco ; Salvaneschi, Guido (2019)
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering. San Diego, Ca, USA (10.11.2019-15.11.2019)
doi: 10.1109/ASE.2019.00082
Conference or Workshop Item, Bibliographie
Hohmann, Fabian ; Ortiz, Andrea ; Klein, Anja (2019)
Optimal Resource Allocation Policy for Multi-Rate Opportunistic Forwarding.
IEEE Wireless Communications and Networking. Marrakesch, Marokko (15.04.2019-18.04.2019)
doi: 10.1109/WCNC.2019.8885462
Conference or Workshop Item, Bibliographie
Gringoli, Francesco ; Schulz, Matthias ; Link, Jakob ; Hollick, Matthias (2019)
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH ’19). Los Cabos, Mexico (25.10.2019-25.10.2019)
doi: 10.1145/3349623.3355477
Conference or Workshop Item, Bibliographie
Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019)
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19). Fuzhou, China (25.10.2019-27.10.2019)
Conference or Workshop Item, Bibliographie
Penning, Alvar ; Baumgärtner, Lars ; Höchst, Jonas ; Sterz, Artur ; Mezini, Mira ; Freisleben, Bernd (2019)
DTN7: An Open-Source Disruption-tolerant Networking Implementation of Bundle Protocol 7.
18th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2019). Esch-sur-Alzette, Luxemburg (01.10.2019-03.10.2019)
Conference or Workshop Item, Bibliographie
Baumgärtner, Lars ; Höchst, Jonas ; Lampe, Patrick ; Mogk, Ragnar ; Sterz, Artur ; Weisenburger, Pascal ; Mezini, Mira ; Freisleben, Bernd (2019)
Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City.
2019 IEEE Global Humanitarian Technology Conference (GHTC 2019). Seattle, USA (07.10.2019-20.10.2019)
Conference or Workshop Item, Bibliographie
Sterz, Artur ; Baumgärtner, Lars ; Höchst, Jonas ; Lampe, Patrick ; Freisleben, Bernd (2019)
OPPLOAD: Offloading Computational Workflows in Opportunistic Networks.
44th IEEE Conference on Local Computer Networks (LCN 2019). Osnabrück, Germany (14.10.2019-17.10.2019)
Conference or Workshop Item, Bibliographie
Zobel, Julian ; Lieser, Patrick ; Steinmetz, Ralf (2019)
Multi-Strategy Simulation of Aerial Post-Disaster Ad Hoc Communication Support Systems.
44th IEEE Conference on Local Computer Networks (LCN). Osnabrück, Germany (14.10.2019-17.10.2019)
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019)
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-133-04
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
eds.: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A. (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
24th European Symposium on Research in Computer Security. Luxembourg (23.09.2019-27.09.2019)
doi: 10.1007/978-3-030-29962-0_25
Conference or Workshop Item, Bibliographie
Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
eds.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.1145/3340764.3340782
Conference or Workshop Item, Bibliographie
Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf
ed.: David, Klaus (2019)
Resilience in Security and Crises through Adaptions and Transitions.
49. Jahrestagung der Gesellschaft für Informatik. Kassel, Germany (23.09.2019-26.09.2019)
doi: 10.18420/inf2019_ws60
Conference or Workshop Item, Bibliographie
Papsdorf, Daniel ; Velumani, Sakthivel ; Klein, Anja (2019)
MIMO Multi-Group Multi-Way Relaying: Interference Alignment in a Partially Connected Network.
20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). Cannes, France (02.07.2019-05.07.2019)
doi: 10.1109/SPAWC.2019.8815541
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Hofmeister, Anne ; Engels, Jens Ivo ; Freisleben, Bernd ; Hornung, Gerrit ; Klein, Anja ; Knodt, Michèle ; Lorenz, Imke ; Mühlhäuser, Max ; Pelz, Peter F. ; Rudolph-Cleff, Annette ; Steinmetz, Ralf ; Steinke, Florian ; Stryk, Oskar von (2019)
The Emergency Responsive Digital City.
2019 World Congress on Resilience, Reliability and Asset Management (WCRRAM). Singapore (28.07.2019-31.07.2019)
Conference or Workshop Item, Bibliographie
Spielhofer, Thomas ; Hahne, Anna Sophie ; Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2019)
Social Media Use in Emergencies of Citizens in the United Kingdom.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (19.05.2019-22.05.2019)
Conference or Workshop Item, Bibliographie
Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019)
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19). Beijing, China (15.07.2019-19.07.2019)
doi: 10.1145/3293882.3330555
Conference or Workshop Item, Bibliographie
Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019)
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Conference or Workshop Item, Bibliographie
Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019)
Mobile Private Contact Discovery at Scale.
28. USENIX Security Symposium (USENIX Security'19). SANTA CLARA, CA, USA (14.08.2019-16.08.2019)
Conference or Workshop Item, Bibliographie
Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019)
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019. Graz, Austria (15.09.2019-19.09.2019)
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas
eds.: Ding, Jintai ; Steinwandt, Rainer (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
10th International Conference on Post-Quantum Cryptography. Chongqing, People's Republic China (08.05.2019-10.05.2019)
doi: 10.1007/978-3-030-25510-7_12
Conference or Workshop Item, Bibliographie
Schneider, Thomas ; Tkachenko, Oleksandr (2019)
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19). Auckland New Zealand (09.07.2019-12.07.2019)
Conference or Workshop Item, Bibliographie
Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019)
Web Application for Privacy-Preserving Scheduling using Secure Computation.
16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic (26.07.2019 - 28.07.2019)
doi: 10.5220/0007947704560463
Conference or Workshop Item, Bibliographie
Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019)
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19). Seoul, South Korea (17.06.2019-21.06.2019)
doi: 10.1145/3307334.3326089
Conference or Workshop Item, Bibliographie
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019)
A Practical Attestation Protocol for Autonomous Embedded Systems.
4th IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm, Sweden (17.06.2019-19.06.2019)
Conference or Workshop Item, Bibliographie
Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
4. IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm (17.06.2019-19.06.2019)
Conference or Workshop Item, Bibliographie
Mantel, Heiko ; Probst, Christian (2019)
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF). Hoboken, NJ, USA (25.06.2019-28.06.2019)
Conference or Workshop Item, Bibliographie
Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019)
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Design Automation Conference 2019. Las Vegas, NV, USA (02.06.2019-06.06.2019)
Conference or Workshop Item, Bibliographie
Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019)
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium. Santa Clara, CA, USA (14.08.2019-16.08.2019)
Conference or Workshop Item, Bibliographie
Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019)
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
IEEE Workshop on the Internet of Safe Things. San Francisco, California, USA (23.05.2019-23.05.2019)
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Hollick, Matthias (2019)
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19). Miami, FL, USA (15.05.2019-17.05.2019)
doi: 10.1145/3317549.3319727
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019)
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019. Darmstadt (19.05.2019-23.05.2019)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Loiero, Mirjam (2019)
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019). Darmstadt, Germany (03.04.2019-05.04.2019)
Conference or Workshop Item, Bibliographie
Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019)
A Dataset of Parametric Cryptographic Misuses.
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR).
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel (2019)
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
39. GIL-Jahrestagung : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.02.2019-19.02.2019)
Conference or Workshop Item, Bibliographie
Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019)
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
39. GIL-Jahrestagung 2019: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.02.2019-19.02.2019)
Conference or Workshop Item, Bibliographie
Bloessl, Bastian ; Müller, Marcus ; Hollick, Matthias (2019)
Benchmarking and Profiling the GNU Radio Scheduler.
Proceedings of the GNU Radio Conference. Huntsville, Alabama (17.09.2019-21.09.2019)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (21.05.2018-23.05.2018)
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah (2019)
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Wirtschaftsinformatik 2019. Siegen, Germany (23.02.2019-27.02.2019)
Conference or Workshop Item, Bibliographie
Stute, Milan ; Narain, Sashank ; Mariotto, Alex ; Heinrich, Alexander ; Kreitschmann, David ; Noubir, Guevara ; Hollick, Matthias (2019)
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
28th USENIX Security Symposium (USENIX Security '19). Santa Clara, CA, USA (14.08.2019-16.08.2019)
Conference or Workshop Item, Bibliographie
Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019)
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (19.05.2019-22.05.2019)
Conference or Workshop Item, Bibliographie
Langer, Amanda ; Kaufhold, Marc-André ; Runft, Elena ; Reuter, Christian ; Grinko, Margarita ; Pipek, Volkmar (2019)
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019). València, Spain (19.05.2019-22.05.2019)
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian
ed.: Reuter, Christian (2019)
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Conference or Workshop Item, Bibliographie
Riebe, Thea ; Kaufhold, Marc-André ; Kumar, Tarun ; Reuter, Christian
ed.: Reuter, Christian (2019)
Threat Intelligence Application for Cyber Attribution.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Conference or Workshop Item, Bibliographie
Hartwig, Katrin ; Reuter, Christian
ed.: Reuter, Christian (2019)
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Conference or Workshop Item, Bibliographie
Riebe, Thea ; Reuter, Christian
ed.: Reuter, Christian (2019)
Accessing Dual Use in IT Development.
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Conference or Workshop Item, Bibliographie
Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian
eds.: Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko ; Reuter, Christian (2019)
Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations.
SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges. Darmstadt, Germany (25.09.2019-27.09.2019)
Conference or Workshop Item, Bibliographie
Riebe, Thea ; Langer, Amanda ; Kaufhold, Marc-André ; Kretschmer, Nina Katharina ; Reuter, Christian (2019)
Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-133-05
Conference or Workshop Item, Bibliographie
Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian (2019)
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-302-06
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Ludwig, Thomas ; Pottebaum, Jens ; Kaufhold, Marc-André (2019)
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.18420/muc2019-ws-133
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Häusser, Katja ; Bien, Mona ; Herbert, Franziska
eds.: Alt, Florian ; Bulling, Andreas ; Döring, Tanja (2019)
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
Mensch und Computer 2019. Hamburg, Germany (08.09.2019-11.09.2019)
doi: 10.1145/3340764.3340770
Conference or Workshop Item, Bibliographie
Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019)
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN). Osnabrück (14.10.2019-17.10.2019)
Conference or Workshop Item, Bibliographie
Álvarez, Flor ; Almon, Lars ; Radtki, Hauke ; Hollick, Matthias (2019)
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019). Seattle, WA (17.10.2019-20.10.2019)
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019)
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (24.02.2019-27.02.2019)
Conference or Workshop Item, Bibliographie
Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian (2019)
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
39. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?. Vienna, Austria (18.02.2019-19.02.2019)
Conference or Workshop Item, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2019)
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
14th Interantional Conference on Wirtschaftsinformatik. Siegen, Germany (23.02.2019-27.02.2019)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Conference or Workshop Item, Bibliographie
Álvarez, Flor ; Almon, Lars ; Hahn, Ann-Sophie ; Hollick, Matthias (2019)
Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept.
Security Standardisation Research Conference 2019 (ACM CCS Workshop). London, UK (11.11.2019-11.11.2019)
Conference or Workshop Item, Bibliographie
Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018)
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
The 11th International Symposium on Foundations & Practice of Security (FPS). Montreal, Canada (13.11.2018-15.11.2018)
Conference or Workshop Item, Bibliographie
Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018)
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18). New Delhi, India (29.10.2018-02.11.2018)
doi: 10.1145/3241539.3267716
Conference or Workshop Item, Bibliographie
Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018)
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18). New Delhi, India (29.10.2018-02.11.2018)
doi: 10.1145/3241539.3241566
Conference or Workshop Item, Bibliographie
Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018)
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018. Toronto, Canada (15.10.2018-19.10.2018)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
Conference or Workshop Item, Bibliographie
Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243786
Conference or Workshop Item, Bibliographie
Schneider, Thomas ; Tkachenko, Oleksandr (2018)
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3267323.3268956
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243856
Conference or Workshop Item, Bibliographie
Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar (2018)
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Heraklion, Crete, Greece
doi: 10.1007/978-3-030-00470-5_24
Conference or Workshop Item, Bibliographie
Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
Kryptotag29: 29. Krypto-Tag @ Bosch. Renningen, Germany (06.09.2018-07.09.2018)
doi: 10.18420/cdm-2018-29-24
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
eds.: Dachselt, Raimund ; Weber, Gerhard (2018)
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws12-033
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; Radziewski, Elmar von
eds.: Dachselt, Raimund ; Weber, Gerhard (2018)
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws12-0453
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
eds.: Dachselt, Raimund ; Weber, Gerhard (2018)
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Mensch und Computer 2018. Dresden, Germany (02.09.2018-05.09.2018)
doi: 10.18420/muc2018-ws12-0328
Conference or Workshop Item, Bibliographie
Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018)
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking. New Delhi, India (29.10.2018-02.11.2018)
doi: 10.1145/3241539.3241576
Conference or Workshop Item, Bibliographie
Günther, Daniel (2018)
Private Function Evaluation with Universal Circuits.
Bosch Renningen, Germany (06.09.2018-07.09.2018)
Conference or Workshop Item, Bibliographie
Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018)
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18). Naples, Italy (30.09.2018-03.10.2018)
doi: 10.1007/978-3-030-00434-7_1
Conference or Workshop Item, Bibliographie
Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Conference or Workshop Item, Bibliographie
Tkachenko, Oleksandr (2018)
Privacy-Preserving Genomics on a Large Scale.
Bosch Renningen, Germany (06.09.2018-07.09.2018)
Conference or Workshop Item, Bibliographie
Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018)
A unified lattice model and framework for purity analyses.
ASE 2018. Corum, Montpellier, France (03.09.2018-07.09.2018)
doi: 10.1145/3238147.3238226
Conference or Workshop Item, Bibliographie
Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018)
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks. Denver,CO,USA (26.06.2018-29.06.2018)
Conference or Workshop Item, Bibliographie
Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018)
Web Application for Privacy-Preserving Scheduling.
27th USENIX Security Symposium (USENIX Security'18). Baltimore, USA (15.08.2018-17.08.2018)
Conference or Workshop Item, Bibliographie
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018)
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
Incheon, Republic of Korea
doi: 10.1145/3196494.3196544
Conference or Workshop Item, Bibliographie
Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018)
Towards Practical RAM based Secure Computation.
ESORICS 2018. Barcelona, Spain (03.09.2018-07.09.2018)
Conference or Workshop Item, Bibliographie
Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018)
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems. Vienna, Austria (02.07.2018-05.07.2018)
Conference or Workshop Item, Bibliographie
Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018)
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
Taipei, Taiwan
doi: 10.1109/NOMS.2018.8406315
Conference or Workshop Item, Bibliographie
Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018)
Lattice Based Modularization of Static Analyses.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236509
Conference or Workshop Item, Bibliographie
Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018)
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
SOAP 2018. Amsterdam, Netherlands
doi: 10.1145/3236454.3236503
Conference or Workshop Item, Bibliographie
Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018)
Towards a Cloud-based System for Software Protection and Licensing.
Secrypt 2018. Porto, Portugal (26.07.2018-28.07.2018)
doi: 10.5220/0006899506980702
Conference or Workshop Item, Bibliographie
Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018)
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18). Guimaraes, Portugal (26.06.2018-28.06.2018)
doi: 10.1109/ICL-GNSS.2018.8440910
Conference or Workshop Item, Bibliographie
Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018)
iOracle: Automated Evaluation of Access Control Policies in iOS.
Conference or Workshop Item, Bibliographie
Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196541
Conference or Workshop Item, Bibliographie
Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ;